¡¾Îó²îͨ¸æ¡¿Apache HTTP Server 6Ô¶à¸öÇå¾²Îó²î

Ðû²¼Ê±¼ä 2022-06-10

 

0x00 Îó²î¸ÅÊö

2022Äê6ÔÂ8ÈÕ£¬ £¬£¬Apache HTTP ServerÐû²¼ÁËApache HTTP Server 2.4.54°æ±¾£¬ £¬£¬ÐÞ¸´ÁË2.4.53¼°Ö®Ç°°æ±¾ÖеÄ8¸öÇå¾²Îó²î£¬ £¬£¬ÕâЩÎó²î¿ÉÄܵ¼Ö¾ܾøÐ§ÀÍ»òÐÅϢй¶µÈ¡£¡£ ¡£¡£

 

0x01 Îó²îÏêÇé

Apache HTTP ServerÊÇApacheÈí¼þ»ù½ð»áµÄÒ»¸ö¿ª·ÅÔ´´úÂëµÄÍøÒ³Ð§ÀÍÆ÷£¬ £¬£¬ÓÉÓÚÆä¾ßÓÐ¿çÆ½Ì¨ÐÔºÍÇå¾²ÐÔ£¬ £¬£¬±»ÆÕ±éʹÓ㬠£¬£¬ËüÊÇ×îÊ¢ÐеÄWebЧÀÍÆ÷¶ËÈí¼þÖ®Ò»¡£¡£ ¡£¡£

 Apache HTTP Server±¾´ÎÐÞ¸´µÄ8¸öÎó²îÈçÏ£º

CVE-ID

Ãû³Æ

˵Ã÷

ÑÏÖØË®Æ½

Ó°Ïì¹æÄ£

CVE-2022-26377

Apache HTTP   Server mod_proxy_ajpÇëÇó×ß˽Îó²î

Apache HTTP   Server µÄ mod_proxy_ajp ÖÐµÄ HTTP ÇëÇó×ß˽Îó²îÔÊÐí½«ÇëÇó×ß˽µ½Ëüת·¢ÇëÇóµÄ AJP ЧÀÍÆ÷¡£¡£ ¡£¡£

ÖÐΣ

<=2.4.53

CVE-2022-28330

Apache HTTP   Server mod_isapiÔ½½ç¶ÁÈ¡Îó²î

ÔÚWindowsÉϵÄApache HTTP Server  <=   2.4.53ÖУ¬ £¬£¬µ±ÉèÖÃΪÓÃmod_isapiÄ£¿£¿£¿£¿£¿é´¦Öóͷ£ÇëÇóʱ£¬ £¬£¬¿ÉÄܵ¼ÖÂÔ½½ç¶ÁÈ¡¡£¡£ ¡£¡£

µÍΣ

<=2.4.53

CVE-2022-28614

Apache HTTP   Server ap_rwrite() Ô½½ç¶ÁÈ¡Îó²î

ÈôÊÇ¿ÉÒÔʹÓà ap_rwrite() »ò ap_rputs()£¨ÀýÈç mod_luas r:puts() º¯Êý£©Ê¹Ð§ÀÍÆ÷·´Ó¦ºÜÊÇ´óµÄÊäÈ룬 £¬£¬Ôò¿ÉÄܵ¼ÖÂÔ½½ç¶ÁÈ¡¡£¡£ ¡£¡£

µÍΣ

<=2.4.53

CVE-2022-28615

Apache HTTP   Server ap_strcmp_match()Ô½½ç¶ÁÈ¡Îó²î

µ±ÌṩºÜÊÇ´óµÄÊäÈ뻺³åÇøÊ±£¬ £¬£¬¿ÉÄÜ»áÓÉÓÚap_strcmp_match()ÖеÄÔ½½ç¶ÁÈ¡¶øµ¼Ö±ÀÀ £»£»£»£»£»£»òÐÅϢй¶¡£¡£ ¡£¡£

µÍΣ

<=2.4.53

CVE-2022-29404

Apache HTTP   Server mod_lua r:parsebody¾Ü¾øÐ§ÀÍÎó²î

Apache HTTP   Server <=2.4.53ÖУ¬ £¬£¬¶Ôµ÷Óà r:parsebody(0) µÄ lua ¾ç±¾µÄ¶ñÒâÇëÇó¿ÉÄÜ»áÓÉÓÚ¶ÔÊäÈë¾ÞϸûÓÐĬÈÏÏÞÖÆ¶øµ¼Ö¾ܾøÐ§ÀÍ¡£¡£ ¡£¡£

µÍΣ

<=2.4.53

CVE-2022-30522

Apache HTTP   Server mod_sed ¾Ü¾øÐ§ÀÍ

ÈôÊÇApache HTTP Server 2.4.53±»ÉèÖÃΪÔÚmod_sedµÄÊäÈë¿ÉÄܺÜÊÇ´óµÄÇéÐÎÏÂÓÃmod_sed¾ÙÐÐת»»£¬ £¬£¬mod_sed¿ÉÄÜ»á¾ÙÐйý´óµÄÄÚ´æ·ÖÅɲ¢µ¼ÖÂÖÐÖ¹¡£¡£ ¡£¡£

