CVE-2020-4703 | Spectrum Protect Plusí§Òâ´úÂëÖ´ÐÐÎó²îͨ¸æ

Ðû²¼Ê±¼ä 2020-09-16

0x00 Îó²î¸ÅÊö

²úÆ·Ãû³Æ

CVE ID

Àà ÐÍ

Îó²îÆ·¼¶

Ô¶³ÌʹÓÃ

Ó°Ïì¹æÄ£

IBM Spectrum Protect Plus

CVE-2020-4703

í§Òâ´úÂëÖ´ÐÐ

¸ßΣ

ÊÇ

10.1.0-10.1.6°æ±¾

 

IBM Spectrum Protect PlusÊÇÓÃÓÚÐéÄâÇéÐεÄÊý¾Ý±£»£»£»¤ºÍ¿ÉÓÃÐÔ½â¾ö¼Æ»®£¬ £¬£¬¿ÉÔÚ¼¸·ÖÖÓÄÚÍê³É°²ÅÅ£¬ £¬£¬²¢ÔÚһСʱÄÚΪÇéÐÎÌṩ±£»£»£»¤¡£¡£¡£Ëü½«Êý¾Ý±£»£»£»¤»¯·±Îª¼ò£¬ £¬£¬ÎÞÂÛÊÇ´æ´¢ÔÚÎïÀíÇéÐΡ¢ÐéÄâÇéÐΡ¢Èí¼þ½ç˵µÄÇéÐÎÕÕ¾ÉÔÆÇéÐÎÖеÄÊý¾Ý¶¼ÊÇÔÆÔÆ¡£¡£¡£Ëü¿É×÷Ϊ×ÔÁ¦½â¾ö¼Æ»®À´ÊµÑ飬 £¬£¬»òÕßÓë IBM Spectrum Protect ÇéÐμ¯³É£¬ £¬£¬´Ó¶ø´ó¹æÄ£¸ßÐ§×ªÒÆ¸±±¾ÓÃÓÚºã¾Ã´æ´¢ºÍÊý¾Ýî¿Ïµ¡£¡£¡£

2020Äê9ÔÂ14ÈÕ£¬ £¬£¬IBM¹Ù·½Ðû²¼ÆäSpectrum Protect PlusµÄÖÎÀí¿ØÖÆÌ¨Öб£´æÒ»¸öµÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2020-4703£©£¬ £¬£¬¸ÃÎó²îÊÇÓÉÓÚ6ÔÂÅû¶µÄÒ»¸ö¸ßΣÎó²îCVE-2020-4470µÄÐÞ¸´²»ÍêÕûÔì³ÉµÄ¡£¡£¡£ÆäCVSSÆÀ·ÖΪ8¡£¡£¡£

0x01 Îó²îÏêÇé

image.png 

 

CVE-2020-4470ÊÇIBM Spectrum Protect Plus 10.1.0µ½10.1.5°æ±¾Öб£´æµÄÒ»¸öí§Òâ´úÂëÖ´ÐÐÎó²î¡£¡£¡£ÀÖ³ÉʹÓøÃÎó²îµÄ¹¥»÷Õß¿ÉÒÔÉÏ´«í§ÒâÎļþµ½Ò×Êܹ¥»÷µÄЧÀÍÆ÷ÉÏÖ´ÐÐí§Òâ´úÂë¡£¡£¡£CVE-2020-4770Îó²îʹÓÃÐèÒªÁ½¸ö°ì·¨¡£¡£¡£

µÚÒ»²½ÊÇͨ¹ýÏòURL¶Ëµãhttps://<spp_host>:8090/api/plugin·¢ËÍHTTP POSTÐÂÎÅ£¬ £¬£¬½«¶ñÒâµÄRPMÈí¼þ°üÉÏ´«µ½ÖÎÀíÔ±ÕÊ»§¿ÉдµÄĿ¼ÖС£¡£¡£

µÚ¶þ²½ÊÇͨ¹ýÏòURL¶Ëµãhttp://<spp_host>:8090/emi/api/hotfix·¢ËÍHTTP POSTÐÂÎÅÀ´×°ÖöñÒâRPM°ü¡£¡£¡£

