¡¾Îó²îͨ¸æ¡¿Apache HTTP Server 6Ô¶à¸öÇå¾²Îó²î
Ðû²¼Ê±¼ä 2022-06-10
0x00 Îó²î¸ÅÊö
2022Äê6ÔÂ8ÈÕ£¬£¬£¬Apache HTTP ServerÐû²¼ÁËApache HTTP Server 2.4.54°æ±¾£¬£¬£¬ÐÞ¸´ÁË2.4.53¼°Ö®Ç°°æ±¾ÖеÄ8¸öÇå¾²Îó²î£¬£¬£¬ÕâЩÎó²î¿ÉÄܵ¼Ö¾ܾøÐ§ÀÍ»òÐÅϢй¶µÈ¡£¡£¡£¡£
0x01 Îó²îÏêÇé
Apache HTTP ServerÊÇApacheÈí¼þ»ù½ð»áµÄÒ»¸ö¿ª·ÅÔ´´úÂëµÄÍøÒ³Ð§ÀÍÆ÷£¬£¬£¬ÓÉÓÚÆä¾ßÓÐ¿çÆ½Ì¨ÐÔºÍÇå¾²ÐÔ£¬£¬£¬±»ÆÕ±éʹÓ㬣¬£¬ËüÊÇ×îÊ¢ÐеÄWebЧÀÍÆ÷¶ËÈí¼þÖ®Ò»¡£¡£¡£¡£
Apache HTTP Server±¾´ÎÐÞ¸´µÄ8¸öÎó²îÈçÏ£º
CVE-ID | Ãû³Æ | ˵Ã÷ | ÑÏÖØË®Æ½ | Ó°Ïì¹æÄ£ |
CVE-2022-26377 | Apache HTTP Server mod_proxy_ajpÇëÇó×ß˽Îó²î | Apache HTTP Server µÄ mod_proxy_ajp ÖÐµÄ HTTP ÇëÇó×ß˽Îó²îÔÊÐí½«ÇëÇó×ß˽µ½Ëüת·¢ÇëÇóµÄ AJP ЧÀÍÆ÷¡£¡£¡£¡£ | ÖÐΣ | <=2.4.53 |
CVE-2022-28330 | Apache HTTP Server mod_isapiÔ½½ç¶ÁÈ¡Îó²î | ÔÚWindowsÉϵÄApache HTTP Server <= 2.4.53ÖУ¬£¬£¬µ±ÉèÖÃΪÓÃmod_isapiÄ£¿£¿£¿£¿£¿é´¦Öóͷ£ÇëÇóʱ£¬£¬£¬¿ÉÄܵ¼ÖÂÔ½½ç¶ÁÈ¡¡£¡£¡£¡£ | µÍΣ | <=2.4.53 |
CVE-2022-28614 | Apache HTTP Server ap_rwrite() Ô½½ç¶ÁÈ¡Îó²î | ÈôÊÇ¿ÉÒÔʹÓà ap_rwrite() »ò ap_rputs()£¨ÀýÈç mod_luas r:puts() º¯Êý£©Ê¹Ð§ÀÍÆ÷·´Ó¦ºÜÊÇ´óµÄÊäÈ룬£¬£¬Ôò¿ÉÄܵ¼ÖÂÔ½½ç¶ÁÈ¡¡£¡£¡£¡£ | µÍΣ | <=2.4.53 |
CVE-2022-28615 | Apache HTTP Server ap_strcmp_match()Ô½½ç¶ÁÈ¡Îó²î | µ±ÌṩºÜÊÇ´óµÄÊäÈ뻺³åÇøÊ±£¬£¬£¬¿ÉÄÜ»áÓÉÓÚap_strcmp_match()ÖеÄÔ½½ç¶ÁÈ¡¶øµ¼Ö±ÀÀ£»£»£»£»£»£»òÐÅϢй¶¡£¡£¡£¡£ | µÍΣ | <=2.4.53 |
CVE-2022-29404 | Apache HTTP Server mod_lua r:parsebody¾Ü¾øÐ§ÀÍÎó²î | Apache HTTP Server <=2.4.53ÖУ¬£¬£¬¶Ôµ÷Óà r:parsebody(0) µÄ lua ¾ç±¾µÄ¶ñÒâÇëÇó¿ÉÄÜ»áÓÉÓÚ¶ÔÊäÈë¾ÞϸûÓÐĬÈÏÏÞÖÆ¶øµ¼Ö¾ܾøÐ§ÀÍ¡£¡£¡£¡£ | µÍΣ | <=2.4.53 |
CVE-2022-30522 | Apache HTTP Server mod_sed ¾Ü¾øÐ§ÀÍ | ÈôÊÇApache HTTP Server 2.4.53±»ÉèÖÃΪÔÚmod_sedµÄÊäÈë¿ÉÄܺÜÊÇ´óµÄÇéÐÎÏÂÓÃmod_sed¾ÙÐÐת»»£¬£¬£¬mod_sed¿ÉÄÜ»á¾ÙÐйý´óµÄÄÚ´æ·ÖÅɲ¢µ¼ÖÂÖÐÖ¹¡£¡£¡£¡£ | µÍΣ | 2.4.53 |