µÍΣ

2.4.53

CVE-2022-30556

Apache HTTP   ServerÐÅϢй¶Îó²î

Apache HTTP   Server <=2.4.53ÖпÉÄÜ»áÏòŲÓÃr:wsread()µÄÓ¦ÓóÌÐò·µ»Ø³¤¶È£¬ £¬£¬¸Ã³¤¶ÈÖ¸ÏòΪ»º³åÇø·ÖÅɵĴ洢¿Õ¼äµÄ×îºó¡£¡£ ¡£¡£

µÍΣ

<=2.4.53

CVE-2022-31813

Apache HTTP   Server mod_proxy X-Forwarded-ForÈÆ¹ýÎó²î

Apache HTTP Server   <=2.4.53ÖпÉÄܲ»»á½«X-Forwarded-*Í··¢Ë͵½»ùÓÚ¿Í»§¶ËConnectionÍ·µÄÖðÌø»úÖÆµÄԴЧÀÍÆ÷¡£¡£ ¡£¡£Õâ¿ÉÄܱ»ÓÃÀ´ÈƹýԴЧÀÍÆ÷/Ó¦ÓóÌÐòÉÏ»ùÓÚIPµÄÈÏÖ¤¡£¡£ ¡£¡£

µÍΣ

<=2.4.53

 

 

0x02 ´¦Öóͷ£½¨Òé

ÏÖÔÚÕâЩÎó²îÒѾ­ÐÞ¸´£¬ £¬£¬ÊÜÓ°ÏìÓû§¿ÉÒÔÉý¼¶¸üе½Apache HTTP Server 2.4.54°æ±¾¡£¡£ ¡£¡£

ÏÂÔØÁ´½Ó£º

https://httpd.apache.org/download.cgi

 

0x03 ²Î¿¼Á´½Ó

https://httpd.apache.org/security/vulnerabilities_24.html

https://www.mail-archive.com/announce@apache.org/msg07360.html

 

0x04 ¸üа汾

°æ±¾

ÈÕÆÚ

ÐÞ¸ÄÄÚÈÝ

V1.0

2022-06-10

Ê×´ÎÐû²¼

 

0x05 ¸½Â¼

c7c7ÓéÀÖÆ½Ì¨¼ò½é

c7c7ÓéÀÖÆ½Ì¨¹«Ë¾½¨ÉèÓÚ1996Ä꣬ £¬£¬²¢ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉî½»ËùÖÐС°åÕýʽ¹ÒÅÆÉÏÊУ¬ £¬£¬ÊǺ£ÄÚ¼«¾ßʵÁ¦µÄ¡¢ÓµÓÐÍêÈ«×ÔÖ÷֪ʶ²úȨµÄÍøÂçÇå¾²²úÆ·¡¢¿ÉÐÅÇå¾²ÖÎÀíÆ½Ì¨¡¢Ç徲ЧÀÍÓë½â¾ö¼Æ»®µÄ×ÛºÏÌṩÉÌ¡£¡£ ¡£¡£

¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°£¬ £¬£¬ÔÚÌìϸ÷Ê¡¡¢ÊС¢×ÔÖÎÇøÉèÓзÖÖ§»ú¹¹£¬ £¬£¬ÓµÓÐÁýÕÖÌìϵÄÇþµÀϵͳºÍÊÖÒÕÖ§³ÖÖÐÐÄ£¬ £¬£¬²¢ÔÚ±±¾©¡¢ÉϺ£¡¢³É¶¼¡¢¹ãÖÝ¡¢³¤É³¡¢º¼ÖÝµÈ¶àµØÉèÓÐÑз¢ÖÐÐÄ¡£¡£ ¡£¡£

¶àÄêÀ´£¬ £¬£¬c7c7ÓéÀÖÆ½Ì¨ÖÂÁ¦ÓÚÌṩ¾ßÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷Á¢ÒìµÄÇå¾²²úÆ·ºÍ×î¼Ñʵ¼ùЧÀÍ£¬ £¬£¬×ÊÖú¿Í»§ÖÜÈ«ÌáÉýÆäIT»ù´¡ÉèÊ©µÄÇå¾²ÐÔºÍÉú²úЧÄÜ£¬ £¬£¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢Çå¾²¹¤ÒµÁì¾üÆ·ÅÆ¶ø²»Ð¸Æð¾¢¡£¡£ ¡£¡£

 

¹ØÓÚc7c7ÓéÀÖÆ½Ì¨

c7c7ÓéÀÖÆ½Ì¨Çå¾²Ó¦¼±ÏìÓ¦ÖÐÐÄÖ÷ÒªÕë¶ÔÖ÷ÒªÇå¾²Îó²îµÄÔ¤¾¯¡¢¸ú×ٺͷÖÏíÈ«Çò×îеÄÍþвÇ鱨ºÍÇå¾²±¨¸æ¡£¡£ ¡£¡£

¹Ø×¢ÒÔϹ«Öںţ¬ £¬£¬»ñȡȫÇò×îÐÂÇå¾²×ÊѶ£º

image.png