¡¾Îó²îͨ¸æ¡¿F5 BIG-IP Next Central Manager SQL×¢ÈëÎó²î£¨CVE-2024-26026£©
Ðû²¼Ê±¼ä 2024-05-09Ò»¡¢Îó²î¸ÅÊö
Îó²îÃû³Æ | F5 BIG-IP Next Central Manager SQL×¢ÈëÎó²î | ||
CVE ID | CVE-2024-26026 | ||
Îó²îÀàÐÍ | SQL×¢Èë | ·¢Ã÷ʱ¼ä | 2024-05-09 |
Îó²îÆÀ·Ö | 7.5 | Îó²îÆ·¼¶ | ¸ßΣ |
¹¥»÷ÏòÁ¿ | ÍøÂç | ËùÐèȨÏÞ | ÎÞ |
ʹÓÃÄÑ¶È | µÍ | Óû§½»»¥ | ÎÞ |
PoC/EXP | ÒѹûÕæ | ÔÚҰʹÓà | δ·¢Ã÷ |
BIG-IP Next Central ManagerÊÇBIG-IP NextµÄÔÉúĬÈÏÓû§½çÃæ£¬£¬£¬£¬£¬£¬£¬Ëü¿É¿çƽ̨ÖÎÀíBIG-IP NextʵÀý¡£¡£¡£BIG-IP NextÊÇF5 Networks¹«Ë¾ÍƳöµÄÒ»¿îÏÂÒ»´úBIG-IPÈí¼þ£¬£¬£¬£¬£¬£¬£¬ÌṩÁ˶àÔÆÓ¦ÓÃÇå¾²ºÍÓ¦Óý»¸¶Ð§ÀÍ¡£¡£¡£
2024Äê4ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬£¬ÍòÀû¹ú¼Ê¹ÙÍøVSRC¼à²âµ½F5 NetworksÐû²¼Ç徲ͨ¸æ£¬£¬£¬£¬£¬£¬£¬ÐÞ¸´ÁËBIG-IP Next Central ManagerÖеĶà¸ö×¢ÈëÎó²î£¬£¬£¬£¬£¬£¬£¬ÍþвÕß¿ÉʹÓÃÕâЩÎó²î»ñÈ¡Ãô¸ÐÐÅÏ¢²¢¿ØÖÆ×°±¸¡£¡£¡£ÕâЩÎó²îµÄCVSSÆÀ·Ö¾ùΪ7.5£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚPoCÒѹûÕæ£¬£¬£¬£¬£¬£¬£¬ÏêÇéÈçÏ£º
CVE-2024-21793£ºBIG-IP Next Central Manager OData ×¢ÈëÎó²î
µ±ÆôÓà LDAPʱ£¬£¬£¬£¬£¬£¬£¬BIG-IP Next Central Manager °æ±¾20.0.1 - 20.1.0µÄAPI (URI) Öб£´æOData ×¢ÈëÎó²î£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²î±£´æÓÚCentral Manager ´¦Öóͷ£ OData ÅÌÎʵķ½·¨ÖУ¬£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂδ¾Éí·ÝÑéÖ¤µÄÍþвÕß×¢ÈëOData ÅÌÎʹýÂËÆ÷²ÎÊý£¬£¬£¬£¬£¬£¬£¬´Ó¶ø»ñÈ¡Ãô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÈçÖÎÀíÔ±ÃÜÂë¹þÏ£µÈ¡£¡£¡£
