Srun3000 billing system Arbitrary File Download Vulnerability (getting management password directly)

Source: Internet
Author: User

Srun3000 billing system Arbitrary File Download Vulnerability (getting management password directly)

Srun3000 billing system Arbitrary File Download Vulnerability [No Logon required]

Version: Srun3000 [3.00rc14.17.4]


The usage is still quite large, mainly for major universities :(

The url is not listed, so it is too violent for fear that your school will be attacked.

1. Arbitrary File Download Vulnerability

Vulnerability files

/Srun3/srun/services/modules/login/controller/login_controller.php

Code
 

/*** Download an object ** // any file download Vulnerability exists here -- fuck public function download () {global $ file; $ this-> model-> download_file ($ file );}



The download_file file path is

/Srun3/srun/services/modules. php

The code is
 

/*** Download a file ** @ param unknown_type $ file */public function download_file ($ file) {if (file_exists ($ file )) {$ this_base_file = basename ($ file); header ("Content-type: application/octet-stream"); header ("Accept-Ranges: bytes "); header ("Accept-Length :". filesize ($ file); header ("Content-Disposition: attachment; filename = \"". $ this_base_file. "\" "); readfile ($ file );}}



Simple and crude Arbitrary file Download Vulnerability. $ file is controllable and registers variables in global. php.

Download its configuration file here


/Srun3/etc/srun. conf
 



Download/etc/passwd
 



Result
 



Then, give a rough description of the srun3000 System

The default system port is 8800, and the corresponding web path is/srun3/srun/services/

The corresponding web path for port 8080 is/srun3/srun/web/

The corresponding web path for port 8081 is/srun3/srun/system/[All holes...]

The corresponding web path for port 80 is/srun3/web/

/Srun3/srun/services/for students to log on to view their personal information, personal online records, etc. The database password encryption mode is md5, and then the 16-bit password is obtained from the 9th-bit start, the database table is user

The administrator of/srun3/srun/web/manages users. The database password encryption mode is md5, and the database table is sysmgr. There are two accounts admin support.

Logon address: http: // xxoo: 8080/

The administrator of/srun3/srun/system/manages the server. The password is encrypted by md5.js, and its storage location is the system location/srun3/etc/srun. conf file

The logon address is http: // xxoo: 8081/login. php.

/Srun3/srun/web/should be the integrated web gateway portal page,



In the downloaded file, the password in srun. conf is md5 encrypted. After cracking, you can log on directly,
 



It is easy to use shell after logon. You can execute any command to obtain the shell.
 

Solution:

Too many controllable Variables

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.