¡¾·ì϶¹«¸æ¡¿VMware Tanzu Application Service for VMs & Isolation SegmentÐÅϢй¶·ì϶£¨CVE-2023-20891£©

°ä²¼¹¦·ò 2023-07-26

 

Ò»¡¢·ì϶¸ÅÊö

CVE   ID

CVE-2023-20891

·¢ÏÖ¹¦·ò

2023-07-26

Àà    ÐÍ

ÐÅϢй¶

µÈ    ¼¶

ÖÐΣ

¹¥»÷ÏòÁ¿

ÍøÂç

ËùÐèȨÏÞ

µÍ

¹¥»÷¸´ÔÓ¶È

µÍ

Óû§½»»¥

ÎÞ

PoC/EXP

δ¹«¿ª

ÔÚÒ°ÀûÓÃ

δ·¢ÏÖ

 

VMware Tanzu ÀûÓ÷¨Ê½·þÎñÊÇÒ»¸öºÏÓÃÓÚ¹«ÓÐÔÆºÍ˽ÓÐÔÆµÄÀûÓ÷¨Ê½¿ª·¢ºÍ²¿Êðƽ̨ ¡£

7ÔÂ26ÈÕ£¬±¦ÔËÀ³¹Ù·½ÍøÕ¾VSRC¼à²âµ½VMware Tanzu Application Service for VMs £¨TAS for VMs£©ºÍIsolation SegmentÖдæÔÚÐÅϢй¶·ì϶£¨CVE-2023-20891£©£¬¸Ã·ì϶µÄCVSSÆÀ·ÖΪ6.5 ¡£

ºÏÓÃÓÚÐé¹¹»úµÄ VMware Tanzu ÀûÓ÷¨Ê½·þÎñºÍ¸ôÀë¶ÎÔÚ¶à¸ö°æ±¾ÖдæÔÚÐÅϢй¶·ì϶£¬ÓÉÓÚÆ½Ì¨ÏµÍ³ÉóºËÈÕÖ¾ÖÐÒÔÊ®Áù½øÔì±àÂë¼Í¼ʹ´¦£¬ÓÐȨ½Ó¼ûƽ̨ϵͳÉóºËÈÕÖ¾µÄ·ÇÖÎÀíÔ±Óû§£¨Ä¬Èϲ¿ÊðÖзÇÖÎÀíÔ±Óû§ÎÞȨ½Ó¼ûƽ̨ϵͳÉóºËÈÕÖ¾£©Äܹ»½Ó¼ûÊ®Áù½øÔì±àÂëµÄCF APIÖÎÀíԱʹ´¦£¬µ¼ÖÂÃô¸ÐÐÅϢй¶£¬¿ÉÀûÓø÷ìÏ¶ÍÆËͶñÒâÀûÓ÷¨Ê½ ¡£

 

¶þ¡¢Ó°ÏìÁìÓò

VMware Tanzu Application Service for VMs 4.0.x < 4.0.5

VMware Tanzu Application Service for VMs 3.0.x < 3.0.14

VMware Tanzu Application Service for VMs 2.13.x < 2.13.24

VMware Tanzu Application Service for VMs 2.11.x < 2.11.42

Isolation Segment 4.0.x < 4.0.4

Isolation Segment 3.0.x < 3.0.13

Isolation Segment 2.13.x < 2.13.20

Isolation Segment 2.11.x < 2.11.35

 

Èý¡¢°²È«´ëÊ©

3.1 Éý¼¶°æ±¾

Ŀǰ¸Ã·ì϶ÒѾ­½¨¸´£¬ÊÜÓ°ÏìÓû§¿ÉÉý¼¶µ½ÒÔϰ汾£º

VMware Tanzu Application Service for VMs 4.0.x >= 4.0.5

VMware Tanzu Application Service for VMs 3.0.x >= 3.0.14

VMware Tanzu Application Service for VMs 2.13.x >= 2.13.24

VMware Tanzu Application Service for VMs 2.11.x >= 2.11.42

Isolation Segment 4.0.x >= 4.0.4

Isolation Segment 3.0.x >= 3.0.13

Isolation Segment 2.13.x >= 2.13.20

Isolation Segment 2.11.x >= 2.11.35

ÏÂÔØÁ´½Ó£º

https://www.vmware.com/security/advisories/VMSA-2023-0016.html

3.2 һʱ´ëÊ©

ÊÜÓ°ÏìÓû§¿É½øÐÐCF API ÖÎÀíԱʹ´¦ÂÖ»»£¬ÒÔÈ·±£ÍþвÕßÎÞ·¨Ê¹ÓÃÈκÎй¶µÄÃÜÂë ¡£Óйظü¸Ä Cloud Foundry Óû§ÕÊ»§ºÍÉí·ÝÑéÖ¤ (UAA) ÖÎÀíԱʹ´¦£¬¿É²Î¿¼£º

https://community.pivotal.io/s/article/How-to-Change-the-Admin-Password-for-UAA?language=en_US

