¡¾Îó²îͨ¸æ¡¿Roundcube Webmail¿çÕ¾¾ç±¾Îó²î£¨CVE-2024-42009£©

Ðû²¼Ê±¼ä 2024-08-06

Ò»¡¢Îó²î¸ÅÊö

Îó²îÃû³Æ

 Roundcube Webmail¿çÕ¾¾ç±¾Îó²î

CVE   ID

CVE-2024-42008¡¢CVE-2024-42009

Îó²îÀàÐÍ

XSS

·¢Ã÷ʱ¼ä

2024-08-06

Îó²îÆÀ·Ö

ÔÝÎÞ

Îó²îÆ·¼¶

¸ßΣ

¹¥»÷ÏòÁ¿

ÍøÂç

ËùÐèȨÏÞ

ÎÞ

ʹÓÃÄѶÈ

µÍ

Óû§½»»¥

ÊÇ

PoC/EXP

δ¹ûÕæ

ÔÚҰʹÓÃ

δ·¢Ã÷

 

Roundcube WebmailÊÇÒ»¸ö¿ªÔ´µÄ¡¢»ùÓÚWebµÄµç×ÓÓʼþ¿Í»§¶Ë£¬£¬£¬£¬£¬£¬£¬ËüÌṩÁËÒ»¸öÀàËÆÓÚ×ÀÃæÓ¦ÓóÌÐòµÄÓû§½çÃæ£¬£¬£¬£¬£¬£¬£¬²¢¾ß±¸µç×ÓÓʼþ¿Í»§¶ËµÄËùÓй¦Ð§£¬£¬£¬£¬£¬£¬£¬°üÀ¨MIMEÖ§³Ö¡¢µØµã²¾¡¢Îļþ¼Ð²Ù×÷¡¢ÐÂÎÅËÑË÷ºÍƴд¼ì²éµÈ¡£¡£¡£¡£¡£

2024Äê8ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬£¬¼øºÚµ£±£Íø¼¯ÍÅVSRC¼à²âµ½Roundcube WebmailÖÐÐÞ¸´Á˶à¸öÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬ÍþвÕß¿ÉʹÓÃÕâЩÎó²îÔÚÊܺ¦ÕßµÄä¯ÀÀÆ÷ÖÐÖ´ÐÐí§ÒâJavaScript¡¢ÇÔÈ¡Ãô¸ÐÐÅÏ¢»òÖ´ÐÐδÊÚȨ²Ù×÷£¬£¬£¬£¬£¬£¬£¬ÏêÇéÈçÏ£º

CVE-2024-42009£ºRoundcube Webmail¿çÕ¾¾ç±¾Îó²î

Roundcube Webmail 1.6.8֮ǰºÍ1.5.8֮ǰ°æ±¾ÔÚHTMLÄÚÈÝ´¦Öóͷ£Öб£´æ¿çÕ¾¾ç±¾Îó²î£¬£¬£¬£¬£¬£¬£¬Ô¶³ÌÍþвÕß¿ÉÏòÄ¿µÄÓû§·¢ËͶñÒâÉè¼ÆµÄµç×ÓÓʼþ£¬£¬£¬£¬£¬£¬£¬µ±Êܺ¦ÕßÔÚRoundcubeÖÐÉó²é¶ñÒâµç×ÓÓʼþʱ£¬£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂʹÓøÃÎó²îÇÔÈ¡µç×ÓÓʼþºÍÁªÏµÈË¡¢Êܺ¦Õߵĵç×ÓÓʼþÃÜÂëÒÔ¼°´ÓÊܺ¦ÕßµÄÕÊ»§·¢Ë͵ç×ÓÓʼþµÈ¡£¡£¡£¡£¡£

