¡¾Îó²îͨ¸æ¡¿Jenkins¿çÕ¾¾ç±¾Îó²îCorePlague
Ðû²¼Ê±¼ä 2023-03-09Ò»¡¢Îó²î¸ÅÊö
CVE ID | CVE-2023-27898 | ·¢Ã÷ʱ¼ä | 2023-03-09 |
Àà ÐÍ | XSS | µÈ ¼¶ | ¸ßΣ |
Ô¶³ÌʹÓà | ÊÇ | ËùÐèȨÏÞ | ÎÞ |
¹¥»÷ÖØÆ¯ºó | µÍ | Óû§½»»¥ | ÊÇ |
PoC/EXP | δ¹ûÕæ | ÔÚҰʹÓà | ·ñ |
JenkinsÊÇÒ»¸ö¿ªÔ´Èí¼þÏîÄ¿£¬£¬£¬ËüÊÇ»ùÓÚJava¿ª·¢µÄÒ»ÖÖÒ»Á¬¼¯³É¹¤¾ß£¬£¬£¬ÓÃÓÚ¼à¿ØÒ»Á¬Öظ´µÄÊÂÇ飬£¬£¬Ö¼ÔÚÌṩһ¸ö¿ª·ÅÒ×ÓõÄÈí¼þƽ̨£¬£¬£¬Ê¹Èí¼þÏîÄ¿¿ÉÒÔ¾ÙÐÐÒ»Á¬¼¯³É¡£¡£¡£¡£¡£
3ÔÂ9ÈÕ£¬£¬£¬ÈËÉú¾ÍÊDz©VSRC¼à²âµ½Jenkins¹Ù·½Ðû²¼Ç徲ͨ¸æ£¬£¬£¬ÐÞ¸´ÁËJenkins ServerºÍUpdate CenterÖз¢Ã÷µÄ2¸ö¿çÕ¾¾ç±¾Îó²î£¨CVE-2023-27898ºÍCVE-2023-27905£¬£¬£¬Í³³ÆÎª¡°CorePlague¡±£©¡£¡£¡£¡£¡£Î´¾Éí·ÝÑéÖ¤µÄÍþвÕß¿ÉʹÓÃÕâЩÎó²îÔÚÊܺ¦ÕßµÄ Jenkins ServerÉÏÖ´ÐÐí§Òâ´úÂ룬£¬£¬¿ÉÄܵ¼Ö Jenkins Serve±»ÍêÈ«ÆÆË𣬣¬£¬Îó²îÏêÇéÈçÏ£º
CVE-2023-27898£ºJenkins Plugin Manager¿çÕ¾¾ç±¾Îó²î£¨¸ßΣ£©
Jenkins 2.270-2.393¡¢LTS 2.277.1- 2.375.3ÔÚ²å¼þÖÎÀíÆ÷ÖзºÆð¹ýʧÐÂÎÅ£¬£¬£¬ËµÃ÷ÆäÓëÄ¿½ñ°æ±¾µÄJenkins²»¼æÈÝʱ£¬£¬£¬²»»áתÒå²å¼þËùÒÀÀµµÄ Jenkins °æ±¾£¬£¬£¬¿ÉÄܵ¼ÖÂÊܵ½´æ´¢ÐÍXSSÎó²î¹¥»÷£¬£¬£¬¿ÉʹÓøÃÎó²îÏòÉèÖõĸüÐÂÕ¾µãÌṩ²å¼þ£¬£¬£¬²¢ÈÃJenkinsʵÀýÏÔʾ´ËÐÂÎÅ¡£¡£¡£¡£¡£
CVE-2023-27905£ºJenkins update-center2 ¿çÕ¾¾ç±¾Îó²î£¨ÖÐΣ£©
update-center2ÊÇÓÃÓÚÌìÉúupdates.Jenkins.ioÉÏÍйܵÄJenkins¸üÐÂÕ¾µãµÄ¹¤¾ß¡£¡£¡£¡£¡£
