¡¾Â©¶´Í¨¸æ¡¿Microsoft Exchange ServerÔ¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2022-41082£©
Ðû²¼Ê±¼ä 2022-10-010x00 ©¶´¸ÅÊö
CVE ID | CVE-2022-41082 | ·¢ÏÖʱ¼ä | 2022-09-30 |
Àà ÐÍ | RCE | µÈ ¼¶ | ¸ßΣ |
Ô¶³ÌÀûÓà | Ó°Ï췶Χ | ||
¹¥»÷ÅÓ´ó¶È | Óû§½»»¥ | ||
PoC/EXP | ÔÚÒ°ÀûÓÃ | ÊÇ |
0x01 ©¶´ÏêÇé
9ÔÂ29ÈÕ£¬Î¢ÈíÄþ¾²ÏìÓ¦ÖÐÐÄÐû²¼Äþ¾²Í¨¸æ£¬¹ûÈ»ÁËMicrosoft Exchange ServerÖÐÒѱ»ÀûÓõÄ2¸ö0 day©¶´£¨ProxyNotShell£©£¬¿ÉÔÚ¾¹ýExchange ServerÉí·ÝÑéÖ¤¶øÇÒ¾ßÓÐ PowerShell ²Ù×÷ȨÏÞµÄÇé¿öÏÂÀûÓÃÕâЩ©¶´£¨×éºÏÀûÓã©Ô¶³ÌÖ´ÐжñÒâ´úÂ룺
CVE-2022-41040£ºMicrosoft Exchange Server·þÎñÆ÷¶ËÇëÇóαÔì (SSRF) ©¶´
CVE-2022-41082£ºMicrosoft Exchange ServerÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©Â©¶´
ĿǰÕâЩ©¶´ÒѾ±»ÀûÓ㬲¢·¢ÏÖÔÚÊÜѬȾµÄ·þÎñÆ÷Éϲ¿Êðwebshell¡£
Ó°Ï췶Χ
Microsoft Exchange Server 2013
Microsoft Exchange Server 2016
Microsoft Exchange Server 2019
0x02 Äþ¾²½¨Òé
΢ÈíÒѾÐû²¼ÁËÏà¹ØÂ©¶´µÄ¿Í»§Ö¸ÄÏ£¬ÊÜÓ°Ïì¿Í»§¿É²Î¿¼ÊµÊ©Ö¸ÄÏÖеĻº½â´ëÊ©£º
1.Microsoft Exchange Online ¿Í»§ÎÞÐè½ÓÄÉÈκÎÐж¯¡£
2.µ±µØ Microsoft Exchange ¿Í»§Ó¦¼ì²ì²¢Ó¦ÓÃÒÔÏ URL ÖØÐ´£¨URL Rewrite£©ËµÃ÷²¢×èֹ̻¶µÄÔ¶³Ì PowerShell ¶Ë¿Ú¡£
»º½â´ëÊ©£ºÔÚ¡°IIS ¹ÜÀíÆ÷ -> ĬÈÏÍøÕ¾ -> ×Ô¶¯·¢ÏÖ -> URL ÖØÐ´ -> ²Ù×÷¡±ÖÐÌí¼Ó×èÖ¹¹æÔò£¬ÒÔ×èÖ¹ÒÑÖªµÄ¹¥»÷ģʽ¡££¨×¢£ºÈç¹ûƾ¾Ý½¨Òé×ÔÐа²×°URLÖØÐ´Ä£¿é£¬¶ÔExchange¹¦Ð§Ã»ÓÐÒÑÖªµÄÓ°Ïì¡££©
²½Ö裺
l ´ò¿ª IIS ¹ÜÀíÆ÷¡£
l Õ¹¿ªÄ¬ÈÏÍøÕ¾¡£
l Ñ¡Ôñ×Ô¶¯·¢ÏÖ¡£
l ÔÚ¹¦Ð§ÊÓͼÖУ¬µ¥»÷ URL ÖØÐ´¡£
l ÔÚÓÒ²àµÄ¡°²Ù×÷¡±´°¸ñÖУ¬µ¥»÷¡°Ìí¼Ó¹æÔò¡±¡£
l Ñ¡ÔñÇëÇó×èÖ¹£¬È»ºóµ¥»÷È·¶¨¡£
l Ìí¼Ó×Ö·û´®¡°.*autodiscover\.json.*\@.*Powershell.*¡±£¨²»°üÂÞÒýºÅ£©£¬È»ºóµ¥»÷¡°È·¶¨¡±¡£
l Õ¹¿ª¹æÔò²¢Ñ¡ÔñģʽΪ¡°.*autodiscover\.json.*\@.*Powershell.*¡±µÄ¹æÔò£¬È»ºóµ¥»÷Ìõ¼þϵı༡£
l ½«Ìõ¼þÊäÈë´Ó {URL} ¸ü¸ÄΪ {REQUEST_URI} ¡£
