CVE-2020-4703 | Spectrum Protect Plusí§Òâ´úÂëÖ´ÐÐÎó²îͨ¸æ
Ðû²¼Ê±¼ä 2020-09-160x00 Îó²î¸ÅÊö
²úÆ·Ãû³Æ | CVE ID | Àà ÐÍ | Îó²îÆ·¼¶ | Ô¶³ÌʹÓà | Ó°Ïì¹æÄ£ |
IBM Spectrum Protect Plus | CVE-2020-4703 | í§Òâ´úÂëÖ´ÐÐ | ¸ßΣ | ÊÇ | 10.1.0-10.1.6°æ±¾ |
IBM Spectrum Protect PlusÊÇÓÃÓÚÐéÄâÇéÐεÄÊý¾Ý±£»£»£»¤ºÍ¿ÉÓÃÐÔ½â¾ö¼Æ»®£¬£¬£¬¿ÉÔÚ¼¸·ÖÖÓÄÚÍê³É°²ÅÅ£¬£¬£¬²¢ÔÚһСʱÄÚΪÇéÐÎÌṩ±£»£»£»¤¡£¡£¡£Ëü½«Êý¾Ý±£»£»£»¤»¯·±Îª¼ò£¬£¬£¬ÎÞÂÛÊÇ´æ´¢ÔÚÎïÀíÇéÐΡ¢ÐéÄâÇéÐΡ¢Èí¼þ½ç˵µÄÇéÐÎÕÕ¾ÉÔÆÇéÐÎÖеÄÊý¾Ý¶¼ÊÇÔÆÔÆ¡£¡£¡£Ëü¿É×÷Ϊ×ÔÁ¦½â¾ö¼Æ»®À´ÊµÑ飬£¬£¬»òÕßÓë IBM Spectrum Protect ÇéÐμ¯³É£¬£¬£¬´Ó¶ø´ó¹æÄ£¸ßÐ§×ªÒÆ¸±±¾ÓÃÓÚºã¾Ã´æ´¢ºÍÊý¾Ýî¿Ïµ¡£¡£¡£
2020Äê9ÔÂ14ÈÕ£¬£¬£¬IBM¹Ù·½Ðû²¼ÆäSpectrum Protect PlusµÄÖÎÀí¿ØÖÆÌ¨Öб£´æÒ»¸öµÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2020-4703£©£¬£¬£¬¸ÃÎó²îÊÇÓÉÓÚ6ÔÂÅû¶µÄÒ»¸ö¸ßΣÎó²îCVE-2020-4470µÄÐÞ¸´²»ÍêÕûÔì³ÉµÄ¡£¡£¡£ÆäCVSSÆÀ·ÖΪ8¡£¡£¡£
0x01 Îó²îÏêÇé
CVE-2020-4470ÊÇIBM Spectrum Protect Plus 10.1.0µ½10.1.5°æ±¾Öб£´æµÄÒ»¸öí§Òâ´úÂëÖ´ÐÐÎó²î¡£¡£¡£ÀÖ³ÉʹÓøÃÎó²îµÄ¹¥»÷Õß¿ÉÒÔÉÏ´«í§ÒâÎļþµ½Ò×Êܹ¥»÷µÄЧÀÍÆ÷ÉÏÖ´ÐÐí§Òâ´úÂë¡£¡£¡£CVE-2020-4770Îó²îʹÓÃÐèÒªÁ½¸ö°ì·¨¡£¡£¡£
µÚÒ»²½ÊÇͨ¹ýÏòURL¶Ëµãhttps://<spp_host>:8090/api/plugin·¢ËÍHTTP POSTÐÂÎÅ£¬£¬£¬½«¶ñÒâµÄRPMÈí¼þ°üÉÏ´«µ½ÖÎÀíÔ±ÕÊ»§¿ÉдµÄĿ¼ÖС£¡£¡£
µÚ¶þ²½ÊÇͨ¹ýÏòURL¶Ëµãhttp://<spp_host>:8090/emi/api/hotfix·¢ËÍHTTP POSTÐÂÎÅÀ´×°ÖöñÒâRPM°ü¡£¡£¡£