update-center2 ijЩ°æ±¾ÔÚ²å¼þÏÂÔØË÷ÒýÒ³ÃæÉÏ·ºÆðËùÐèµÄ Jenkins ½¹µã°æ±¾£¬£¬£¬¸Ã°æ±¾È¡×Ô²å¼þÔªÊý¾Ý£¬£¬£¬Î´¾ÕûÀí£¬£¬£¬¿ÉÄܵ¼Ö´洢ÐÍXSSÎó²î£¬£¬£¬µ«Ê¹ÓøÃÎó²îÐèͬʱ֪×ãÒÔÏÂÌõ¼þ£º
1.ÐèÒªÆôÓÃÏÂÔØÒ³ÃæµÄÌìÉú£¨¼´--download-links-directoryÐèÒªÉèÖòÎÊý£©¡£¡£¡£¡£¡£
2.±ØÐèʹÓÃ×Ô½ç˵ÏÂÔØÒ³ÃæÄ£°å£¨--index-template-url²ÎÊý£©£¬£¬£¬ÇÒËùʹÓõÄÄ£°å²»µÃͨ¹ýContent-Security-Policy×èÖ¹JavaScriptÖ´ÐС£¡£¡£¡£¡£Ä¬ÈÏÄ£°åͨ¹ýÉùÃ÷Ò»¸öÏÞÖÆÐÔµÄContent-Security-PolicyÀ´±ÜÃâʹÓᣡ£¡£¡£¡£
¶þ¡¢Ó°Ïì¹æÄ£
Jenkins Server°æ±¾£º2.270 - 2.393¡¢LTS 2.277.1 - 2.375.3
Jenkins update-center2 °æ±¾£º<= 3.14
Èý¡¢Çå¾²²½·¥
3.1 Éý¼¶°æ±¾
ÏÖÔÚÕâЩÎó²îÒѾÐÞ¸´£¬£¬£¬ÊÜÓ°ÏìÓû§¿ÉÉý¼¶µ½ÒÔϰ汾£º
Jenkins Server°æ±¾£ºÉý¼¶µ½ 2.394¡¢LTS 2.375.4 »ò LTS 2.387.1¡£¡£¡£¡£¡£
Jenkins update-center2°æ±¾£ºÉý¼¶µ½3.15¡£¡£¡£¡£¡£
ÏÂÔØÁ´½Ó£º
https://www.jenkins.io/download/
3.2 ÔÝʱ²½·¥
ÔÝÎÞ¡£¡£¡£¡£¡£
3.3 ͨÓý¨Òé
l °´ÆÚ¸üÐÂϵͳ²¹¶¡£¬£¬£¬ïÔÌϵͳÎó²î£¬£¬£¬ÌáÉýЧÀÍÆ÷µÄÇå¾²ÐÔ¡£¡£¡£¡£¡£
l ÔöǿϵͳºÍÍøÂçµÄ»á¼û¿ØÖÆ£¬£¬£¬Ð޸ķÀ»ðǽսÂÔ£¬£¬£¬¹Ø±Õ·ÇÐëÒªµÄÓ¦Óö˿ڻòЧÀÍ£¬£¬£¬ïÔ̽«Î£ÏÕЧÀÍ£¨ÈçSSH¡¢RDPµÈ£©Ì»Â¶µ½¹«Íø£¬£¬£¬ïÔ̹¥»÷Ãæ¡£¡£¡£¡£¡£
l ʹÓÃÆóÒµ¼¶Çå¾²²úÆ·£¬£¬£¬ÌáÉýÆóÒµµÄÍøÂçÇå¾²ÐÔÄÜ¡£¡£¡£¡£¡£
l ÔöǿϵͳÓû§ºÍȨÏÞÖÎÀí£¬£¬£¬ÆôÓöàÒòËØÈÏÖ¤»úÖÆºÍ×îСȨÏÞÔÔò£¬£¬£¬Óû§ºÍÈí¼þȨÏÞÓ¦¼á³ÖÔÚ×îµÍÏÞ¶È¡£¡£¡£¡£¡£
l ÆôÓÃÇ¿ÃÜÂëÕ½ÂÔ²¢ÉèÖÃΪ°´ÆÚÐ޸ġ£¡£¡£¡£¡£
3.4 ²Î¿¼Á´½Ó
https://www.jenkins.io/security/advisory/2023-03-08/
