Getshell, a smart camera server in ZTE's home network, can leak private data such as videos and photos of millions of users on the cloud)

Source: Internet
Author: User

Getshell, a smart camera server in ZTE's home network, can leak private data such as videos and photos of millions of users on the cloud)

Xiaoxing looks at getshell caused by improper configuration of a backend server of the smart camera. There is a risk of leakage of private data such as videos and photos of millions of users stored on the cloud.

Detailed description:

1. Unauthorized Database Access

183.136.140.60: 10086 unauthorized access to mongodb

183.136.140.60: 6380 unauthorized access to redis (getshell can also be used, for fear of affecting the business of the manufacturer, without in-depth access)


2. unlimited access to internal systems (Arbitrary File Reading/getshell)

Use the leaked management password to log on to the Management System on some servers. Other background management system vendors can perform self-testing.

1) Homecare Management Background

The following two management backend functions are similar, which may be different internal versions. The main functions include app, firmware release, recharge card, and camera management.

Background address: https://mgr.ztehome.com.cn 58.240.65.91 admin/12 qwaszx

Background address: http: // 183.136.140.60: 8080 Homecare OA admin/12 qwaszx

The log view function has the Arbitrary File Reading Vulnerability, which can cause system sensitive information leakage.

The data packet is as follows:

POST http: // 183.136.140.60: 8080/logs/log-tail.do HTTP/1.1

Host: 183.136.140.60: 8080

Connection: keep-alive

Content-Length: 25

Accept :*/*

Line = 200 & path =/etc/shadow

Modify the submitted path parameter to read any server file. The web service has the root permission.


2) Zen management system Background

Background address: http://pms.ztehome.com.cn

This version of the logon management system has the Arbitrary File Read and getshell vulnerability. We recommend that you upgrade it.

Vulnerability details: You can refer to WooYun: Zen road vulnerability 2. read and write arbitrary files in the background/getshell

Proof of vulnerability: shell address http://pms.ztehome.com.cn/data/upload/shell.php (please delete after test)


3. key Information Leakage for cloud storage

Xiaoxing looks at the cloud backup space used by the camera as qiniu cloud storage, and its key access_key and secret_key are leaked, as a result, users can access and operate on their cloud video photos at Will (qiniu SDK does not find an interface to retrieve the total amount of data, and simply traverses and finds that the number of videos is more than 150 million ).

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.