¡¾Â©¶´Í¨¸æ¡¿VMware Tanzu Application Service for VMs & Isolation SegmentÐÅϢй¶©¶´£¨CVE-2023-20891£©

Ðû²¼Ê±¼ä 2023-07-26

 

Ò»¡¢Â©¶´¸ÅÊö

CVE   ID

CVE-2023-20891

·¢ÏÖʱ¼ä

2023-07-26

Àà    ÐÍ

ÐÅϢй¶

µÈ    ¼¶

ÖÐΣ

¹¥»÷ÏòÁ¿

ÍøÂç

ËùÐèȨÏÞ

µÍ

¹¥»÷ÅÓ´ó¶È

µÍ

Óû§½»»¥

ÎÞ

PoC/EXP

δ¹ûÈ»

ÔÚÒ°ÀûÓÃ

δ·¢ÏÖ

 

VMware Tanzu Ó¦Ó÷¨Ê½·þÎñÊÇÒ»¸öÊÊÓÃÓÚ¹«ÓÐÔÆºÍ˽ÓÐÔÆµÄÓ¦Ó÷¨Ê½¿ª·¢ºÍ²¿Êðƽ̨¡£

7ÔÂ26ÈÕ£¬¶«É­Æ½Ì¨VSRC¼à²âµ½VMware Tanzu Application Service for VMs £¨TAS for VMs£©ºÍIsolation SegmentÖдæÔÚÐÅϢй¶©¶´£¨CVE-2023-20891£©£¬¸Ã©¶´µÄCVSSÆÀ·ÖΪ6.5¡£

ÊÊÓÃÓÚÐéÄâ»úµÄ VMware Tanzu Ó¦Ó÷¨Ê½·þÎñºÍ¸ôÀë¶ÎÔÚ¶à¸ö°æ±¾ÖдæÔÚÐÅϢй¶©¶´£¬ÓÉÓÚÆ½Ì¨ÏµÍ³ÉóºËÈÕÖ¾ÖÐÒÔÊ®Áù½øÖƱàÂë¼Ç¼ƾ¾Ý£¬ÓÐȨ·ÃÎÊÆ½Ì¨ÏµÍ³ÉóºËÈÕÖ¾µÄ·Ç¹ÜÀíÔ±Óû§£¨Ä¬Èϲ¿ÊðÖзǹÜÀíÔ±Óû§ÎÞȨ·ÃÎÊÆ½Ì¨ÏµÍ³ÉóºËÈÕÖ¾£©¿ÉÒÔ·ÃÎÊÊ®Áù½øÖƱàÂëµÄCF API¹ÜÀíԱƾ¾Ý£¬µ¼ÖÂÃô¸ÐÐÅϢй¶£¬¿ÉÀûÓøÃ©¶´ÍÆËͶñÒâÓ¦Ó÷¨Ê½¡£

 

¶þ¡¢Ó°Ï췶Χ

VMware Tanzu Application Service for VMs 4.0.x < 4.0.5

VMware Tanzu Application Service for VMs 3.0.x < 3.0.14

VMware Tanzu Application Service for VMs 2.13.x < 2.13.24

VMware Tanzu Application Service for VMs 2.11.x < 2.11.42

Isolation Segment 4.0.x < 4.0.4

Isolation Segment 3.0.x < 3.0.13

Isolation Segment 2.13.x < 2.13.20

Isolation Segment 2.11.x < 2.11.35

 

Èý¡¢Äþ¾²´ëÊ©

3.1 Éý¼¶°æ±¾

Ŀǰ¸Ã©¶´ÒѾ­ÐÞ¸´£¬ÊÜÓ°ÏìÓû§¿ÉÉý¼¶µ½ÒÔϰ汾£º

VMware Tanzu Application Service for VMs 4.0.x >= 4.0.5

VMware Tanzu Application Service for VMs 3.0.x >= 3.0.14

VMware Tanzu Application Service for VMs 2.13.x >= 2.13.24

VMware Tanzu Application Service for VMs 2.11.x >= 2.11.42

Isolation Segment 4.0.x >= 4.0.4

Isolation Segment 3.0.x >= 3.0.13

Isolation Segment 2.13.x >= 2.13.20

Isolation Segment 2.11.x >= 2.11.35

ÏÂÔØÁ´½Ó£º

https://www.vmware.com/security/advisories/VMSA-2023-0016.html

3.2 ÁÙʱ´ëÊ©

ÊÜÓ°ÏìÓû§¿É½øÐÐCF API ¹ÜÀíԱƾ¾ÝÂÖ»»£¬ÒÔÈ·±£ÍþвÕßÎÞ·¨Ê¹ÓÃÈκÎй¶µÄÃÜÂë¡£Óйظü¸Ä Cloud Foundry Óû§ÕÊ»§ºÍÉí·ÝÑéÖ¤ (UAA) ¹ÜÀíԱƾ¾Ý£¬¿É²Î¿¼£º

https://community.pivotal.io/s/article/How-to-Change-the-Admin-Password-for-UAA?language=en_US