CVE-2024-26026£ºBIG-IP Next Central Manager SQL×¢ÈëÎó²î
BIG-IP Next Central Manager °æ±¾20.0.1 - 20.1.0µÄAPI (URI) Öб£´æSQL ×¢ÈëÎó²î£¬£¬£¬£¬£¬£¬£¬Î´¾Éí·ÝÑéÖ¤µÄÍþвÕ߿ɽ«¶ñÒâSQLÅÌÎÊ×¢ÈëÊý¾Ý¿âÅÌÎʵÄÊäÈë×ֶλò²ÎÊýÖУ¬£¬£¬£¬£¬£¬£¬´Ó¶ø¿ÉÄܵ¼ÖÂδÊÚȨ»á¼û¡¢ÖÎÀíÓû§ÃÜÂë¹þÏ£µÈÃô¸ÐÊý¾Ýй¶ºÍϵͳ½ÓÊܵȡ£¡£¡£
¶þ¡¢Îó²î¸´ÏÖ
CVE-2024-26026¸´ÏÖÈçÏ£º

Èý¡¢Ó°Ïì¹æÄ£
BIG-IP Next Central Manager 20.x £º20.0.1 - 20.1.0
ËÄ¡¢Çå¾²²½·¥
4.1 Éý¼¶°æ±¾
ÏÖÔÚÕâЩÎó²îÒѾÐÞ¸´£¬£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìÓû§¿É¸üе½BIG-IP Next Central Manager 20.2.0¡£¡£¡£
ÏÂÔØÁ´½Ó£º
https://my.f5.com/manage/s/
4.2 ÔÝʱ²½·¥
ÎÞ·¨Á¬Ã¦×°ÖÃÄ¿½ñÇå¾²¸üеÄÓû§¿É½« F5 ²úÆ·µÄÖÎÆÊÎö¼ûȨÏÞÏÞÖÆÎª½ö¿Éͨ¹ýÇå¾²ÍøÂçºÍÊÜÐÅÈεÄÓû§ºÍ×°±¸»á¼û£¬£¬£¬£¬£¬£¬£¬ÒÔ½µµÍ¹¥»÷Σº¦¡£¡£¡£
4.3 ͨÓý¨Òé
l °´ÆÚ¸üÐÂϵͳ²¹¶¡£¬£¬£¬£¬£¬£¬£¬ïÔÌϵͳÎó²î£¬£¬£¬£¬£¬£¬£¬ÌáÉýЧÀÍÆ÷µÄÇå¾²ÐÔ¡£¡£¡£
l ÔöǿϵͳºÍÍøÂçµÄ»á¼û¿ØÖÆ£¬£¬£¬£¬£¬£¬£¬Ð޸ķÀ»ðǽսÂÔ£¬£¬£¬£¬£¬£¬£¬¹Ø±Õ·ÇÐëÒªµÄÓ¦Óö˿ڻòЧÀÍ£¬£¬£¬£¬£¬£¬£¬ïÔ̽«Î£ÏÕЧÀÍ£¨ÈçSSH¡¢RDPµÈ£©Ì»Â¶µ½¹«Íø£¬£¬£¬£¬£¬£¬£¬ïÔ̹¥»÷Ãæ¡£¡£¡£
l ʹÓÃÆóÒµ¼¶Çå¾²²úÆ·£¬£¬£¬£¬£¬£¬£¬ÌáÉýÆóÒµµÄÍøÂçÇå¾²ÐÔÄÜ¡£¡£¡£
l ÔöǿϵͳÓû§ºÍȨÏÞÖÎÀí£¬£¬£¬£¬£¬£¬£¬ÆôÓöàÒòËØÈÏÖ¤»úÖÆºÍ×îСȨÏÞÔÔò£¬£¬£¬£¬£¬£¬£¬Óû§ºÍÈí¼þȨÏÞÓ¦¼á³ÖÔÚ×îµÍÏÞ¶È¡£¡£¡£
l ÆôÓÃÇ¿ÃÜÂëÕ½ÂÔ²¢ÉèÖÃΪ°´ÆÚÐ޸ġ£¡£¡£
4.4 ²Î¿¼Á´½Ó
