¡¾Îó²îͨ¸æ¡¿Progress MOVEit Transfer SQL×¢ÈëÎó²î£¨CVE-2023-34362£©
Ðû²¼Ê±¼ä 2023-06-05Ò»¡¢Îó²î¸ÅÊö
CVE ID | CVE-2023-34362 | ·¢Ã÷ʱ¼ä | 2023-06-02 |
Àà ÐÍ | SQL×¢Èë | µÈ ¼¶ | ¸ßΣ |
¹¥»÷ÏòÁ¿ | ÍøÂç | ËùÐèȨÏÞ | ÎÞ |
¹¥»÷ÖØÆ¯ºó | µÍ | Óû§½»»¥ | ÎÞ |
PoC/EXP | ÔÚҰʹÓà | ÒÑ·¢Ã÷ |
MOVEit TransferÊÇProgressµÄÍйÜÎļþ´«ÊäÓ¦ÓóÌÐò£¬£¬£¬£¬¿ÉÔÚËùÓбê×¼ÐÒé¡¢·À¸Ä¶¯¹¦Ð§¡¢Çå¾²ÐÂÎźͰü½»Á÷¡¢ÒÔ¼°Çå¾²Îļþ¼Ð¹²ÏíÉÏÌṩÇå¾²µÄ SFTP/S ºÍ HTTPS Êý¾Ý´«ÊäЧÀÍ¡£¡£¡£
6ÔÂ2ÈÕ£¬£¬£¬£¬c7c7ÓéÀÖÆ½Ì¨VSRC¼à²âµ½ProgressÐû²¼Ç徲ͨ¸æ£¬£¬£¬£¬Åû¶ÁËProgress MOVEit TransferÖеÄÒ»¸öSQL×¢ÈëÎó²î£¨CVE-2023-34362£©£¬£¬£¬£¬ÏÖÔÚ¸ÃÎó²îÒÑ·¢Ã÷±»Ê¹Óᣡ£¡£
MOVEit Transfer webÓ¦ÓóÌÐòÖб£´æSQL×¢ÈëÎó²î£¬£¬£¬£¬¿ÉÔÚδ¾Éí·ÝÑéÖ¤µÄÇéÐÎÏÂʹÓøÃÎó²î»ñµÃ¶Ô MOVEit Transfer Êý¾Ý¿âµÄδÊÚȨ»á¼û¡¢ÌáÉýȨÏÞ»òÔ¶³ÌÖ´ÐдúÂë¡£¡£¡£
¶þ¡¢Ó°Ïì¹æÄ£
Progress MOVEit Transfer 2021.0.x°æ±¾£º< 2021.0.6 (13.0.6)
Progress MOVEit Transfer 2021.1.x°æ±¾£º< 2021.1.4 (13.1.4)
Progress MOVEit Transfer 2022.0.x°æ±¾£º< 2022.0.4 (14.0.4)
Progress MOVEit Transfer 2022.1.x°æ±¾£º< 2022.1.5 (14.1.5)
Progress MOVEit Transfer 2023.0.x°æ±¾£º< 2023.0.1 (15.0.1)
Progress MOVEit Transfer 2020.1.x°æ±¾
Progress MOVEit Transfer 2020.0.x¼°Ö®Ç°°æ±¾
Èý¡¢Çå¾²²½·¥
3.1 Éý¼¶°æ±¾
ÏÖÔÚ¸ÃÎó²îÒѾÐÞ¸´£¬£¬£¬£¬ÊÜÓ°ÏìÓû§¿ÉÉý¼¶µ½ÒÔϰ汾£º
Progress MOVEit Transfer 2021.0.x°æ±¾£º2021.0.6 (13.0.6)
Progress MOVEit Transfer 2021.1.x°æ±¾£º2021.1.4 (13.1.4)
Progress MOVEit Transfer 2022.0.x°æ±¾£º2022.0.4 (14.0.4)
Progress MOVEit Transfer 2022.1.x°æ±¾£º2022.1.5 (14.1.5)
Progress MOVEit Transfer 2023.0.x°æ±¾£º2023.0.1 (15.0.1)
Progress MOVEit Transfer 2020.1.x°æ±¾£ºÌá¹©ÌØÊâ²¹¶¡
Progress MOVEit Transfer 2020.0.x¼°Ö®Ç°°æ±¾£ºÉý¼¶µ½ÊÜÖ§³Ö°æ±¾
ÏÂÔØÁ´½Ó£º
https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023
3.2 ÔÝʱ²½·¥
1£®Ð޸ķÀ»ðǽ¹æÔòÒԾܾø¶Ë¿Ú 80 ºÍ 443 É쵀 MOVEit Transfer µÄ HTTP ºÍ HTTPs Á÷Á¿£¨Ä³Ð©¹¦Ð§½«Êܵ½Ó°Ï죩£¬£¬£¬£¬Ö±µ½Ó¦Óò¹¶¡¡£¡£¡£