3.3 ͨÓý¨Òé

l  ¶¨ÆÚ¸üÐÂϵͳ²¹¶¡£¬¼õÉÙϵͳ©¶´£¬ÌáÉý·þÎñÆ÷µÄÄþ¾²ÐÔ¡£

l  ¼ÓǿϵͳºÍÍøÂçµÄ·ÃÎÊ¿ØÖÆ£¬Ð޸ķÀ»ðǽ¼ÆÄ±£¬¹Ø±Õ·ÇÐëÒªµÄÓ¦Óö˿ڻò·þÎñ£¬¼õÉÙ½«Î£ÏÕ·þÎñ£¨ÈçSSH¡¢RDPµÈ£©Ì»Â¶µ½¹«Íø£¬¼õÉÙ¹¥»÷Ãæ¡£

l  ʹÓÃÆóÒµ¼¶Äþ¾²²úÎÌáÉýÆóÒµµÄÍøÂçÄþ¾²ÐÔÄÜ¡£

l  ¼ÓǿϵͳÓû§ºÍȨÏÞ¹ÜÀí£¬ÆôÓöàÒòËØÈÏÖ¤»úÖÆºÍ×îСȨÏÞÔ­Ôò£¬Óû§ºÍÈí¼þȨÏÞÓ¦±£³ÖÔÚ×îµÍÏÞ¶È¡£

l  ÆôÓÃÇ¿ÃÜÂë¼ÆÄ±²¢ÉèÖÃΪ¶¨ÆÚÐ޸ġ£

3.4 ²Î¿¼Á´½Ó

https://www.vmware.com/security/advisories/VMSA-2023-0016.html

https://www.bleepingcomputer.com/news/security/vmware-fixes-bug-exposing-cf-api-admin-credentials-in-audit-logs/

 

ËÄ¡¢°æ±¾ÐÅÏ¢

°æ±¾

ÈÕÆÚ

±¸×¢

V1.0

2023-07-26

Ê×´ÎÐû²¼

 

Îå¡¢¸½Â¼

5.1 ¶«É­Æ½Ì¨¼ò½é

¶«É­Æ½Ì¨½¨Á¢ÓÚ1996Ä꣬ÊÇÓÉÁôÃÀ²©Ê¿ÑÏÍû¼ÑŮʿ´´½¨µÄ¡¢ÓµÓÐÍêÈ«×ÔÖ÷֪ʶ²úȨµÄÐÅÏ¢Äþ¾²¸ß¿Æ¼¼ÆóÒµ¡£ÊǹúÄÚ×î¾ßʵÁ¦µÄÐÅÏ¢Äþ¾²²úÎï¡¢Äþ¾²·þÎñ½â¾ö·½°¸µÄÁ캽ÆóÒµÖ®Ò»¡£

¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°¶«É­Æ½Ì¨´óÏ㬹«Ë¾Ô±¹¤6000ÓàÈË£¬Ñз¢ÍŶÓ1200ÓàÈË, ¼¼Êõ·þÎñÍŶÓ1300ÓàÈË¡£ÔÚÈ«¹ú¸÷Ê¡¡¢ÊС¢×ÔÖÎÇøÉèÁ¢·ÖÖ§»ú¹¹ÁùÊ®¶à¸ö£¬ÓµÓÐÁýÕÖÈ«¹úµÄÏúÊÛÌåϵ¡¢ÇþµÀÌåϵºÍ¼¼ÊõÖ§³ÖÌåϵ¡£¹«Ë¾ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉîÛÚÖÐС°å¹ÒÅÆÉÏÊС££¨¹ÉƱ´úÂ룺002439£©

¶àÄêÀ´£¬¶«É­Æ½Ì¨ÖÂÁ¦ÓÚÌṩ¾ßÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷´´ÐµÄÄþ¾²²úÎïºÍ×î¼Ñʵ¼ù·þÎñ£¬×ÊÖú¿Í»§È«ÃæÌáÉýÆäIT»ù´¡ÉèÊ©µÄÄþ¾²ÐÔºÍÉú²úЧÄÜ£¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢Äþ¾²¹¤ÒµÁì¾üÆ·ÅÆ¶ø²»Ð¸Å¬Á¦¡£

5.2 ¹ØÓÚ¶«É­Æ½Ì¨

¶«É­Æ½Ì¨Äþ¾²Ó¦¼±ÏìÓ¦ÖÐÐÄÒÑÐû²¼1000¶à¸ö©¶´Í¨¸æºÍ·çÏÕÔ¤¾¯£¬ÎÒÃǽ«Á¬Ðø¸ú×ÙÈ«Çò×îеÄÍøÂçÄþ¾²Ê¼þºÍ©¶´£¬ÎªÆóÒµµÄÐÅÏ¢Äþ¾²±£¼Ý»¤º½¡£

¹Ø×¢ÎÒÃÇ£º

image.png