¡¾Îó²îͨ¸æ¡¿Apache HTTP Server 6Ô¶à¸öÇå¾²Îó²î
Ðû²¼Ê±¼ä 2022-06-10
0x00 Îó²î¸ÅÊö
2022Äê6ÔÂ8ÈÕ£¬£¬£¬£¬Apache HTTP ServerÐû²¼ÁËApache HTTP Server 2.4.54°æ±¾£¬£¬£¬£¬ÐÞ¸´ÁË2.4.53¼°Ö®Ç°°æ±¾ÖеÄ8¸öÇå¾²Îó²î£¬£¬£¬£¬ÕâЩÎó²î¿ÉÄܵ¼Ö¾ܾøÐ§ÀÍ»òÐÅϢй¶µÈ¡£¡£¡£¡£¡£¡£¡£
0x01 Îó²îÏêÇé
Apache HTTP ServerÊÇApacheÈí¼þ»ù½ð»áµÄÒ»¸ö¿ª·ÅÔ´´úÂëµÄÍøÒ³Ð§ÀÍÆ÷£¬£¬£¬£¬ÓÉÓÚÆä¾ßÓÐ¿çÆ½Ì¨ÐÔºÍÇå¾²ÐÔ£¬£¬£¬£¬±»ÆÕ±éʹÓ㬣¬£¬£¬ËüÊÇ×îÊ¢ÐеÄWebЧÀÍÆ÷¶ËÈí¼þÖ®Ò»¡£¡£¡£¡£¡£¡£¡£
Apache HTTP Server±¾´ÎÐÞ¸´µÄ8¸öÎó²îÈçÏ£º
CVE-ID | Ãû³Æ | ˵Ã÷ | ÑÏÖØË®Æ½ | Ó°Ïì¹æÄ£ |
CVE-2022-26377 | Apache HTTP Server mod_proxy_ajpÇëÇó×ß˽Îó²î | Apache HTTP Server µÄ mod_proxy_ajp ÖÐµÄ HTTP ÇëÇó×ß˽Îó²îÔÊÐí½«ÇëÇó×ß˽µ½Ëüת·¢ÇëÇóµÄ AJP ЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£ | ÖÐΣ | <=2.4.53 |
CVE-2022-28330 | Apache HTTP Server mod_isapiÔ½½ç¶ÁÈ¡Îó²î | ÔÚWindowsÉϵÄApache HTTP Server <= 2.4.53ÖУ¬£¬£¬£¬µ±ÉèÖÃΪÓÃmod_isapiÄ£¿£¿£¿£¿£¿é´¦Öóͷ£ÇëÇóʱ£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÔ½½ç¶ÁÈ¡¡£¡£¡£¡£¡£¡£¡£ | µÍΣ | <=2.4.53 |
CVE-2022-28614 | Apache HTTP Server ap_rwrite() Ô½½ç¶ÁÈ¡Îó²î | ÈôÊÇ¿ÉÒÔʹÓà ap_rwrite() »ò ap_rputs()£¨ÀýÈç mod_luas r:puts() º¯Êý£©Ê¹Ð§ÀÍÆ÷·´Ó¦ºÜÊÇ´óµÄÊäÈ룬£¬£¬£¬Ôò¿ÉÄܵ¼ÖÂÔ½½ç¶ÁÈ¡¡£¡£¡£¡£¡£¡£¡£ | µÍΣ | <=2.4.53 |
CVE-2022-28615 | Apache HTTP Server ap_strcmp_match()Ô½½ç¶ÁÈ¡Îó²î | µ±ÌṩºÜÊÇ´óµÄÊäÈ뻺³åÇøÊ±£¬£¬£¬£¬¿ÉÄÜ»áÓÉÓÚap_strcmp_match()ÖеÄÔ½½ç¶ÁÈ¡¶øµ¼ÖÂÍ߽⻣»£»£»£»£»òÐÅϢй¶¡£¡£¡£¡£¡£¡£¡£ | µÍΣ | <=2.4.53 |
CVE-2022-29404 | Apache HTTP Server mod_lua r:parsebody¾Ü¾øÐ§ÀÍÎó²î | Apache HTTP Server <=2.4.53ÖУ¬£¬£¬£¬¶Ôµ÷Óà r:parsebody(0) µÄ lua ¾ç±¾µÄ¶ñÒâÇëÇó¿ÉÄÜ»áÓÉÓÚ¶ÔÊäÈë¾ÞϸûÓÐĬÈÏÏÞÖÆ¶øµ¼Ö¾ܾøÐ§ÀÍ¡£¡£¡£¡£¡£¡£¡£ | µÍΣ | <=2.4.53 |
CVE-2022-30522 | Apache HTTP Server mod_sed ¾Ü¾øÐ§ÀÍ | ÈôÊÇApache HTTP Server 2.4.53±»ÉèÖÃΪÔÚmod_sedµÄÊäÈë¿ÉÄܺÜÊÇ´óµÄÇéÐÎÏÂÓÃmod_sed¾ÙÐÐת»»£¬£¬£¬£¬mod_sed¿ÉÄÜ»á¾ÙÐйý´óµÄÄÚ´æ·ÖÅɲ¢µ¼ÖÂÖÐÖ¹¡£¡£¡£¡£¡£¡£¡£ | µÍΣ | 2.4.53 |
