¡¾Îó²îͨ¸æ¡¿VMware Tanzu Application Service for VMs & Isolation SegmentÐÅϢй¶Îó²î£¨CVE-2023-20891£©
Ðû²¼Ê±¼ä 2023-07-26
Ò»¡¢Îó²î¸ÅÊö
CVE ID | CVE-2023-20891 | ·¢Ã÷ʱ¼ä | 2023-07-26 |
Àà ÐÍ | ÐÅϢй¶ | µÈ ¼¶ | ÖÐΣ |
¹¥»÷ÏòÁ¿ | ÍøÂç | ËùÐèȨÏÞ | µÍ |
¹¥»÷ÖØÆ¯ºó | µÍ | Óû§½»»¥ | ÎÞ |
PoC/EXP | δ¹ûÕæ | ÔÚҰʹÓà | δ·¢Ã÷ |
VMware Tanzu Ó¦ÓóÌÐòЧÀÍÊÇÒ»¸öÊÊÓÃÓÚ¹«ÓÐÔÆºÍ˽ÓÐÔÆµÄÓ¦ÓóÌÐò¿ª·¢ºÍ°²ÅÅÆ½Ì¨¡£¡£¡£¡£¡£¡£
7ÔÂ26ÈÕ£¬£¬£¬£¬¼øºÚµ£±£ÍøVSRC¼à²âµ½VMware Tanzu Application Service for VMs £¨TAS for VMs£©ºÍIsolation SegmentÖб£´æÐÅϢй¶Îó²î£¨CVE-2023-20891£©£¬£¬£¬£¬¸ÃÎó²îµÄCVSSÆÀ·ÖΪ6.5¡£¡£¡£¡£¡£¡£
ÊÊÓÃÓÚÐéÄâ»úµÄ VMware Tanzu Ó¦ÓóÌÐòЧÀͺ͸ôÀë¶ÎÔÚ¶à¸ö°æ±¾Öб£´æÐÅϢй¶Îó²î£¬£¬£¬£¬ÓÉÓÚÆ½Ì¨ÏµÍ³ÉóºËÈÕÖ¾ÖÐÒÔÊ®Áù½øÖƱàÂë¼Í¼ƾ֤£¬£¬£¬£¬ÓÐȨ»á¼ûƽ̨ϵͳÉóºËÈÕÖ¾µÄ·ÇÖÎÀíÔ±Óû§£¨Ä¬Èϰ²ÅÅÖзÇÖÎÀíÔ±Óû§ÎÞȨ»á¼ûƽ̨ϵͳÉóºËÈÕÖ¾£©¿ÉÒÔ»á¼ûÊ®Áù½øÖƱàÂëµÄCF APIÖÎÀíԱƾ֤£¬£¬£¬£¬µ¼ÖÂÃô¸ÐÐÅϢй¶£¬£¬£¬£¬¿ÉʹÓøÃÎó²îÍÆËͶñÒâÓ¦ÓóÌÐò¡£¡£¡£¡£¡£¡£
¶þ¡¢Ó°Ïì¹æÄ£
VMware Tanzu Application Service for VMs 4.0.x < 4.0.5
VMware Tanzu Application Service for VMs 3.0.x < 3.0.14
VMware Tanzu Application Service for VMs 2.13.x < 2.13.24
VMware Tanzu Application Service for VMs 2.11.x < 2.11.42
Isolation Segment 4.0.x < 4.0.4
Isolation Segment 3.0.x < 3.0.13
Isolation Segment 2.13.x < 2.13.20
Isolation Segment 2.11.x < 2.11.35
Èý¡¢Çå¾²²½·¥
3.1 Éý¼¶°æ±¾
ÏÖÔÚ¸ÃÎó²îÒѾÐÞ¸´£¬£¬£¬£¬ÊÜÓ°ÏìÓû§¿ÉÉý¼¶µ½ÒÔϰ汾£º
VMware Tanzu Application Service for VMs 4.0.x >= 4.0.5
VMware Tanzu Application Service for VMs 3.0.x >= 3.0.14
VMware Tanzu Application Service for VMs 2.13.x >= 2.13.24
VMware Tanzu Application Service for VMs 2.11.x >= 2.11.42
Isolation Segment 4.0.x >= 4.0.4
Isolation Segment 3.0.x >= 3.0.13
Isolation Segment 2.13.x >= 2.13.20
Isolation Segment 2.11.x >= 2.11.35
ÏÂÔØÁ´½Ó£º
https://www.vmware.com/security/advisories/VMSA-2023-0016.html
3.2 ÔÝʱ²½·¥