https://blog.aquasec.com/jenkins-server-vulnerabilities
https://thehackernews.com/2023/03/jenkins-security-alert-new-security.html
ËÄ¡¢°æ±¾ÐÅÏ¢
°æ±¾ | ÈÕÆÚ | ±¸×¢ |
V1.0 | 2023-03-09 | Ê×´ÎÐû²¼ |
Îå¡¢¸½Â¼
5.1 ÈËÉú¾ÍÊDz©¼ò½é
ÈËÉú¾ÍÊDz©½¨ÉèÓÚ1996Ä꣬£¬£¬ÊÇÓÉÁôÃÀ²©Ê¿ÑÏÍû¼ÑŮʿ½¨ÉèµÄ¡¢ÓµÓÐÍêÈ«×ÔÖ÷֪ʶ²úȨµÄÐÅÏ¢Çå¾²¸ß¿Æ¼¼ÆóÒµ¡£¡£¡£¡£¡£ÊǺ£ÄÚ×î¾ßʵÁ¦µÄÐÅÏ¢Çå¾²²úÆ·¡¢Ç徲ЧÀͽâ¾ö¼Æ»®µÄÁ캽ÆóÒµÖ®Ò»¡£¡£¡£¡£¡£
¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°ÈËÉú¾ÍÊDz©´óÏ㬣¬£¬¹«Ë¾Ô±¹¤6000ÓàÈË£¬£¬£¬Ñз¢ÍŶÓ1200ÓàÈË, ÊÖÒÕЧÀÍÍŶÓ1300ÓàÈË¡£¡£¡£¡£¡£ÔÚÌìϸ÷Ê¡¡¢ÊС¢×ÔÖÎÇøÉèÁ¢·ÖÖ§»ú¹¹ÁùÊ®¶à¸ö£¬£¬£¬ÓµÓÐÁýÕÖÌìϵÄÏúÊÛϵͳ¡¢ÇþµÀϵͳºÍÊÖÒÕÖ§³Öϵͳ¡£¡£¡£¡£¡£¹«Ë¾ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉîÛÚÖÐС°å¹ÒÅÆÉÏÊС£¡£¡£¡£¡££¨¹ÉƱ´úÂ룺002439£©
¶àÄêÀ´£¬£¬£¬ÈËÉú¾ÍÊDz©ÖÂÁ¦ÓÚÌṩ¾ßÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷Á¢ÒìµÄÇå¾²²úÆ·ºÍ×î¼Ñʵ¼ùЧÀÍ£¬£¬£¬×ÊÖú¿Í»§ÖÜÈ«ÌáÉýÆäIT»ù´¡ÉèÊ©µÄÇå¾²ÐÔºÍÉú²úЧÄÜ£¬£¬£¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢Çå¾²¹¤ÒµÁì¾üÆ·ÅÆ¶ø²»Ð¸Æð¾¢¡£¡£¡£¡£¡£
5.2 ¹ØÓÚÈËÉú¾ÍÊDz©
ÈËÉú¾ÍÊDz©Çå¾²Ó¦¼±ÏìÓ¦ÖÐÐÄÒÑÐû²¼1000¶à¸öÎó²îͨ¸æºÍΣº¦Ô¤¾¯£¬£¬£¬ÎÒÃǽ«Ò»Á¬¸ú×ÙÈ«Çò×îеÄÍøÂçÇå¾²ÊÂÎñºÍÎó²î£¬£¬£¬ÎªÆóÒµµÄÐÅÏ¢Çå¾²±£¼Ý»¤º½¡£¡£¡£¡£¡£
¹Ø×¢ÎÒÃÇ£º



¾©¹«Íø°²±¸11010802024551ºÅ