¡¾Îó²îͨ¸æ¡¿F5 BIG-IP Next Central Manager SQL×¢ÈëÎó²î£¨CVE-2024-26026£©

Ðû²¼Ê±¼ä 2024-05-09

Ò»¡¢Îó²î¸ÅÊö

Îó²îÃû³Æ

F5 BIG-IP Next Central Manager SQL×¢ÈëÎó²î    

CVE   ID

CVE-2024-26026

Îó²îÀàÐÍ

SQL×¢Èë

·¢Ã÷ʱ¼ä

2024-05-09

Îó²îÆÀ·Ö

7.5

Îó²îÆ·¼¶

¸ßΣ

¹¥»÷ÏòÁ¿

ÍøÂç

ËùÐèȨÏÞ

ÎÞ

ʹÓÃÄѶÈ

µÍ

Óû§½»»¥

ÎÞ

PoC/EXP

ÒѹûÕæ

ÔÚҰʹÓÃ

δ·¢Ã÷

 

BIG-IP Next Central ManagerÊÇBIG-IP NextµÄÔ­ÉúĬÈÏÓû§½çÃæ£¬£¬£¬£¬£¬£¬Ëü¿É¿çƽ̨ÖÎÀíBIG-IP NextʵÀý¡£¡£BIG-IP NextÊÇF5 Networks¹«Ë¾ÍƳöµÄÒ»¿îÏÂÒ»´úBIG-IPÈí¼þ£¬£¬£¬£¬£¬£¬ÌṩÁ˶àÔÆÓ¦ÓÃÇå¾²ºÍÓ¦Óý»¸¶Ð§ÀÍ¡£¡£

2024Äê4ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬¿­Ðý¹ú¼ÊÓÎÏ·VSRC¼à²âµ½F5 NetworksÐû²¼Ç徲ͨ¸æ£¬£¬£¬£¬£¬£¬ÐÞ¸´ÁËBIG-IP Next Central ManagerÖеĶà¸ö×¢ÈëÎó²î£¬£¬£¬£¬£¬£¬ÍþвÕß¿ÉʹÓÃÕâЩÎó²î»ñÈ¡Ãô¸ÐÐÅÏ¢²¢¿ØÖÆ×°±¸¡£¡£ÕâЩÎó²îµÄCVSSÆÀ·Ö¾ùΪ7.5£¬£¬£¬£¬£¬£¬ÏÖÔÚPoCÒѹûÕæ£¬£¬£¬£¬£¬£¬ÏêÇéÈçÏ£º

CVE-2024-21793£ºBIG-IP Next Central Manager OData ×¢ÈëÎó²î

µ±ÆôÓà LDAPʱ£¬£¬£¬£¬£¬£¬BIG-IP Next Central Manager °æ±¾20.0.1 - 20.1.0µÄAPI (URI) Öб£´æOData ×¢ÈëÎó²î£¬£¬£¬£¬£¬£¬¸ÃÎó²î±£´æÓÚCentral Manager ´¦Öóͷ£ OData ÅÌÎʵķ½·¨ÖУ¬£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂδ¾­Éí·ÝÑéÖ¤µÄÍþвÕß×¢ÈëOData ÅÌÎʹýÂËÆ÷²ÎÊý£¬£¬£¬£¬£¬£¬´Ó¶ø»ñÈ¡Ãô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬ÈçÖÎÀíÔ±ÃÜÂë¹þÏ£µÈ¡£¡£

CVE-2024-26026£ºBIG-IP Next Central Manager SQL×¢ÈëÎó²î

BIG-IP Next Central Manager °æ±¾20.0.1 - 20.1.0µÄAPI (URI) Öб£´æSQL ×¢ÈëÎó²î£¬£¬£¬£¬£¬£¬Î´¾­Éí·ÝÑéÖ¤µÄÍþвÕ߿ɽ«¶ñÒâSQLÅÌÎÊ×¢ÈëÊý¾Ý¿âÅÌÎʵÄÊäÈë×ֶλò²ÎÊýÖУ¬£¬£¬£¬£¬£¬´Ó¶ø¿ÉÄܵ¼ÖÂδÊÚȨ»á¼û¡¢ÖÎÀíÓû§ÃÜÂë¹þÏ£µÈÃô¸ÐÊý¾Ýй¶ºÍϵͳ½ÓÊܵÈ¡£¡£

 

¶þ¡¢Îó²î¸´ÏÖ

CVE-2024-26026¸´ÏÖÈçÏ£º

image.png

 

Èý¡¢Ó°Ïì¹æÄ£

BIG-IP Next Central Manager 20.x £º20.0.1 - 20.1.0

 

ËÄ¡¢Çå¾²²½·¥

4.1 Éý¼¶°æ±¾

ÏÖÔÚÕâЩÎó²îÒѾ­ÐÞ¸´£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìÓû§¿É¸üе½BIG-IP Next Central Manager 20.2.0¡£¡£

ÏÂÔØÁ´½Ó£º

https://my.f5.com/manage/s/

4.2 ÔÝʱ²½·¥

ÎÞ·¨Á¬Ã¦×°ÖÃÄ¿½ñÇå¾²¸üеÄÓû§¿É½« F5 ²úÆ·µÄÖÎÆÊÎö¼ûȨÏÞÏÞÖÆÎª½ö¿Éͨ¹ýÇå¾²ÍøÂçºÍÊÜÐÅÈεÄÓû§ºÍ×°±¸»á¼û£¬£¬£¬£¬£¬£¬ÒÔ½µµÍ¹¥»÷Σº¦¡£¡£