ÔÚÒ×Êܹ¥»÷µÄЧÀÍÆ÷ÉÏ£¬ £¬£¬Á½¸ö°ì·¨¶¼²»ÐèÒªÉí·ÝÑéÖ¤¡£¡£¡£CVE-2020-4470µÄÐÞ¸´³ÌÐò½öͨ¹ý¶Ô/emi/api/hotfix¶ËµãÇ¿ÖÆÖ´ÐÐÉí·ÝÑéÖ¤À´½â¾öµÚ¶þ¸ö°ì·¨¡£¡£¡£ËüÈÔÈ»ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄí§ÒâÎļþÉÏ´«µ½ÖÎÀíÔ±ÕÊ»§¿ÉдµÄĿ¼²¢ÔÚ¸ÃĿ¼ÏÂÔËÐС£¡£¡£Õâµ¼Ö¶ñÒâ¹¥»÷Õß¿ÉÓëCVE-2020-4711Îó²îÁ¬ÏµÊ¹Ó㬠£¬£¬½«ÈκÎÎļþÉÏ´«µ½Ð§ÀÍÆ÷µÄí§ÒâĿ¼£¬ £¬£¬´Ó¶øµ¼ÖÂδ¾­Éí·ÝÑéÖ¤µÄRCE¡£¡£¡£

¸ÃÎó²îµÄPoCÈçÏ£º

image.png 

 

±¾´ÎIBM»¹ÐÞ¸´ÁËSpectrum Protect PlusµÄÒ»¸öĿ¼±éÀúÎó²î£¨CVE-2020-4711£©¡£¡£¡£

CVE-2020-4711ÊÇSpectrum Protect PlusµÄ¾ç±¾/opt/ECX/tools/scripts/restore_wrapper.shÖеÄÒ»¸öĿ¼±éÀúÎó²î¡£¡£¡£¸ÃÎó²îÊÇÓÉÓÚĿ¼·¾¶µÄ¼ì²é±»Èƹý¡£¡£¡£

image.png 

δ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉÒÔͨ¹ýÏòURL¶Ëµãhttps://<spp_host>:8090/catalogmanager/api/catalog·¢ËÍÌØÖÆµÄHTTPÇëÇóÀ´Ê¹ÓôËÎÊÌ⣬ £¬£¬µ±cmode²ÎÊýΪrestorefromjobʱ£¬ £¬£¬²»ÐèÒªÉí·ÝÑéÖ¤£º

image.png 

¶Ëµã´¦Öóͷ£³ÌÐòŲÓÃcom.catalogic.ecx.catalogmanager.domain.CatalogManagerServiceImpl.restoreFromJobÒªÁ죬 £¬£¬¶øÎÞÐè¼ì²éÓû§Æ¾Ö¤¡£¡£¡£restoreFromJobÒªÁìÒÔrootÓû§Éí·ÝÖ´ÐÐ/opt/ECX/tools/scripts/restore_wrapper.sh¾ç±¾£¬ £¬£¬½«¹¥»÷Õß¿ØÖƵÄHTTP²ÎÊýctarget / cRestoreTargetת´ï¸ø¸Ã¾ç±¾£º

image.png 

Õâʹ¹¥»÷Õß¿ÉÒÔͨ¹ý·¾¶±éÀúÖ´ÐÐchmod -R 777£º

image.png 

 

0x02 ´¦Öóͷ£½¨Òé

ÏÖÔÚ£¬ £¬£¬IBM¹Ù·½ÒѾ­Ðû²¼ÔÝʱÐÞ¶©°æ±¾£¬ £¬£¬½¨Ò龡¿ì¾ÙÐÐÇå¾²¸üС£¡£¡£

ÏÂÔØÁ´½Ó¼°×°ÖÃ˵Ã÷£º

https://www.ibm.com/support/pages/node/6254732

0x03 Ïà¹ØÐÂÎÅ

https://threatpost.com/rce-exploit-ibm-data-risk-manager-no-patch/154986/

 

0x04 ²Î¿¼Á´½Ó

https://www.ibm.com/support/pages/node/6328867

https://www.tenable.com/cve/CVE-2020-4470

https://zh-cn.tenable.com/security/research/tra-2020-54?tns_redirect=true

0x05 Ê±¼äÏß

2020-09-1 IBMÐû²¼Îó²îͨ¸æ

2020-09-16  VSRCÐû²¼Ç徲ͨ¸æ

 

image.png