Dear Users, Yundun detected that your server 1.1.1.1 has a Didcuz memcache+ssrf GETSHELL vulnerability, and has developed a vulnerability patch for you, which can be fixed with one click in the Yundun console. To avoid hackers exploiting this vulnerability, it is recommended that you fix it as soon as possible. You can log in to the Cloud Shield-Server Security (Anknight) console here to view and fix it. Alibaba hinted at the solution to the Discuz memcache+ssrf GETSHELL vulnerability
http://www.itsvse.com/thread-2871-1-1.html (Source: Code Agriculture Network_Code changes the world, accumulate and achieve yourself!) Alibaba Cloud's solution is linked above
Vulnerability Name: Didcuz memcache+ssrf GETSHELL vulnerability Patch number: 10086 Patch file: /source/function/function_core.php Patch source: Cloud Shield self-developed Modify Date: 2016-06-06 13:55:12 Vulnerability description: Discuz has an SSRF vulnerability, which allows an attacker to use SSRF to write WEBSHELL malicious code to disk through memcache mediation when memcache is configured, causing database leakage
This vulnerability was found in Yundun, and the fix file is as follows:
DZ Chinese Simplified gbk patch download:
Tourists, if you want to see the hidden content of this post, please Reply
DZ Chinese Simplified UTF-8 Patch Download:
Tourists, if you want to see the hidden content of this post, please Reply
Repair Tutorial:
Tourists, if you want to see the hidden content of this post, please Reply
|