CVE-2024-42008£ºRoundcube Webmail¿çÕ¾¾ç±¾Îó²î

Roundcube Webmail 1.6.8֮ǰºÍ1.5.8֮ǰ°æ±¾ÔÚ¸½¼þ´¦Öóͷ£Öб£´æ¿çÕ¾¾ç±¾Îó²î£¬£¬£¬£¬£¬£¬£¬Ô¶³ÌÍþвÕß¿Éͨ¹ýÏòÄ¿µÄÓû§·¢ËÍ´øÓÐΣÏÕContent-Type±êÍ·µÄ¶ñÒâµç×ÓÓʼþ¸½¼þ£¬£¬£¬£¬£¬£¬£¬µ±Êܺ¦ÕßÔÚRoundcubeÖÐÉó²éºÍµã»÷¶ñÒâµç×ÓÓʼþʱ£¬£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂʹÓøÃÎó²îÇÔÈ¡µç×ÓÓʼþºÍÁªÏµÈË¡¢Êܺ¦Õߵĵç×ÓÓʼþÃÜÂëÒÔ¼°´ÓÊܺ¦ÕßµÄÕÊ»§·¢Ë͵ç×ÓÓʼþµÈ¡£¡£¡£¡£¡£

CVE-2024-42010£ºRoundcube WebmailÐÅϢй¶Îó²î

Roundcube Webmail 1.6.8֮ǰºÍ1.5.8֮ǰ°æ±¾ÖÐµÄ mod_css_styles ¶ÔäÖȾµÄµç×ÓÓʼþÐÂÎÅÖеIJãµþÑùʽ±í£¨CSS£©ÁîÅÆÐòÁеĹýÂ˲»³ä·Ö£¬£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÔ¶³ÌÍþвÕß»ñÈ¡Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£

 

¶þ¡¢Ó°Ïì¹æÄ£

Roundcube Webmail < 1.6.8

Roundcube Webmail < 1.5.8

 

Èý¡¢Çå¾²²½·¥

3.1 Éý¼¶°æ±¾

ÏÖÔÚÕâЩÎó²îÒѾ­ÐÞ¸´£¬£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìÓû§¿ÉÉý¼¶µ½ÒÔϰ汾£º

Roundcube Webmail >= 1.6.8

Roundcube Webmail >= 1.5.8

ÏÂÔØÁ´½Ó£º

https://github.com/roundcube/roundcubemail/releases/tag/1.6.8

3.2 ÔÝʱ²½·¥

ÔÝÎÞ¡£¡£¡£¡£¡£

3.3 ͨÓý¨Òé

l  °´ÆÚ¸üÐÂϵͳ²¹¶¡£¬£¬£¬£¬£¬£¬£¬ïÔ̭ϵͳÎó²î£¬£¬£¬£¬£¬£¬£¬ÌáÉýЧÀÍÆ÷µÄÇå¾²ÐÔ¡£¡£¡£¡£¡£

l  ÔöǿϵͳºÍÍøÂçµÄ»á¼û¿ØÖÆ£¬£¬£¬£¬£¬£¬£¬Ð޸ķÀ»ðǽսÂÔ£¬£¬£¬£¬£¬£¬£¬¹Ø±Õ·ÇÐëÒªµÄÓ¦Óö˿ڻòЧÀÍ£¬£¬£¬£¬£¬£¬£¬ïÔÌ­½«Î£ÏÕЧÀÍ£¨ÈçSSH¡¢RDPµÈ£©Ì»Â¶µ½¹«Íø£¬£¬£¬£¬£¬£¬£¬ïÔÌ­¹¥»÷Ãæ¡£¡£¡£¡£¡£

l  ʹÓÃÆóÒµ¼¶Çå¾²²úÆ·£¬£¬£¬£¬£¬£¬£¬ÌáÉýÆóÒµµÄÍøÂçÇå¾²ÐÔÄÜ¡£¡£¡£¡£¡£

l  ÔöǿϵͳÓû§ºÍȨÏÞÖÎÀí£¬£¬£¬£¬£¬£¬£¬ÆôÓöàÒòËØÈÏÖ¤»úÖÆºÍ×îСȨÏÞÔ­Ôò£¬£¬£¬£¬£¬£¬£¬Óû§ºÍÈí¼þȨÏÞÓ¦¼á³ÖÔÚ×îµÍÏÞ¶È¡£¡£¡£¡£¡£

l  ÆôÓÃÇ¿ÃÜÂëÕ½ÂÔ²¢ÉèÖÃΪ°´ÆÚÐ޸ġ£¡£¡£¡£¡£

3.4 ²Î¿¼Á´½Ó

https://roundcube.net/news/2024/08/04/security-updates-1.6.8-and-1.5.8

https://www.sonarsource.com/blog/government-emails-at-risk-critical-cross-site-scripting-vulnerability-in-roundcube-webmail/

https://nvd.nist.gov/vuln/detail/CVE-2024-42009

 

