¡¾Îó²îͨ¸æ¡¿MinIOȨÏÞÌáÉýÎó²î£¨CVE-2023-28434£©
Ðû²¼Ê±¼ä 2023-09-05Ò»¡¢Îó²î¸ÅÊö
CVE ID | CVE-2023-28434 | ·¢Ã÷ʱ¼ä | 2023-09-05 |
Àà ÐÍ | ȨÏÞÌáÉý | µÈ ¼¶ | ¸ßΣ |
¹¥»÷ÏòÁ¿ | ÍøÂç | ËùÐèȨÏÞ | µÍ |
¹¥»÷ÖØÆ¯ºó | µÍ | Óû§½»»¥ | ÎÞ |
PoC/EXP | ÒѹûÕæ | ÔÚҰʹÓà | ÒÑ·¢Ã÷ |
MinIOÊÇ»ùÓÚGolang¿ª·¢µÄÒ»¿î¸ßÐÔÄÜ¡¢ÂþÑÜʽµÄ¿ªÔ´¹¤¾ß´æ´¢ÏµÍ³¡£¡£
9ÔÂ5ÈÕ£¬£¬ÈËÉú¾ÍÊDz©VSRC¼à²âµ½Ô¶³ÌÍþвÕßÕýÔÚʹÓÃ3ÔÂÅû¶ºÍÐÞ¸´µÄMinIOÎó²îʹÓÃÁ´£¬£¬Í¨¹ý×éºÏʹÓÃMinIOÐÅϢй¶Îó²î£¨CVE-2023-28432£©ºÍ MinIOȨÏÞÌáÉýÎó²î£¨CVE-2023-28434£©À´ÇÔÈ¡Ãô¸ÐÐÅÏ¢£¬£¬²¢ÔÚMinIO Ó¦ÓóÌÐòÔËÐеÄÖ÷»úÉÏÔ¶³ÌÖ´ÐдúÂ룬£¬ÏÖÔÚÕâЩÎó²îµÄʹÓÃϸ½Ú¼°PoC/EXPÒѾ¹ûÕæÅû¶¡£¡£
CVE-2023-28432£ºMinIOÐÅϢй¶Îó²î£¨¸ßΣ£©
MinIO°æ±¾ RELEASE.2019-12-17T23-16-33Z µ½ RELEASE.2023-03-20T20-16-18Z֮ǰ£¬£¬MinIOÔÚ¼¯Èº°²ÅÅʱ£¬£¬¿ÉÔÚδ¾Éí·ÝÑéÖ¤µÄÇéÐÎÏÂͨ¹ý·¢ËͶñÒâÇëÇóµ¼ÖÂMinIO½Ó¿Ú·µ»ØËùÓÐÇéÐαäÁ¿ÐÅÏ¢£¨°üÀ¨MINIO_SECRET_KEYºÍMINIO_ROOT_PASSWORD£©£¬£¬Ôì³ÉÃô¸ÐÐÅϢй¶£¬£¬¿ÉʹÓøÃÎó²îʵÏÖδÊÚȨ»á¼û¡£¡£
CVE-2023-28434£ºMinIOȨÏÞÌáÉýÎó²î£¨¸ßΣ£©
MinIO°æ±¾RELEASE.2023-03-20T20-16-18Z ֮ǰ£¬£¬ÍþвÕß¿ÉÒÔʹÓöñÒâÉè¼ÆµÄÇëÇóÀ´ÈƹýÔªÊý¾Ý´æ´¢Í°Ãû³Æ¼ì²é£¬£¬²¢ÔÚ´¦Öóͷ£¡°PostPolicyBucket¡±Ê±½«¹¤¾ß·ÅÈëÈκδ洢ͰÖС£¡£µ«ÒªÊ¹ÓøÃÎó²î£¬£¬ÍþвÕßÐèÒª¾ßÓС°arn:aws:s3:::*¡±È¨ÏÞµÄÆ¾Ö¤£¬£¬ÒÔ¼°ÒÑÆôÓõĿØÖÆÌ¨ API »á¼ûȨÏÞ¡£¡£×÷ΪһÖÖ»º½âÒªÁ죬£¬¿ÉÆôÓÃä¯ÀÀÆ÷ API »á¼û²¢¹Ø±Õ `MINIO_BROWSER=off`¡£¡£
Ñо¿Ö°Ô±ÒѾ·¢Ã÷£¬£¬ÍþвÕßÕýͨ¹ýʹÓÃCVE-2023-28434ºÍCVE-2023-20432ÊÔͼװÖà MinIO Ó¦ÓóÌÐòµÄºóÃŰ汾£¨±»³ÆÎªEvil MinIO£©£¬£¬¸Ã°æ±¾±»ÐÞ¸ÄΪ°üÀ¨Äܹ»µ¼ÖÂδÊÚȨԶ³Ì´úÂëÖ´ÐеĺóÃÅ£¬£¬ÍþвÕßʹÓøúóÃÅÔËÐÐ Bash ÏÂÁî²¢ÏÂÔØ Python ¾ç±¾£¨¿ÉÕë¶ÔWindows ºÍ Linux ÇéÐΣ©¡£¡£ÏÖÔÚ°üÀ¨MinIOÔ´´úÂëµÄÐ޸ģ¨ºóÃÅ£©°æ±¾µÄGitHub´æ´¢¿âÒѾ¹ûÕæ¡£¡£
¶þ¡¢Ó°Ïì¹æÄ£
MinIO°æ±¾< RELEASE.2023-03-20T20-16-18Z
Èý¡¢Çå¾²²½·¥
3.1 Éý¼¶°æ±¾
ÏÖÔÚÕâЩÎó²îÒѾÐÞ¸´£¬£¬ÊÜÓ°ÏìÓû§¿ÉÉý¼¶µ½ÒÔϰ汾£º
MinIO°æ±¾ >= RELEASE.2023-03-20T20-16-18Z
ÏÂÔØÁ´½Ó£º
https://github.com/minio/minio/tags
3.2 ÔÝʱ²½·¥
Îó²îʹÓÃÏêÇéºÍÏà¹Ø¼ì²âÖ¸±ê¿É²Î¿¼£º