´ËÍ⣬¾¹ýÈÏÖ¤µÄ¹¥»÷ÕßÈç¹ûÄÜÔÚ´æÔÚ©¶´µÄExchangeϵͳÉÏ·ÃÎÊPowerShell Remoting£¬¾Í¿ÉÒÔÀûÓÃCVE-2022-41082´¥·¢RCE¡£½¨Òé¹ÜÀíÔ±×èÖ¹ÒÔÏÂÔ¶³Ì PowerShell ¶Ë¿ÚÒÔ×èÖ¹¹¥»÷£º
? HTTP£º5985
? HTTPS£º5986
Èç¹ûÏë¼ì²é Exchange ServerÊÇ·ñÒѱ»ÈëÇÖ£¬¹ÜÀíÔ±¿ÉÒÔʹÓÃÒÔÏ·½Ê½£º
1.ÔËÐÐÒÔÏ PowerShell ÃüÁîÀ´É¨Ãè IIS ÈÕÖ¾ÎļþÒÔѰÕÒÈëÇÖ¼£Ïó£º
Get-ChildItem -Recurse -Path
2.ʹÓÃGTSC¿ª·¢µÄËÑË÷¹¤¾ß£¬»ùÓÚexploitÇ©Ãû£¬ËÑË÷ʱ¼ä±ÈʹÓÃpowershellÒª¶Ì¡£
ÏÂÔØÁ´½Ó£ºhttps://github.com/ncsgroupvn/NCSE0Scanner
×¢£º1.ÈôÒѱ»¹¥»÷£¬IIS ÈÕÖ¾ÖпÉÄܼì²âµ½Óë ProxyShell ©¶´¸ñʽÀàËÆµÄÀûÓÃÇëÇó£ºautodiscover/autodiscover.json?@evil.com/
2.»º½â´ëÊ©£¨¸üУ©Ïê¼û²Î¿¼Á´½ÓÖеÄ΢ÈíÄþ¾²Ö¸ÄÏ¡£
0x03 ²Î¿¼Á´½Ó
https://msrc-blog.microsoft.com/2022/09/29/customer-guidance-for-reported-zero-day-vulnerabilities-in-microsoft-exchange-server/
https://gteltsc.vn/blog/warning-new-attack-campaign-utilized-a-new-0day-rce-vulnerability-on-microsoft-exchange-server-12715.html
0x04 °æ±¾ÐÅÏ¢
°æ±¾ | ÈÕÆÚ | ÐÞ¸ÄÄÚÈÝ |
V1.0 | 2022-09-30 | Ê×´ÎÐû²¼ |
0x05 ¸½Â¼
¶«Éƽ̨¼ò½é
¶«Éƽ̨½¨Á¢ÓÚ1996Ä꣬ÊÇÓÉÁôÃÀ²©Ê¿ÑÏÍû¼ÑŮʿ´´½¨µÄ¡¢ÓµÓÐÍêÈ«×ÔÖ÷֪ʶ²úȨµÄÐÅÏ¢Äþ¾²¸ß¿Æ¼¼ÆóÒµ¡£ÊǹúÄÚ×î¾ßʵÁ¦µÄÐÅÏ¢Äþ¾²²úÎï¡¢Äþ¾²·þÎñ½â¾ö·½°¸µÄÁ캽ÆóÒµÖ®Ò»¡£
¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°¶«Éƽ̨´óÏ㬹«Ë¾Ô±¹¤½ü4000ÈË£¬Ñз¢ÍŶÓ1200ÓàÈË, ¼¼Êõ·þÎñÍŶÓ1300ÓàÈË¡£ÔÚÈ«¹ú¸÷Ê¡¡¢ÊС¢×ÔÖÎÇøÉèÁ¢·ÖÖ§»ú¹¹ÁùÊ®¶à¸ö£¬ÓµÓÐÁýÕÖÈ«¹úµÄÏúÊÛÌåϵ¡¢ÇþµÀÌåϵºÍ¼¼ÊõÖ§³ÖÌåϵ¡£¹«Ë¾ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉîÛÚÖÐС°å¹ÒÅÆÉÏÊС££¨¹ÉƱ´úÂ룺002439£©
¶àÄêÀ´£¬¶«Éƽ̨ÖÂÁ¦ÓÚÌṩ¾ßÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷´´ÐµÄÄþ¾²²úÎïºÍ×î¼Ñʵ¼ù·þÎñ£¬×ÊÖú¿Í»§È«ÃæÌáÉýÆäIT»ù´¡ÉèÊ©µÄÄþ¾²ÐÔºÍÉú²úЧÄÜ£¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢Äþ¾²¹¤ÒµÁì¾üÆ·ÅÆ¶ø²»Ð¸Å¬Á¦¡£
¹ØÓÚ¶«Éƽ̨
¶«Éƽ̨Äþ¾²Ó¦¼±ÏìÓ¦ÖÐÐÄÖ÷ÒªÕë¶ÔÖØÒªÄþ¾²Â©¶´µÄÔ¤¾¯¡¢¸ú×ٺͷÖÏíÈ«Çò×îеÄÍþвÇ鱨ºÍÄþ¾²³ÂËß¡£
¹Ø×¢ÒÔϹ«Öںţ¬»ñȡȫÇò×îÐÂÄþ¾²×ÊѶ£º