3.3 ͨÓý¨Òé

l  ¶¨ÆÚ¸üÐÂϵͳ²¹¶¡£¬Ï÷¼õϵͳ·ì϶£¬ÌáÉý·þÎñÆ÷µÄ°²È«ÐÔ ¡£

l  ¼ÓǿϵͳºÍÍøÂçµÄ½Ó¼û½ÚÔ죬Åú¸Ä·À»ðǽսÊõ£¬¹Ø¹Ø·Ç±ØÒªµÄÀûÓö˿ڻò·þÎñ£¬Ï÷¼õ½«Î£ÏÕ·þÎñ£¨ÈçSSH¡¢RDPµÈ£©Â¶³öµ½¹«Íø£¬Ï÷¼õ¹¥»÷Ãæ ¡£

l  ʹÓÃÆóÒµ¼¶°²È«²úÆ·£¬ÌáÉýÆóÒµµÄÍøÂ簲ȫ»úÄÜ ¡£

l  ¼ÓǿϵͳÓû§ºÍȨÏÞÖÎÀí£¬ÆôÓöà³É·ÖÈÏÖ¤»úÔìºÍ×îÓ×ȨÏÞ×¼Ôò£¬Óû§ºÍÈí¼þȨÏÞӦά³ÖÔÚ×îµÍÏÞ¶È ¡£

l  ÆôÓÃÇ¿ÃÜÂëÕ½Êõ²¢ÉèÖÃΪ¶¨ÆÚÅú¸Ä ¡£

3.4 ²Î¿¼Á´½Ó

https://www.vmware.com/security/advisories/VMSA-2023-0016.html

https://www.bleepingcomputer.com/news/security/vmware-fixes-bug-exposing-cf-api-admin-credentials-in-audit-logs/

 

ËÄ¡¢°æ±¾ÐÅÏ¢

°æ±¾

ÈÕÆÚ

±¸×¢

V1.0

2023-07-26

³õ´Î°ä²¼

 

Îå¡¢¸½Â¼

5.1 ±¦ÔËÀ³¹Ù·½ÍøÕ¾¼ò½é

±¦ÔËÀ³¹Ù·½ÍøÕ¾³ÉÁ¢ÓÚ1996Ä꣬ÊÇÓÉÁôÃÀ²©Ê¿ÑÏÍû¼ÑŮʿ´´½¨µÄ¡¢Õ¼ÓÐÆëÈ«×ÔÖ÷֪ʶ²úȨµÄÐÅÏ¢°²È«¸ß¿Æ¼¼ÆóÒµ ¡£ÊǹúÄÚ×î¾ßʵÁ¦µÄÐÅÏ¢°²È«²úÆ·¡¢°²È«·þÎñ½â¾ö¹æ»®µÄÁ캽ÆóÒµÖ®Ò» ¡£

¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°±¦ÔËÀ³¹Ù·½ÍøÕ¾´óÏ㬹«Ë¾Ô±¹¤6000ÓàÈË£¬Ñз¢ÍŶÓ1200ÓàÈË, ¼¼Êõ·þÎñÍŶÓ1300ÓàÈË ¡£ÔÚÈ«¹ú¸÷Ê¡¡¢ÊÓ×¢×ÔÖÎÇøÉèÁ¢·ÖÖ§»ú¹¹ÁùÊ®¶à¸ö£¬Õ¼Óи²¸ÇÈ«¹úµÄÏúÊÛϵͳ¡¢Çþ·ϵͳºÍ¼¼ÊõÖ§³Öϵͳ ¡£¹«Ë¾ÓÚ2010Äê6ÔÂ23ÈÕÔÚÀö½­ÖÐÓ×°å¹ÒÅÆÉÏÊÐ ¡££¨¹ÉƱ´úÂ룺002439£©

¶àÄêÀ´£¬±¦ÔËÀ³¹Ù·½ÍøÕ¾ÖÂÁ¦ÓÚÌṩӵÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷´´Ðµİ²È«²úÆ·ºÍ×î¼Ñʵ¼Ê·þÎñ£¬Ô®ÊÖ¿Í»§È«ÃæÌáÉýÆäIT»ù´¡ÉèÊ©µÄ°²È«ÐԺͳö²úЧÁ¦£¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢°²È«²úÒµÁì¾üÆ·ÅÆ¶ø²»Ð¸ÖÂÁ¦ ¡£

5.2 ¹ØÓÚ±¦ÔËÀ³¹Ù·½ÍøÕ¾

±¦ÔËÀ³¹Ù·½ÍøÕ¾°²È«Ó¦¼±ÏìÓ¦ÖÐÐÄÒѰ䲼1000¶à¸ö·ì϶¹«¸æÎ¢·çÏÕÔ¤¾¯£¬ÎÒÃǽ«³ÖÐø¸ú×ÙÈ«Çò×îеÄÍøÂ簲ȫÊÂÎñºÍ·ì϶£¬ÎªÆóÒµµÄÐÅÏ¢°²È«±£¼Ý»¤º½ ¡£

¹Ø×¢ÎÒÃÇ£º

image.png