ÔÚÒ×Êܹ¥»÷µÄЧÀÍÆ÷ÉÏ£¬£¬£¬Á½¸ö°ì·¨¶¼²»ÐèÒªÉí·ÝÑéÖ¤¡£¡£¡£CVE-2020-4470µÄÐÞ¸´³ÌÐò½öͨ¹ý¶Ô/emi/api/hotfix¶ËµãÇ¿ÖÆÖ´ÐÐÉí·ÝÑéÖ¤À´½â¾öµÚ¶þ¸ö°ì·¨¡£¡£¡£ËüÈÔÈ»ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄí§ÒâÎļþÉÏ´«µ½ÖÎÀíÔ±ÕÊ»§¿ÉдµÄĿ¼²¢ÔÚ¸ÃĿ¼ÏÂÔËÐС£¡£¡£Õâµ¼Ö¶ñÒâ¹¥»÷Õß¿ÉÓëCVE-2020-4711Îó²îÁ¬ÏµÊ¹Ó㬣¬£¬½«ÈκÎÎļþÉÏ´«µ½Ð§ÀÍÆ÷µÄí§ÒâĿ¼£¬£¬£¬´Ó¶øµ¼ÖÂδ¾Éí·ÝÑéÖ¤µÄRCE¡£¡£¡£
¸ÃÎó²îµÄPoCÈçÏ£º
±¾´ÎIBM»¹ÐÞ¸´ÁËSpectrum Protect PlusµÄÒ»¸öĿ¼±éÀúÎó²î£¨CVE-2020-4711£©¡£¡£¡£
CVE-2020-4711ÊÇSpectrum Protect PlusµÄ¾ç±¾/opt/ECX/tools/scripts/restore_wrapper.shÖеÄÒ»¸öĿ¼±éÀúÎó²î¡£¡£¡£¸ÃÎó²îÊÇÓÉÓÚĿ¼·¾¶µÄ¼ì²é±»Èƹý¡£¡£¡£
δ¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉÒÔͨ¹ýÏòURL¶Ëµãhttps://<spp_host>:8090/catalogmanager/api/catalog·¢ËÍÌØÖÆµÄHTTPÇëÇóÀ´Ê¹ÓôËÎÊÌ⣬£¬£¬µ±cmode²ÎÊýΪrestorefromjobʱ£¬£¬£¬²»ÐèÒªÉí·ÝÑéÖ¤£º
¶Ëµã´¦Öóͷ£³ÌÐòŲÓÃcom.catalogic.ecx.catalogmanager.domain.CatalogManagerServiceImpl.restoreFromJobÒªÁ죬£¬£¬¶øÎÞÐè¼ì²éÓû§Æ¾Ö¤¡£¡£¡£restoreFromJobÒªÁìÒÔrootÓû§Éí·ÝÖ´ÐÐ/opt/ECX/tools/scripts/restore_wrapper.sh¾ç±¾£¬£¬£¬½«¹¥»÷Õß¿ØÖƵÄHTTP²ÎÊýctarget / cRestoreTargetת´ï¸ø¸Ã¾ç±¾£º
Õâʹ¹¥»÷Õß¿ÉÒÔͨ¹ý·¾¶±éÀúÖ´ÐÐchmod -R 777£º
0x02 ´¦Öóͷ£½¨Òé
ÏÖÔÚ£¬£¬£¬IBM¹Ù·½ÒѾÐû²¼ÔÝʱÐÞ¶©°æ±¾£¬£¬£¬½¨Ò龡¿ì¾ÙÐÐÇå¾²¸üС£¡£¡£
ÏÂÔØÁ´½Ó¼°×°ÖÃ˵Ã÷£º
https://www.ibm.com/support/pages/node/6254732
0x03 Ïà¹ØÐÂÎÅ
https://threatpost.com/rce-exploit-ibm-data-risk-manager-no-patch/154986/
0x04 ²Î¿¼Á´½Ó
https://www.ibm.com/support/pages/node/6328867
https://www.tenable.com/cve/CVE-2020-4470
https://zh-cn.tenable.com/security/research/tra-2020-54?tns_redirect=true
0x05 ʱ¼äÏß
2020-09-14 IBMÐû²¼Îó²îͨ¸æ
2020-09-16 VSRCÐû²¼Ç徲ͨ¸æ