¡¾Îó²îͨ¸æ¡¿VMware Tanzu Application Service for VMs & Isolation SegmentÐÅϢй¶Îó²î£¨CVE-2023-20891£©

Ðû²¼Ê±¼ä 2023-07-26

 

Ò»¡¢Îó²î¸ÅÊö

CVE   ID

CVE-2023-20891

·¢Ã÷ʱ¼ä

2023-07-26

Àà    ÐÍ

ÐÅϢй¶

µÈ    ¼¶

ÖÐΣ

¹¥»÷ÏòÁ¿

ÍøÂç

ËùÐèȨÏÞ

µÍ

¹¥»÷ÖØÆ¯ºó

µÍ

Óû§½»»¥

ÎÞ

PoC/EXP

δ¹ûÕæ

ÔÚҰʹÓÃ

δ·¢Ã÷

 

VMware Tanzu Ó¦ÓóÌÐòЧÀÍÊÇÒ»¸öÊÊÓÃÓÚ¹«ÓÐÔÆºÍ˽ÓÐÔÆµÄÓ¦ÓóÌÐò¿ª·¢ºÍ°²ÅÅÆ½Ì¨¡£¡£¡£¡£

7ÔÂ26ÈÕ£¬£¬£¬c7c7ÓéÀÖÆ½Ì¨VSRC¼à²âµ½VMware Tanzu Application Service for VMs £¨TAS for VMs£©ºÍIsolation SegmentÖб£´æÐÅϢй¶Îó²î£¨CVE-2023-20891£©£¬£¬£¬¸ÃÎó²îµÄCVSSÆÀ·ÖΪ6.5¡£¡£¡£¡£

ÊÊÓÃÓÚÐéÄâ»úµÄ VMware Tanzu Ó¦ÓóÌÐòЧÀͺ͸ôÀë¶ÎÔÚ¶à¸ö°æ±¾Öб£´æÐÅϢй¶Îó²î£¬£¬£¬ÓÉÓÚÆ½Ì¨ÏµÍ³ÉóºËÈÕÖ¾ÖÐÒÔÊ®Áù½øÖƱàÂë¼Í¼ƾ֤£¬£¬£¬ÓÐȨ»á¼ûƽ̨ϵͳÉóºËÈÕÖ¾µÄ·ÇÖÎÀíÔ±Óû§£¨Ä¬Èϰ²ÅÅÖзÇÖÎÀíÔ±Óû§ÎÞȨ»á¼ûƽ̨ϵͳÉóºËÈÕÖ¾£©¿ÉÒÔ»á¼ûÊ®Áù½øÖƱàÂëµÄCF APIÖÎÀíԱƾ֤£¬£¬£¬µ¼ÖÂÃô¸ÐÐÅϢй¶£¬£¬£¬¿ÉʹÓøÃÎó²îÍÆËͶñÒâÓ¦ÓóÌÐò¡£¡£¡£¡£

 

¶þ¡¢Ó°Ïì¹æÄ£

VMware Tanzu Application Service for VMs 4.0.x < 4.0.5

VMware Tanzu Application Service for VMs 3.0.x < 3.0.14

VMware Tanzu Application Service for VMs 2.13.x < 2.13.24

VMware Tanzu Application Service for VMs 2.11.x < 2.11.42

Isolation Segment 4.0.x < 4.0.4

Isolation Segment 3.0.x < 3.0.13

Isolation Segment 2.13.x < 2.13.20

Isolation Segment 2.11.x < 2.11.35

 

Èý¡¢Çå¾²²½·¥

3.1 Éý¼¶°æ±¾

ÏÖÔÚ¸ÃÎó²îÒѾ­ÐÞ¸´£¬£¬£¬ÊÜÓ°ÏìÓû§¿ÉÉý¼¶µ½ÒÔϰ汾£º

VMware Tanzu Application Service for VMs 4.0.x >= 4.0.5

VMware Tanzu Application Service for VMs 3.0.x >= 3.0.14

VMware Tanzu Application Service for VMs 2.13.x >= 2.13.24

VMware Tanzu Application Service for VMs 2.11.x >= 2.11.42

Isolation Segment 4.0.x >= 4.0.4

Isolation Segment 3.0.x >= 3.0.13

Isolation Segment 2.13.x >= 2.13.20

Isolation Segment 2.11.x >= 2.11.35

ÏÂÔØÁ´½Ó£º

https://www.vmware.com/security/advisories/VMSA-2023-0016.html

3.2 ÔÝʱ²½·¥

ÊÜÓ°ÏìÓû§¿É¾ÙÐÐCF API ÖÎÀíԱƾ֤ÂÖ»»£¬£¬£¬ÒÔÈ·±£ÍþвÕßÎÞ·¨Ê¹ÓÃÈκÎй¶µÄÃÜÂë¡£¡£¡£¡£Óйظü¸Ä Cloud Foundry Óû§ÕÊ»§ºÍÉí·ÝÑéÖ¤ (UAA) ÖÎÀíԱƾ֤£¬£¬£¬¿É²Î¿¼£º

https://community.pivotal.io/s/article/How-to-Change-the-Admin-Password-for-UAA?language=en_US