ËÄ¡¢°æ±¾ÐÅÏ¢

°æ±¾

ÈÕÆÚ

±¸×¢

V1.0

2024-08-06

Ê×´ÎÐû²¼

 

Îå¡¢¸½Â¼

5.1 ¼øºÚµ£±£Íø¼ò½é

¼øºÚµ£±£Íø½¨ÉèÓÚ1996Ä꣬£¬£¬£¬£¬£¬£¬ÊÇÓÉÁôÃÀ²©Ê¿ÑÏÍû¼ÑŮʿ½¨ÉèµÄ¡¢ÓµÓÐÍêÈ«×ÔÖ÷֪ʶ²úȨµÄÐÅÏ¢Çå¾²¸ß¿Æ¼¼ÆóÒµ¡£¡£¡£¡£¡£ÊǺ£ÄÚ×î¾ßʵÁ¦µÄÐÅÏ¢Çå¾²²úÆ·¡¢Ç徲ЧÀͽâ¾ö¼Æ»®µÄÁ캽ÆóÒµÖ®Ò»¡£¡£¡£¡£¡£

¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°¼øºÚµ£±£Íø´óÏ㬣¬£¬£¬£¬£¬£¬¹«Ë¾Ô±¹¤6000ÓàÈË£¬£¬£¬£¬£¬£¬£¬Ñз¢ÍŶÓ1200ÓàÈË, ÊÖÒÕЧÀÍÍŶÓ1300ÓàÈË¡£¡£¡£¡£¡£ÔÚÌìϸ÷Ê¡¡¢ÊС¢×ÔÖÎÇøÉèÁ¢·ÖÖ§»ú¹¹ÁùÊ®¶à¸ö£¬£¬£¬£¬£¬£¬£¬ÓµÓÐÁýÕÖÌìϵÄÏúÊÛϵͳ¡¢ÇþµÀϵͳºÍÊÖÒÕÖ§³Öϵͳ¡£¡£¡£¡£¡£¹«Ë¾ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉîÛÚÖÐС°å¹ÒÅÆÉÏÊС£¡£¡£¡£¡££¨¹ÉƱ´úÂ룺002439£©

¶àÄêÀ´£¬£¬£¬£¬£¬£¬£¬¼øºÚµ£±£ÍøÖÂÁ¦ÓÚÌṩ¾ßÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷Á¢ÒìµÄÇå¾²²úÆ·ºÍ×î¼Ñʵ¼ùЧÀÍ£¬£¬£¬£¬£¬£¬£¬×ÊÖú¿Í»§ÖÜÈ«ÌáÉýÆäIT»ù´¡ÉèÊ©µÄÇå¾²ÐÔºÍÉú²úЧÄÜ£¬£¬£¬£¬£¬£¬£¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢Çå¾²¹¤ÒµÁì¾üÆ·ÅÆ¶ø²»Ð¸Æð¾¢¡£¡£¡£¡£¡£

5.2 ¹ØÓÚ¼øºÚµ£±£Íø

¼øºÚµ£±£ÍøÇå¾²Ó¦¼±ÏìÓ¦ÖÐÐÄÒÑÐû²¼1000¶à¸öÎó²îͨ¸æºÍΣº¦Ô¤¾¯£¬£¬£¬£¬£¬£¬£¬ÎÒÃǽ«Ò»Á¬¸ú×ÙÈ«Çò×îеÄÍøÂçÇå¾²ÊÂÎñºÍÎó²î£¬£¬£¬£¬£¬£¬£¬ÎªÆóÒµµÄÐÅÏ¢Çå¾²±£¼Ý»¤º½¡£¡£¡£¡£¡£

¹Ø×¢ÎÒÃÇ£º

image.png