2£®É¾³ýδ¾ÊÚȨµÄÎļþºÍÓû§ÕÊ»§¡¢»òΪÊÜÓ°ÏìµÄϵͳºÍ MOVEit ЧÀÍÕÊ»§ÖØÖÃЧÀÍÕÊ»§Æ¾Ö¤£¬£¬£¬£¬ÏêÇé¿É²Î¿¼¹Ù·½Í¨¸æ¡£¡£¡£
3.3 ͨÓý¨Òé
l °´ÆÚ¸üÐÂϵͳ²¹¶¡£¡£¡£¬£¬£¬£¬ïÔÌϵͳÎó²î£¬£¬£¬£¬ÌáÉýЧÀÍÆ÷µÄÇå¾²ÐÔ¡£¡£¡£
l ÔöǿϵͳºÍÍøÂçµÄ»á¼û¿ØÖÆ£¬£¬£¬£¬Ð޸ķÀ»ðǽսÂÔ£¬£¬£¬£¬¹Ø±Õ·ÇÐëÒªµÄÓ¦Óö˿ڻòЧÀÍ£¬£¬£¬£¬ïÔ̽«Î£ÏÕЧÀÍ£¨ÈçSSH¡¢RDPµÈ£©Ì»Â¶µ½¹«Íø£¬£¬£¬£¬ïÔ̹¥»÷Ãæ¡£¡£¡£
l ʹÓÃÆóÒµ¼¶Çå¾²²úÆ·£¬£¬£¬£¬ÌáÉýÆóÒµµÄÍøÂçÇå¾²ÐÔÄÜ¡£¡£¡£
l ÔöǿϵͳÓû§ºÍȨÏÞÖÎÀí£¬£¬£¬£¬ÆôÓöàÒòËØÈÏÖ¤»úÖÆºÍ×îСȨÏÞÔÔò£¬£¬£¬£¬Óû§ºÍÈí¼þȨÏÞÓ¦¼á³ÖÔÚ×îµÍÏÞ¶È¡£¡£¡£
l ÆôÓÃÇ¿ÃÜÂëÕ½ÂÔ²¢ÉèÖÃΪ°´ÆÚÐ޸ġ£¡£¡£
3.4 ²Î¿¼Á´½Ó
https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023
https://www.bleepingcomputer.com/news/security/cisa-orders-govt-agencies-to-patch-moveit-bug-used-for-data-theft/
ËÄ¡¢°æ±¾ÐÅÏ¢
°æ±¾ | ÈÕÆÚ | ±¸×¢ |
V1.0 | 2023-06-05 | Ê×´ÎÐû²¼ |
Îå¡¢¸½Â¼
5.1 c7c7ÓéÀÖÆ½Ì¨¼ò½é
c7c7ÓéÀÖÆ½Ì¨½¨ÉèÓÚ1996Ä꣬£¬£¬£¬ÊÇÓÉÁôÃÀ²©Ê¿ÑÏÍû¼ÑŮʿ½¨ÉèµÄ¡¢ÓµÓÐÍêÈ«×ÔÖ÷֪ʶ²úȨµÄÐÅÏ¢Çå¾²¸ß¿Æ¼¼ÆóÒµ¡£¡£¡£ÊǺ£ÄÚ×î¾ßʵÁ¦µÄÐÅÏ¢Çå¾²²úÆ·¡¢Ç徲ЧÀͽâ¾ö¼Æ»®µÄÁ캽ÆóÒµÖ®Ò»¡£¡£¡£
¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°c7c7ÓéÀÖÆ½Ì¨´óÏ㬣¬£¬£¬¹«Ë¾Ô±¹¤6000ÓàÈË£¬£¬£¬£¬Ñз¢ÍŶÓ1200ÓàÈË, ÊÖÒÕЧÀÍÍŶÓ1300ÓàÈË¡£¡£¡£ÔÚÌìϸ÷Ê¡¡¢ÊС¢×ÔÖÎÇøÉèÁ¢·ÖÖ§»ú¹¹ÁùÊ®¶à¸ö£¬£¬£¬£¬ÓµÓÐÁýÕÖÌìϵÄÏúÊÛϵͳ¡¢ÇþµÀϵͳºÍÊÖÒÕÖ§³Öϵͳ¡£¡£¡£¹«Ë¾ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉîÛÚÖÐС°å¹ÒÅÆÉÏÊС£¡£¡££¨¹ÉƱ´úÂ룺002439£©
¶àÄêÀ´£¬£¬£¬£¬c7c7ÓéÀÖÆ½Ì¨ÖÂÁ¦ÓÚÌṩ¾ßÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷Á¢ÒìµÄÇå¾²²úÆ·ºÍ×î¼Ñʵ¼ùЧÀÍ£¬£¬£¬£¬×ÊÖú¿Í»§ÖÜÈ«ÌáÉýÆäIT»ù´¡ÉèÊ©µÄÇå¾²ÐÔºÍÉú²úЧÄÜ£¬£¬£¬£¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢Çå¾²¹¤ÒµÁì¾üÆ·ÅÆ¶ø²»Ð¸Æð¾¢¡£¡£¡£
5.2 ¹ØÓÚc7c7ÓéÀÖÆ½Ì¨
c7c7ÓéÀÖÆ½Ì¨Çå¾²Ó¦¼±ÏìÓ¦ÖÐÐÄÒÑÐû²¼1000¶à¸öÎó²îͨ¸æºÍΣº¦Ô¤¾¯£¬£¬£¬£¬ÎÒÃǽ«Ò»Á¬¸ú×ÙÈ«Çò×îеÄÍøÂçÇå¾²ÊÂÎñºÍÎó²î£¬£¬£¬£¬ÎªÆóÒµµÄÐÅÏ¢Çå¾²±£¼Ý»¤º½¡£¡£¡£
¹Ø×¢ÎÒÃÇ£º



¾©¹«Íø°²±¸11010802024551ºÅ