This article is a mirror article of machine translation, please click here to jump to the original article.

View: 80106|Reply: 65

[Website O&M] Didcuz memcache+ssrf GETSHELL vulnerability remediation solution

  [Copy link]
Posted on 6/6/2016 2:10:33 PM | | |
Dear Users,
        Yundun detected that your server 1.1.1.1 has a Didcuz memcache+ssrf GETSHELL vulnerability, and has developed a vulnerability patch for you, which can be fixed with one click in the Yundun console. To avoid hackers exploiting this vulnerability, it is recommended that you fix it as soon as possible.
        You can log in to the Cloud Shield-Server Security (Anknight) console here to view and fix it.
Alibaba hinted at the solution to the Discuz memcache+ssrf GETSHELL vulnerability
http://www.itsvse.com/thread-2871-1-1.html
(Source: Code Agriculture Network_Code changes the world, accumulate and achieve yourself!)
Alibaba Cloud's solution is linked above

Vulnerability Name:
Didcuz memcache+ssrf GETSHELL vulnerability
Patch number: 10086
Patch file: /source/function/function_core.php
Patch source: Cloud Shield self-developed
Modify Date: 2016-06-06 13:55:12
Vulnerability description: Discuz has an SSRF vulnerability, which allows an attacker to use SSRF to write WEBSHELL malicious code to disk through memcache mediation when memcache is configured, causing database leakage


This vulnerability was found in Yundun, and the fix file is as follows:


DZ Chinese Simplified gbk patch download:
Tourists, if you want to see the hidden content of this post, pleaseReply



DZ Chinese Simplified UTF-8 Patch Download:
Tourists, if you want to see the hidden content of this post, pleaseReply


Repair Tutorial:

Tourists, if you want to see the hidden content of this post, pleaseReply






Previous:.net uses AgsXMPP to connect with openfire to achieve cross-platform information flow.
Next:[Alibaba Green Network] intelligent pornography detection tool, intelligent identification of pornographic images
Posted on 6/7/2016 12:16:09 PM |

Dear Users,
        Yundun detected that your server 1.1.1.1 has a Didcuz memcache+ssrf GETSHELL vulnerability, and has developed a vulnerability patch for you, which can be fixed with one click in the Yundun console. To avoid hackers exploiting this vulnerability, it is recommended that you fix it as soon as possible.
        You can log in to the Cloud Shield-Server Security (Anknight) console here to view and fix it.


Vulnerability Name:
Didcuz memcache+ssrf GETSHELL vulnerability
Patch number: 10086
Patch file: /source/function/function_core.php
Patch source: Cloud Shield self-developed
Modify Date: 2016-06-06 13:55:12
Vulnerability description: Discuz has an SSRF vulnerability, which allows an attacker to use SSRF to write WEBSHELL malicious code to disk through memcache mediation when memcache is configured, causing database leakage


This vulnerability was found in Yundun, and the fix file is as follows:


DZ Chinese Simplified gbk patch download:
fnf, if you want to see the hidden content of this post, please reply
Posted on 6/9/2016 9:22:02 AM |
if (preg_match("(/|#|\+|%).*(/|#|\+|%)e", $_G['setting']['output']['preg']['search']) !== FALSE) { die("request error"); } $content = preg_replace($_G['setting']['output']['preg']['search'], $_G['setting']['output']['preg']['replace'], $content);
 Landlord| Posted on 6/6/2016 3:09:21 PM |
hexiangjiu posted on 2016-6-6 15:06
It's the upgrade package of the DZ official website, is there any detailed explanation? What about secondary development?

Temporarily turn off the memcached service first
Interim Solution:
Open config_global.php file, line 25




Delete 127.0.0.1 to close memcache and fix the vulnerability.

Posted on 6/6/2016 2:40:17 PM |
Thanks for sharing
Posted on 6/6/2016 2:44:19 PM |
Thanks for the patch
Posted on 6/6/2016 2:46:22 PM |
{:1_1:} {:1_1:} {:1_1:} {:1_1:} {:1_1:} {:1_1:} {:1_1:} {:1_1:} {:1_1:} {:1_1:} {:1_1:} {:1_1:} {:1_1:} {:1_1:} {:1_1:} {:1_1:}
Posted on 6/6/2016 2:48:16 PM |
It's the upgrade package of the DZ official website, is there any detailed explanation? What about secondary development?
Posted on 6/6/2016 2:57:58 PM |
Fix it and take a look
Posted on 6/6/2016 2:59:18 PM |
afafdadf dsafasdfa
Posted on 6/6/2016 3:00:54 PM |
Like 3.1 and 3.2 are common
Posted on 6/6/2016 3:04:06 PM |
Good things, good things
Posted on 6/6/2016 3:05:10 PM |

It's the upgrade package of the DZ official website, is there any detailed explanation? What about secondary development?
Disclaimer:
All software, programming materials or articles published by Code Farmer Network are only for learning and research purposes; The above content shall not be used for commercial or illegal purposes, otherwise, users shall bear all consequences. The information on this site comes from the Internet, and copyright disputes have nothing to do with this site. You must completely delete the above content from your computer within 24 hours of downloading. If you like the program, please support genuine software, purchase registration, and get better genuine services. If there is any infringement, please contact us by email.

Mail To:help@itsvse.com