3.3 ͨÓý¨Òé

l  °´ÆÚ¸üÐÂϵͳ²¹¶¡£¬£¬£¬ïÔ̭ϵͳÎó²î£¬£¬£¬ÌáÉýЧÀÍÆ÷µÄÇå¾²ÐÔ¡£¡£¡£¡£

l  ÔöǿϵͳºÍÍøÂçµÄ»á¼û¿ØÖÆ£¬£¬£¬Ð޸ķÀ»ðǽսÂÔ£¬£¬£¬¹Ø±Õ·ÇÐëÒªµÄÓ¦Óö˿ڻòЧÀÍ£¬£¬£¬ïÔÌ­½«Î£ÏÕЧÀÍ£¨ÈçSSH¡¢RDPµÈ£©Ì»Â¶µ½¹«Íø£¬£¬£¬ïÔÌ­¹¥»÷Ãæ¡£¡£¡£¡£

l  ʹÓÃÆóÒµ¼¶Çå¾²²úÆ·£¬£¬£¬ÌáÉýÆóÒµµÄÍøÂçÇå¾²ÐÔÄÜ¡£¡£¡£¡£

l  ÔöǿϵͳÓû§ºÍȨÏÞÖÎÀí£¬£¬£¬ÆôÓöàÒòËØÈÏÖ¤»úÖÆºÍ×îСȨÏÞÔ­Ôò£¬£¬£¬Óû§ºÍÈí¼þȨÏÞÓ¦¼á³ÖÔÚ×îµÍÏÞ¶È¡£¡£¡£¡£

l  ÆôÓÃÇ¿ÃÜÂëÕ½ÂÔ²¢ÉèÖÃΪ°´ÆÚÐ޸ġ£¡£¡£¡£

3.4 ²Î¿¼Á´½Ó

https://www.vmware.com/security/advisories/VMSA-2023-0016.html

https://www.bleepingcomputer.com/news/security/vmware-fixes-bug-exposing-cf-api-admin-credentials-in-audit-logs/

 

ËÄ¡¢°æ±¾ÐÅÏ¢

°æ±¾

ÈÕÆÚ

±¸×¢

V1.0

2023-07-26

Ê×´ÎÐû²¼

 

Îå¡¢¸½Â¼

5.1 c7c7ÓéÀÖÆ½Ì¨¼ò½é

c7c7ÓéÀÖÆ½Ì¨½¨ÉèÓÚ1996Ä꣬£¬£¬ÊÇÓÉÁôÃÀ²©Ê¿ÑÏÍû¼ÑŮʿ½¨ÉèµÄ¡¢ÓµÓÐÍêÈ«×ÔÖ÷֪ʶ²úȨµÄÐÅÏ¢Çå¾²¸ß¿Æ¼¼ÆóÒµ¡£¡£¡£¡£ÊǺ£ÄÚ×î¾ßʵÁ¦µÄÐÅÏ¢Çå¾²²úÆ·¡¢Ç徲ЧÀͽâ¾ö¼Æ»®µÄÁ캽ÆóÒµÖ®Ò»¡£¡£¡£¡£

¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°c7c7ÓéÀÖÆ½Ì¨´óÏ㬣¬£¬¹«Ë¾Ô±¹¤6000ÓàÈË£¬£¬£¬Ñз¢ÍŶÓ1200ÓàÈË, ÊÖÒÕЧÀÍÍŶÓ1300ÓàÈË¡£¡£¡£¡£ÔÚÌìϸ÷Ê¡¡¢ÊС¢×ÔÖÎÇøÉèÁ¢·ÖÖ§»ú¹¹ÁùÊ®¶à¸ö£¬£¬£¬ÓµÓÐÁýÕÖÌìϵÄÏúÊÛϵͳ¡¢ÇþµÀϵͳºÍÊÖÒÕÖ§³Öϵͳ¡£¡£¡£¡£¹«Ë¾ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉîÛÚÖÐС°å¹ÒÅÆÉÏÊС£¡£¡£¡££¨¹ÉƱ´úÂ룺002439£©

¶àÄêÀ´£¬£¬£¬c7c7ÓéÀÖÆ½Ì¨ÖÂÁ¦ÓÚÌṩ¾ßÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷Á¢ÒìµÄÇå¾²²úÆ·ºÍ×î¼Ñʵ¼ùЧÀÍ£¬£¬£¬×ÊÖú¿Í»§ÖÜÈ«ÌáÉýÆäIT»ù´¡ÉèÊ©µÄÇå¾²ÐÔºÍÉú²úЧÄÜ£¬£¬£¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢Çå¾²¹¤ÒµÁì¾üÆ·ÅÆ¶ø²»Ð¸Æð¾¢¡£¡£¡£¡£

5.2 ¹ØÓÚc7c7ÓéÀÖÆ½Ì¨

c7c7ÓéÀÖÆ½Ì¨Çå¾²Ó¦¼±ÏìÓ¦ÖÐÐÄÒÑÐû²¼1000¶à¸öÎó²îͨ¸æºÍΣº¦Ô¤¾¯£¬£¬£¬ÎÒÃǽ«Ò»Á¬¸ú×ÙÈ«Çò×îеÄÍøÂçÇå¾²ÊÂÎñºÍÎó²î£¬£¬£¬ÎªÆóÒµµÄÐÅÏ¢Çå¾²±£¼Ý»¤º½¡£¡£¡£¡£

¹Ø×¢ÎÒÃÇ£º

image.png