ÊÜÓ°ÏìÓû§¿É¾ÙÐÐCF API ÖÎÀíԱƾ֤ÂÖ»»£¬£¬£¬£¬ÒÔÈ·±£ÍþвÕßÎÞ·¨Ê¹ÓÃÈκÎй¶µÄÃÜÂë¡£¡£¡£¡£¡£¡£Óйظü¸Ä Cloud Foundry Óû§ÕÊ»§ºÍÉí·ÝÑéÖ¤ (UAA) ÖÎÀíԱƾ֤£¬£¬£¬£¬¿É²Î¿¼£º
https://community.pivotal.io/s/article/How-to-Change-the-Admin-Password-for-UAA?language=en_US
3.3 ͨÓý¨Òé
l °´ÆÚ¸üÐÂϵͳ²¹¶¡£¬£¬£¬£¬ïÔÌϵͳÎó²î£¬£¬£¬£¬ÌáÉýЧÀÍÆ÷µÄÇå¾²ÐÔ¡£¡£¡£¡£¡£¡£
l ÔöǿϵͳºÍÍøÂçµÄ»á¼û¿ØÖÆ£¬£¬£¬£¬Ð޸ķÀ»ðǽսÂÔ£¬£¬£¬£¬¹Ø±Õ·ÇÐëÒªµÄÓ¦Óö˿ڻòЧÀÍ£¬£¬£¬£¬ïÔ̽«Î£ÏÕЧÀÍ£¨ÈçSSH¡¢RDPµÈ£©Ì»Â¶µ½¹«Íø£¬£¬£¬£¬ïÔ̹¥»÷Ãæ¡£¡£¡£¡£¡£¡£
l ʹÓÃÆóÒµ¼¶Çå¾²²úÆ·£¬£¬£¬£¬ÌáÉýÆóÒµµÄÍøÂçÇå¾²ÐÔÄÜ¡£¡£¡£¡£¡£¡£
l ÔöǿϵͳÓû§ºÍȨÏÞÖÎÀí£¬£¬£¬£¬ÆôÓöàÒòËØÈÏÖ¤»úÖÆºÍ×îСȨÏÞÔÔò£¬£¬£¬£¬Óû§ºÍÈí¼þȨÏÞÓ¦¼á³ÖÔÚ×îµÍÏÞ¶È¡£¡£¡£¡£¡£¡£
l ÆôÓÃÇ¿ÃÜÂëÕ½ÂÔ²¢ÉèÖÃΪ°´ÆÚÐ޸ġ£¡£¡£¡£¡£¡£
3.4 ²Î¿¼Á´½Ó
https://www.vmware.com/security/advisories/VMSA-2023-0016.html
https://www.bleepingcomputer.com/news/security/vmware-fixes-bug-exposing-cf-api-admin-credentials-in-audit-logs/
ËÄ¡¢°æ±¾ÐÅÏ¢
°æ±¾ | ÈÕÆÚ | ±¸×¢ |
V1.0 | 2023-07-26 | Ê×´ÎÐû²¼ |
Îå¡¢¸½Â¼
5.1 ¼øºÚµ£±£Íø¼ò½é
¼øºÚµ£±£Íø½¨ÉèÓÚ1996Ä꣬£¬£¬£¬ÊÇÓÉÁôÃÀ²©Ê¿ÑÏÍû¼ÑŮʿ½¨ÉèµÄ¡¢ÓµÓÐÍêÈ«×ÔÖ÷֪ʶ²úȨµÄÐÅÏ¢Çå¾²¸ß¿Æ¼¼ÆóÒµ¡£¡£¡£¡£¡£¡£ÊǺ£ÄÚ×î¾ßʵÁ¦µÄÐÅÏ¢Çå¾²²úÆ·¡¢Ç徲ЧÀͽâ¾ö¼Æ»®µÄÁ캽ÆóÒµÖ®Ò»¡£¡£¡£¡£¡£¡£
¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°¼øºÚµ£±£Íø´óÏ㬣¬£¬£¬¹«Ë¾Ô±¹¤6000ÓàÈË£¬£¬£¬£¬Ñз¢ÍŶÓ1200ÓàÈË, ÊÖÒÕЧÀÍÍŶÓ1300ÓàÈË¡£¡£¡£¡£¡£¡£ÔÚÌìϸ÷Ê¡¡¢ÊС¢×ÔÖÎÇøÉèÁ¢·ÖÖ§»ú¹¹ÁùÊ®¶à¸ö£¬£¬£¬£¬ÓµÓÐÁýÕÖÌìϵÄÏúÊÛϵͳ¡¢ÇþµÀϵͳºÍÊÖÒÕÖ§³Öϵͳ¡£¡£¡£¡£¡£¡£¹«Ë¾ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉîÛÚÖÐС°å¹ÒÅÆÉÏÊС£¡£¡£¡£¡£¡££¨¹ÉƱ´úÂ룺002439£©
¶àÄêÀ´£¬£¬£¬£¬¼øºÚµ£±£ÍøÖÂÁ¦ÓÚÌṩ¾ßÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷Á¢ÒìµÄÇå¾²²úÆ·ºÍ×î¼Ñʵ¼ùЧÀÍ£¬£¬£¬£¬×ÊÖú¿Í»§ÖÜÈ«ÌáÉýÆäIT»ù´¡ÉèÊ©µÄÇå¾²ÐÔºÍÉú²úЧÄÜ£¬£¬£¬£¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢Çå¾²¹¤ÒµÁì¾üÆ·ÅÆ¶ø²»Ð¸Æð¾¢¡£¡£¡£¡£¡£¡£
5.2 ¹ØÓÚ¼øºÚµ£±£Íø
¼øºÚµ£±£ÍøÇå¾²Ó¦¼±ÏìÓ¦ÖÐÐÄÒÑÐû²¼1000¶à¸öÎó²îͨ¸æºÍΣº¦Ô¤¾¯£¬£¬£¬£¬ÎÒÃǽ«Ò»Á¬¸ú×ÙÈ«Çò×îеÄÍøÂçÇå¾²ÊÂÎñºÍÎó²î£¬£¬£¬£¬ÎªÆóÒµµÄÐÅÏ¢Çå¾²±£¼Ý»¤º½¡£¡£¡£¡£¡£¡£
¹Ø×¢ÎÒÃÇ£º