https://my.f5.com/manage/s/article/K000138733
https://my.f5.com/manage/s/article/K000138732
https://eclypsium.com/blog/big-vulnerabilities-in-next-gen-big-ip/
Îå¡¢°æ±¾ÐÅÏ¢
°æ±¾ | ÈÕÆÚ | ±¸×¢ |
V1.0 | 2024-05-09 | Ê×´ÎÐû²¼ |
V1.1 | 2024-05-10 | ÐÂÔöÎó²î¸´ÏÖ |
Áù¡¢¸½Â¼
6.1 ÍòÀû¹ú¼Ê¹ÙÍø¼ò½é
ÍòÀû¹ú¼Ê¹ÙÍø½¨ÉèÓÚ1996Ä꣬£¬£¬£¬£¬£¬£¬ÊÇÓÉÁôÃÀ²©Ê¿ÑÏÍû¼ÑŮʿ½¨ÉèµÄ¡¢ÓµÓÐÍêÈ«×ÔÖ÷֪ʶ²úȨµÄÐÅÏ¢Çå¾²¸ß¿Æ¼¼ÆóÒµ¡£¡£¡£ÊǺ£ÄÚ×î¾ßʵÁ¦µÄÐÅÏ¢Çå¾²²úÆ·¡¢Ç徲ЧÀͽâ¾ö¼Æ»®µÄÁ캽ÆóÒµÖ®Ò»¡£¡£¡£
¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°ÍòÀû¹ú¼Ê¹ÙÍø´óÏ㬣¬£¬£¬£¬£¬£¬¹«Ë¾Ô±¹¤6000ÓàÈË£¬£¬£¬£¬£¬£¬£¬Ñз¢ÍŶÓ1200ÓàÈË, ÊÖÒÕЧÀÍÍŶÓ1300ÓàÈË¡£¡£¡£ÔÚÌìϸ÷Ê¡¡¢ÊС¢×ÔÖÎÇøÉèÁ¢·ÖÖ§»ú¹¹ÁùÊ®¶à¸ö£¬£¬£¬£¬£¬£¬£¬ÓµÓÐÁýÕÖÌìϵÄÏúÊÛϵͳ¡¢ÇþµÀϵͳºÍÊÖÒÕÖ§³Öϵͳ¡£¡£¡£¹«Ë¾ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉîÛÚÖÐС°å¹ÒÅÆÉÏÊС£¡£¡££¨¹ÉƱ´úÂ룺002439£©
¶àÄêÀ´£¬£¬£¬£¬£¬£¬£¬ÍòÀû¹ú¼Ê¹ÙÍøÖÂÁ¦ÓÚÌṩ¾ßÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷Á¢ÒìµÄÇå¾²²úÆ·ºÍ×î¼Ñʵ¼ùЧÀÍ£¬£¬£¬£¬£¬£¬£¬×ÊÖú¿Í»§ÖÜÈ«ÌáÉýÆäIT»ù´¡ÉèÊ©µÄÇå¾²ÐÔºÍÉú²úЧÄÜ£¬£¬£¬£¬£¬£¬£¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢Çå¾²¹¤ÒµÁì¾üÆ·ÅÆ¶ø²»Ð¸Æð¾¢¡£¡£¡£
6.2 ¹ØÓÚÍòÀû¹ú¼Ê¹ÙÍø
ÍòÀû¹ú¼Ê¹ÙÍøÇå¾²Ó¦¼±ÏìÓ¦ÖÐÐÄÒÑÐû²¼1000¶à¸öÎó²îͨ¸æºÍΣº¦Ô¤¾¯£¬£¬£¬£¬£¬£¬£¬ÎÒÃǽ«Ò»Á¬¸ú×ÙÈ«Çò×îеÄÍøÂçÇå¾²ÊÂÎñºÍÎó²î£¬£¬£¬£¬£¬£¬£¬ÎªÆóÒµµÄÐÅÏ¢Çå¾²±£¼Ý»¤º½¡£¡£¡£
¹Ø×¢ÎÒÃÇ£º



¾©¹«Íø°²±¸11010802024551ºÅ