CVE-2022-30556 | Apache HTTP ServerÐÅϢй¶Îó²î | Apache HTTP Server <=2.4.53ÖпÉÄÜ»áÏòŲÓÃr:wsread()µÄÓ¦ÓóÌÐò·µ»Ø³¤¶È£¬£¬£¬¸Ã³¤¶ÈÖ¸ÏòΪ»º³åÇø·ÖÅɵĴ洢¿Õ¼äµÄ×îºó¡£¡£¡£¡£ | µÍΣ | <=2.4.53 |
CVE-2022-31813 | Apache HTTP Server mod_proxy X-Forwarded-ForÈÆ¹ýÎó²î | Apache HTTP Server <=2.4.53ÖпÉÄܲ»»á½«X-Forwarded-*Í··¢Ë͵½»ùÓÚ¿Í»§¶ËConnectionÍ·µÄÖðÌø»úÖÆµÄԴЧÀÍÆ÷¡£¡£¡£¡£Õâ¿ÉÄܱ»ÓÃÀ´ÈƹýԴЧÀÍÆ÷/Ó¦ÓóÌÐòÉÏ»ùÓÚIPµÄÈÏÖ¤¡£¡£¡£¡£ | µÍΣ | <=2.4.53 |
0x02 ´¦Öóͷ£½¨Òé
ÏÖÔÚÕâЩÎó²îÒѾÐÞ¸´£¬£¬£¬ÊÜÓ°ÏìÓû§¿ÉÒÔÉý¼¶¸üе½Apache HTTP Server 2.4.54°æ±¾¡£¡£¡£¡£
ÏÂÔØÁ´½Ó£º
https://httpd.apache.org/download.cgi
0x03 ²Î¿¼Á´½Ó
https://httpd.apache.org/security/vulnerabilities_24.html
https://www.mail-archive.com/announce@apache.org/msg07360.html
0x04 ¸üа汾
°æ±¾ | ÈÕÆÚ | ÐÞ¸ÄÄÚÈÝ |
V1.0 | 2022-06-10 | Ê×´ÎÐû²¼ |
0x05 ¸½Â¼
c7c7ÓéÀÖÆ½Ì¨¼ò½é
c7c7ÓéÀÖÆ½Ì¨¹«Ë¾½¨ÉèÓÚ1996Ä꣬£¬£¬²¢ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉî½»ËùÖÐС°åÕýʽ¹ÒÅÆÉÏÊУ¬£¬£¬ÊǺ£ÄÚ¼«¾ßʵÁ¦µÄ¡¢ÓµÓÐÍêÈ«×ÔÖ÷֪ʶ²úȨµÄÍøÂçÇå¾²²úÆ·¡¢¿ÉÐÅÇå¾²ÖÎÀíÆ½Ì¨¡¢Ç徲ЧÀÍÓë½â¾ö¼Æ»®µÄ×ÛºÏÌṩÉÌ¡£¡£¡£¡£
¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°£¬£¬£¬ÔÚÌìϸ÷Ê¡¡¢ÊС¢×ÔÖÎÇøÉèÓзÖÖ§»ú¹¹£¬£¬£¬ÓµÓÐÁýÕÖÌìϵÄÇþµÀϵͳºÍÊÖÒÕÖ§³ÖÖÐÐÄ£¬£¬£¬²¢ÔÚ±±¾©¡¢ÉϺ£¡¢³É¶¼¡¢¹ãÖÝ¡¢³¤É³¡¢º¼ÖÝµÈ¶àµØÉèÓÐÑз¢ÖÐÐÄ¡£¡£¡£¡£
¶àÄêÀ´£¬£¬£¬c7c7ÓéÀÖÆ½Ì¨ÖÂÁ¦ÓÚÌṩ¾ßÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷Á¢ÒìµÄÇå¾²²úÆ·ºÍ×î¼Ñʵ¼ùЧÀÍ£¬£¬£¬×ÊÖú¿Í»§ÖÜÈ«ÌáÉýÆäIT»ù´¡ÉèÊ©µÄÇå¾²ÐÔºÍÉú²úЧÄÜ£¬£¬£¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢Çå¾²¹¤ÒµÁì¾üÆ·ÅÆ¶ø²»Ð¸Æð¾¢¡£¡£¡£¡£
¹ØÓÚc7c7ÓéÀÖÆ½Ì¨
c7c7ÓéÀÖÆ½Ì¨Çå¾²Ó¦¼±ÏìÓ¦ÖÐÐÄÖ÷ÒªÕë¶ÔÖ÷ÒªÇå¾²Îó²îµÄÔ¤¾¯¡¢¸ú×ٺͷÖÏíÈ«Çò×îеÄÍþвÇ鱨ºÍÇå¾²±¨¸æ¡£¡£¡£¡£
¹Ø×¢ÒÔϹ«Öںţ¬£¬£¬»ñȡȫÇò×îÐÂÇå¾²×ÊѶ£º



¾©¹«Íø°²±¸11010802024551ºÅ