4.3 ͨÓý¨Òé

l  °´ÆÚ¸üÐÂϵͳ²¹¶¡£¬£¬£¬£¬£¬£¬ïÔ̭ϵͳÎó²î£¬£¬£¬£¬£¬£¬ÌáÉýЧÀÍÆ÷µÄÇå¾²ÐÔ¡£¡£

l  ÔöǿϵͳºÍÍøÂçµÄ»á¼û¿ØÖÆ£¬£¬£¬£¬£¬£¬Ð޸ķÀ»ðǽսÂÔ£¬£¬£¬£¬£¬£¬¹Ø±Õ·ÇÐëÒªµÄÓ¦Óö˿ڻòЧÀÍ£¬£¬£¬£¬£¬£¬ïÔÌ­½«Î£ÏÕЧÀÍ£¨ÈçSSH¡¢RDPµÈ£©Ì»Â¶µ½¹«Íø£¬£¬£¬£¬£¬£¬ïÔÌ­¹¥»÷Ãæ¡£¡£

l  ʹÓÃÆóÒµ¼¶Çå¾²²úÆ·£¬£¬£¬£¬£¬£¬ÌáÉýÆóÒµµÄÍøÂçÇå¾²ÐÔÄÜ¡£¡£

l  ÔöǿϵͳÓû§ºÍȨÏÞÖÎÀí£¬£¬£¬£¬£¬£¬ÆôÓöàÒòËØÈÏÖ¤»úÖÆºÍ×îСȨÏÞÔ­Ôò£¬£¬£¬£¬£¬£¬Óû§ºÍÈí¼þȨÏÞÓ¦¼á³ÖÔÚ×îµÍÏÞ¶È¡£¡£

l  ÆôÓÃÇ¿ÃÜÂëÕ½ÂÔ²¢ÉèÖÃΪ°´ÆÚÐ޸ġ£¡£

4.4 ²Î¿¼Á´½Ó

https://my.f5.com/manage/s/article/K000138733

https://my.f5.com/manage/s/article/K000138732

https://eclypsium.com/blog/big-vulnerabilities-in-next-gen-big-ip/

 

Îå¡¢°æ±¾ÐÅÏ¢

°æ±¾

ÈÕÆÚ

±¸×¢

V1.0

2024-05-09

Ê×´ÎÐû²¼

V1.1

2024-05-10

ÐÂÔöÎó²î¸´ÏÖ

 

 

Áù¡¢¸½Â¼

6.1 ¿­Ðý¹ú¼ÊÓÎÏ·¼ò½é

¿­Ðý¹ú¼ÊÓÎÏ·½¨ÉèÓÚ1996Ä꣬£¬£¬£¬£¬£¬ÊÇÓÉÁôÃÀ²©Ê¿ÑÏÍû¼ÑŮʿ½¨ÉèµÄ¡¢ÓµÓÐÍêÈ«×ÔÖ÷֪ʶ²úȨµÄÐÅÏ¢Çå¾²¸ß¿Æ¼¼ÆóÒµ¡£¡£ÊǺ£ÄÚ×î¾ßʵÁ¦µÄÐÅÏ¢Çå¾²²úÆ·¡¢Ç徲ЧÀͽâ¾ö¼Æ»®µÄÁ캽ÆóÒµÖ®Ò»¡£¡£

¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°¿­Ðý¹ú¼ÊÓÎÏ·´óÏ㬣¬£¬£¬£¬£¬¹«Ë¾Ô±¹¤6000ÓàÈË£¬£¬£¬£¬£¬£¬Ñз¢ÍŶÓ1200ÓàÈË, ÊÖÒÕЧÀÍÍŶÓ1300ÓàÈË¡£¡£ÔÚÌìϸ÷Ê¡¡¢ÊС¢×ÔÖÎÇøÉèÁ¢·ÖÖ§»ú¹¹ÁùÊ®¶à¸ö£¬£¬£¬£¬£¬£¬ÓµÓÐÁýÕÖÌìϵÄÏúÊÛϵͳ¡¢ÇþµÀϵͳºÍÊÖÒÕÖ§³Öϵͳ¡£¡£¹«Ë¾ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉîÛÚÖÐС°å¹ÒÅÆÉÏÊС£¡££¨¹ÉƱ´úÂ룺002439£©

¶àÄêÀ´£¬£¬£¬£¬£¬£¬¿­Ðý¹ú¼ÊÓÎÏ·ÖÂÁ¦ÓÚÌṩ¾ßÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷Á¢ÒìµÄÇå¾²²úÆ·ºÍ×î¼Ñʵ¼ùЧÀÍ£¬£¬£¬£¬£¬£¬×ÊÖú¿Í»§ÖÜÈ«ÌáÉýÆäIT»ù´¡ÉèÊ©µÄÇå¾²ÐÔºÍÉú²úЧÄÜ£¬£¬£¬£¬£¬£¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢Çå¾²¹¤ÒµÁì¾üÆ·ÅÆ¶ø²»Ð¸Æð¾¢¡£¡£

6.2 ¹ØÓÚ¿­Ðý¹ú¼ÊÓÎÏ·

¿­Ðý¹ú¼ÊÓÎÏ·Çå¾²Ó¦¼±ÏìÓ¦ÖÐÐÄÒÑÐû²¼1000¶à¸öÎó²îͨ¸æºÍΣº¦Ô¤¾¯£¬£¬£¬£¬£¬£¬ÎÒÃǽ«Ò»Á¬¸ú×ÙÈ«Çò×îеÄÍøÂçÇå¾²ÊÂÎñºÍÎó²î£¬£¬£¬£¬£¬£¬ÎªÆóÒµµÄÐÅÏ¢Çå¾²±£¼Ý»¤º½¡£¡£

¹Ø×¢ÎÒÃÇ£º

image.png