CVE-2022-30556 | Apache HTTP ServerÐÅϢй¶Îó²î | Apache HTTP Server <=2.4.53ÖпÉÄÜ»áÏòŲÓÃr:wsread()µÄÓ¦ÓóÌÐò·µ»Ø³¤¶È£¬£¬£¬£¬¸Ã³¤¶ÈÖ¸ÏòΪ»º³åÇø·ÖÅɵĴ洢¿Õ¼äµÄ×îºó¡£¡£¡£¡£¡£¡£¡£ | µÍΣ | <=2.4.53 |
CVE-2022-31813 | Apache HTTP Server mod_proxy X-Forwarded-ForÈÆ¹ýÎó²î | Apache HTTP Server <=2.4.53ÖпÉÄܲ»»á½«X-Forwarded-*Í··¢Ë͵½»ùÓÚ¿Í»§¶ËConnectionÍ·µÄÖðÌø»úÖÆµÄԴЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£Õâ¿ÉÄܱ»ÓÃÀ´ÈƹýԴЧÀÍÆ÷/Ó¦ÓóÌÐòÉÏ»ùÓÚIPµÄÈÏÖ¤¡£¡£¡£¡£¡£¡£¡£ | µÍΣ | <=2.4.53 |
0x02 ´¦Öóͷ£½¨Òé
ÏÖÔÚÕâЩÎó²îÒѾÐÞ¸´£¬£¬£¬£¬ÊÜÓ°ÏìÓû§¿ÉÒÔÉý¼¶¸üе½Apache HTTP Server 2.4.54°æ±¾¡£¡£¡£¡£¡£¡£¡£
ÏÂÔØÁ´½Ó£º
https://httpd.apache.org/download.cgi
0x03 ²Î¿¼Á´½Ó
https://httpd.apache.org/security/vulnerabilities_24.html
https://www.mail-archive.com/announce@apache.org/msg07360.html
0x04 ¸üа汾
°æ±¾ | ÈÕÆÚ | ÐÞ¸ÄÄÚÈÝ |
V1.0 | 2022-06-10 | Ê×´ÎÐû²¼ |
0x05 ¸½Â¼
¼øºÚµ£±£Íø¼ò½é
¼øºÚµ£±£Íø¹«Ë¾½¨ÉèÓÚ1996Ä꣬£¬£¬£¬²¢ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉî½»ËùÖÐС°åÕýʽ¹ÒÅÆÉÏÊУ¬£¬£¬£¬ÊǺ£ÄÚ¼«¾ßʵÁ¦µÄ¡¢ÓµÓÐÍêÈ«×ÔÖ÷֪ʶ²úȨµÄÍøÂçÇå¾²²úÆ·¡¢¿ÉÐÅÇå¾²ÖÎÀíÆ½Ì¨¡¢Ç徲ЧÀÍÓë½â¾ö¼Æ»®µÄ×ÛºÏÌṩÉÌ¡£¡£¡£¡£¡£¡£¡£
¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°£¬£¬£¬£¬ÔÚÌìϸ÷Ê¡¡¢ÊС¢×ÔÖÎÇøÉèÓзÖÖ§»ú¹¹£¬£¬£¬£¬ÓµÓÐÁýÕÖÌìϵÄÇþµÀϵͳºÍÊÖÒÕÖ§³ÖÖÐÐÄ£¬£¬£¬£¬²¢ÔÚ±±¾©¡¢ÉϺ£¡¢³É¶¼¡¢¹ãÖÝ¡¢³¤É³¡¢º¼ÖÝµÈ¶àµØÉèÓÐÑз¢ÖÐÐÄ¡£¡£¡£¡£¡£¡£¡£
¶àÄêÀ´£¬£¬£¬£¬¼øºÚµ£±£ÍøÖÂÁ¦ÓÚÌṩ¾ßÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷Á¢ÒìµÄÇå¾²²úÆ·ºÍ×î¼Ñʵ¼ùЧÀÍ£¬£¬£¬£¬×ÊÖú¿Í»§ÖÜÈ«ÌáÉýÆäIT»ù´¡ÉèÊ©µÄÇå¾²ÐÔºÍÉú²úЧÄÜ£¬£¬£¬£¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢Çå¾²¹¤ÒµÁì¾üÆ·ÅÆ¶ø²»Ð¸Æð¾¢¡£¡£¡£¡£¡£¡£¡£
¹ØÓÚ¼øºÚµ£±£Íø
¼øºÚµ£±£ÍøÇå¾²Ó¦¼±ÏìÓ¦ÖÐÐÄÖ÷ÒªÕë¶ÔÖ÷ÒªÇå¾²Îó²îµÄÔ¤¾¯¡¢¸ú×ٺͷÖÏíÈ«Çò×îеÄÍþвÇ鱨ºÍÇå¾²±¨¸æ¡£¡£¡£¡£¡£¡£¡£
¹Ø×¢ÒÔϹ«Öںţ¬£¬£¬£¬»ñȡȫÇò×îÐÂÇå¾²×ÊѶ£º