发新话题
打印

金山KingGate防火墙存在默认配置不当可被控制

金山KingGate防火墙存在默认配置不当可被控制

漏洞概要
缺陷编号:        WooYun-2015-135809
漏洞标题:        金山KingGate防火墙存在默认配置不当可被控制
相关厂商:        金山软件集团
漏洞作者:        路人甲
提交时间:        2015-08-21 18:42
公开时间:        2015-11-24 18:44
漏洞类型:        默认配置不当
危害等级:        高
自评Rank:        10
漏洞状态: 漏洞已经通知厂商但是厂商忽略漏洞
漏洞来源:        http://www.wooyun.org
Tags标签:默认配置不当


漏洞详情披露状态:
2015-08-21:        细节已通知厂商并且等待厂商处理中
2015-08-26:        厂商主动忽略漏洞,细节向第三方安全合作伙伴开放(绿盟科技唐朝安全巡航
2015-10-20:        细节向核心白帽子及相关领域专家公开
2015-10-30:        细节向普通白帽子公开
2015-11-09:        细节向实习白帽子公开
2015-11-24:        细节向公众公开

简要描述:rt
详细说明:由于KingGate防火墙使用zebra路由软件的,这是一款由Cisco自主开发的闭源路由器软件,默认开启2601端口,而且默认密码是zebra



案例:


code 区域金山新版
https://www.qh119.gov.cn/src/system/login.php?login_retry=true
https://115.239.246.102/src/system/login.php?login_retry=true
https://111.1.82.143/src/system/login.php?login_retry=true
https://220.173.107.90/src/system/login.php?login_retry=true
https://59.46.73.106/src/system/login.php?login_retry=true
https://www.xn--3dsz23cqb341isz0akob.com/src/system/login.php?login_retry=true
https://202.103.238.229/src/system/login.php?login_retry=true

金山旧版本
https://116.77.32.13:8443/src/system/login.php
https://116.77.32.3:8443/src/system/login.php
https://116.77.32.4:8443/src/system/login.php
https://222.179.180.74:8443/src/system/login.php
https://116.77.32.11:8443/src/system/login.php
https://210.21.231.102/src/system/login.php
https://116.77.32.12:8443/src/system/login.php
https://116.77.32.10:8443/src/system/login.php
https://116.77.32.2:8443/src/system/login.php
https://120.196.138.212:8443/src/system/login.php
https://218.93.17.154:8443/src/system/login.php
https://218.25.140.137:8443/src/system/login.php
https://124.93.200.105:8443/src/system/login.php
https://218.26.248.71/src/system/login.php
https://211.142.19.11/src/system/login.php
https://202.97.152.130/src/system/login.php
https://www.lt.lskjd.gov.cn/src/system/login.php
https://124.93.200.109:8443/src/system/login.php
https://218.26.24.146:8443/src/system/login.php
https://211.142.24.77:8443/src/system/login.php
https://124.93.200.108:8443/src/system/login.php
https://124.93.200.100:8443/src/system/login.php
https://110.249.216.198/src/system/login.php
https://hbsrfb.gov.cn/src/system/login.php
http://116.95.130.3/src/system/login.php
https://222.74.54.234:8443/src/system/login.php
https://222.74.54.234/src/system/login.php
https://116.95.130.3:8443/src/system/login.php
https://218.21.230.154:8443/src/system/login.php
https://218.26.1.75:8443/src/system/login.php
http://60.210.101.238/src/system/login.php
https://211.142.29.10/src/system/login.php
https://218.26.164.26/src/system/login.php
https://www.yucoffee.com/src/system/login.php
https://en.diyuan.cc/src/system/login.php
https://restartclub.com/src/system/login.php
https://58.22.6.39:8443/src/system/login.php
https://218.26.4.186/src/system/login.php
https://182.151.197.195/src/system/login.php
https://220.193.65.237/src/system/login.php
https://220.193.65.236/src/system/login.php
https://220.193.65.238/src/system/login.php
https://183.6.133.179/src/system/login.php
https://220.166.83.98/src/system/login.php
https://220.193.65.238:8443/src/system/login.php
https://222.169.100.142/src/system/login.php
https://182.151.197.195:8443/src/system/login.php
https://218.56.144.171/src/system/login.php
https://27.195.159.2/src/system/login.php
https://218.56.144.172/src/system/login.php
https://www.taaic.gov.cn/src/system/login.php
https://220.193.65.234:8443/src/system/login.php
https://www.gzzygts.com/src/system/login.php
https://www.zyhsj.com/src/system/login.php
https://58.22.6.40:8443/src/system/login.php
https://218.26.168.72/src/system/login.php
https://www.yczyzz.cn/src/system/login.php
https://218.26.96.71:8443/src/system/login.php
https://218.61.70.246:8443/src/system/login.php
https://222.33.40.27:8443/src/system/login.php
https://183.238.241.46:8443/src/system/login.php
https://61.138.108.74:8443/src/system/login.php
https://61.161.214.62/src/system/login.php
https://125.32.94.203:8443/src/system/login.php

漏洞证明:









修复方案:可否修改密码?

版权声明:转载请注明来源 路人甲@乌云

漏洞回应
厂商回应:
危害等级:无影响厂商忽略

忽略时间:2015-11-24 18:44
厂商回复:
漏洞Rank:15 (WooYun评价)
最新状态:暂无
原文:http://www.wooyun.org/bugs/wooyun-2015-0135809

TOP

发新话题