https://www.securityjoes.com/post/new-attack-vector-in-the-cloud-attackers-caught-exploiting-object-storage-services
3.3 ͨÓý¨Òé
l °´ÆÚ¸üÐÂϵͳ²¹¶¡£¡£¬£¬ïÔÌϵͳÎó²î£¬£¬ÌáÉýЧÀÍÆ÷µÄÇå¾²ÐÔ¡£¡£
l ÔöǿϵͳºÍÍøÂçµÄ»á¼û¿ØÖÆ£¬£¬Ð޸ķÀ»ðǽսÂÔ£¬£¬¹Ø±Õ·ÇÐëÒªµÄÓ¦Óö˿ڻòЧÀÍ£¬£¬ïÔ̽«Î£ÏÕЧÀÍ£¨ÈçSSH¡¢RDPµÈ£©Ì»Â¶µ½¹«Íø£¬£¬ïÔ̹¥»÷Ãæ¡£¡£
l ʹÓÃÆóÒµ¼¶Çå¾²²úÆ·£¬£¬ÌáÉýÆóÒµµÄÍøÂçÇå¾²ÐÔÄÜ¡£¡£
l ÔöǿϵͳÓû§ºÍȨÏÞÖÎÀí£¬£¬ÆôÓöàÒòËØÈÏÖ¤»úÖÆºÍ×îСȨÏÞÔÔò£¬£¬Óû§ºÍÈí¼þȨÏÞÓ¦¼á³ÖÔÚ×îµÍÏÞ¶È¡£¡£
l ÆôÓÃÇ¿ÃÜÂëÕ½ÂÔ²¢ÉèÖÃΪ°´ÆÚÐ޸ġ£¡£
3.4 ²Î¿¼Á´½Ó
https://github.com/minio/minio/security/advisories/GHSA-2pxw-r47w-4p8c
https://github.com/minio/minio/security/advisories/GHSA-6xvq-wj2x-3h3q
https://www.bleepingcomputer.com/news/security/hackers-exploit-minio-storage-system-to-breach-corporate-networks/
https://github.com/AbelChe/evil_minio
ËÄ¡¢°æ±¾ÐÅÏ¢
°æ±¾ | ÈÕÆÚ | ±¸×¢ |
V1.0 | 2023-09-05 | Ê×´ÎÐû²¼ |
Îå¡¢¸½Â¼
5.1 ÈËÉú¾ÍÊDz©¼ò½é
ÈËÉú¾ÍÊDz©½¨ÉèÓÚ1996Ä꣬£¬ÊÇÓÉÁôÃÀ²©Ê¿ÑÏÍû¼ÑŮʿ½¨ÉèµÄ¡¢ÓµÓÐÍêÈ«×ÔÖ÷֪ʶ²úȨµÄÐÅÏ¢Çå¾²¸ß¿Æ¼¼ÆóÒµ¡£¡£ÊǺ£ÄÚ×î¾ßʵÁ¦µÄÐÅÏ¢Çå¾²²úÆ·¡¢Ç徲ЧÀͽâ¾ö¼Æ»®µÄÁ캽ÆóÒµÖ®Ò»¡£¡£
¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°ÈËÉú¾ÍÊDz©´óÏ㬣¬¹«Ë¾Ô±¹¤6000ÓàÈË£¬£¬Ñз¢ÍŶÓ1200ÓàÈË, ÊÖÒÕЧÀÍÍŶÓ1300ÓàÈË¡£¡£ÔÚÌìϸ÷Ê¡¡¢ÊС¢×ÔÖÎÇøÉèÁ¢·ÖÖ§»ú¹¹ÁùÊ®¶à¸ö£¬£¬ÓµÓÐÁýÕÖÌìϵÄÏúÊÛϵͳ¡¢ÇþµÀϵͳºÍÊÖÒÕÖ§³Öϵͳ¡£¡£¹«Ë¾ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉîÛÚÖÐС°å¹ÒÅÆÉÏÊС£¡££¨¹ÉƱ´úÂ룺002439£©
¶àÄêÀ´£¬£¬ÈËÉú¾ÍÊDz©ÖÂÁ¦ÓÚÌṩ¾ßÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷Á¢ÒìµÄÇå¾²²úÆ·ºÍ×î¼Ñʵ¼ùЧÀÍ£¬£¬×ÊÖú¿Í»§ÖÜÈ«ÌáÉýÆäIT»ù´¡ÉèÊ©µÄÇå¾²ÐÔºÍÉú²úЧÄÜ£¬£¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢Çå¾²¹¤ÒµÁì¾üÆ·ÅÆ¶ø²»Ð¸Æð¾¢¡£¡£
5.2 ¹ØÓÚÈËÉú¾ÍÊDz©
ÈËÉú¾ÍÊDz©Çå¾²Ó¦¼±ÏìÓ¦ÖÐÐÄÒÑÐû²¼1000¶à¸öÎó²îͨ¸æºÍΣº¦Ô¤¾¯£¬£¬ÎÒÃǽ«Ò»Á¬¸ú×ÙÈ«Çò×îеÄÍøÂçÇå¾²ÊÂÎñºÍÎó²î£¬£¬ÎªÆóÒµµÄÐÅÏ¢Çå¾²±£¼Ý»¤º½¡£¡£
¹Ø×¢ÎÒÃÇ£º



¾©¹«Íø°²±¸11010802024551ºÅ