¡¾Îó²îͨ¸æ¡¿Jenkins¿çÕ¾¾ç±¾Îó²îCorePlague

Ðû²¼Ê±¼ä 2023-03-09


Ò»¡¢Îó²î¸ÅÊö

CVE   ID

CVE-2023-27898

·¢Ã÷ʱ¼ä

2023-03-09

Àà    ÐÍ

XSS

µÈ    ¼¶

¸ßΣ

Ô¶³ÌʹÓÃ

ÊÇ

ËùÐèȨÏÞ

ÎÞ

¹¥»÷ÖØÆ¯ºó

µÍ

Óû§½»»¥

ÊÇ

PoC/EXP

δ¹ûÕæ

ÔÚҰʹÓÃ

·ñ

 

JenkinsÊÇÒ»¸ö¿ªÔ´Èí¼þÏîÄ¿£¬£¬ £¬£¬£¬ËüÊÇ»ùÓÚJava¿ª·¢µÄÒ»ÖÖÒ»Á¬¼¯³É¹¤¾ß£¬£¬ £¬£¬£¬ÓÃÓÚ¼à¿ØÒ»Á¬Öظ´µÄÊÂÇ飬£¬ £¬£¬£¬Ö¼ÔÚÌṩһ¸ö¿ª·ÅÒ×ÓõÄÈí¼þƽ̨£¬£¬ £¬£¬£¬Ê¹Èí¼þÏîÄ¿¿ÉÒÔ¾ÙÐÐÒ»Á¬¼¯³É¡£¡£

3ÔÂ9ÈÕ£¬£¬ £¬£¬£¬ÄϹ¬NGÓéÀÖVSRC¼à²âµ½Jenkins¹Ù·½Ðû²¼Ç徲ͨ¸æ£¬£¬ £¬£¬£¬ÐÞ¸´ÁËJenkins ServerºÍUpdate CenterÖз¢Ã÷µÄ2¸ö¿çÕ¾¾ç±¾Îó²î£¨CVE-2023-27898ºÍCVE-2023-27905£¬£¬ £¬£¬£¬Í³³ÆÎª¡°CorePlague¡±£©¡£¡£Î´¾­Éí·ÝÑéÖ¤µÄÍþвÕß¿ÉʹÓÃÕâЩÎó²îÔÚÊܺ¦ÕßµÄ Jenkins ServerÉÏÖ´ÐÐí§Òâ´úÂ룬£¬ £¬£¬£¬¿ÉÄܵ¼Ö Jenkins Serve±»ÍêÈ«ÆÆË𣬣¬ £¬£¬£¬Îó²îÏêÇéÈçÏ£º

CVE-2023-27898£ºJenkins Plugin Manager¿çÕ¾¾ç±¾Îó²î£¨¸ßΣ£©

Jenkins 2.270-2.393¡¢LTS 2.277.1- 2.375.3ÔÚ²å¼þÖÎÀíÆ÷ÖзºÆð¹ýʧÐÂÎÅ£¬£¬ £¬£¬£¬ËµÃ÷ÆäÓëÄ¿½ñ°æ±¾µÄJenkins²»¼æÈÝʱ£¬£¬ £¬£¬£¬²»»áתÒå²å¼þËùÒÀÀµµÄ Jenkins °æ±¾£¬£¬ £¬£¬£¬¿ÉÄܵ¼ÖÂÊܵ½´æ´¢ÐÍXSSÎó²î¹¥»÷£¬£¬ £¬£¬£¬¿ÉʹÓøÃÎó²îÏòÉèÖõĸüÐÂÕ¾µãÌṩ²å¼þ£¬£¬ £¬£¬£¬²¢ÈÃJenkinsʵÀýÏÔʾ´ËÐÂÎÅ¡£¡£

CVE-2023-27905£ºJenkins update-center2 ¿çÕ¾¾ç±¾Îó²î£¨ÖÐΣ£©

update-center2ÊÇÓÃÓÚÌìÉúupdates.Jenkins.ioÉÏÍйܵÄJenkins¸üÐÂÕ¾µãµÄ¹¤¾ß¡£¡£

update-center2 ijЩ°æ±¾ÔÚ²å¼þÏÂÔØË÷ÒýÒ³ÃæÉÏ·ºÆðËùÐèµÄ Jenkins ½¹µã°æ±¾£¬£¬ £¬£¬£¬¸Ã°æ±¾È¡×Ô²å¼þÔªÊý¾Ý£¬£¬ £¬£¬£¬Î´¾­ÕûÀí£¬£¬ £¬£¬£¬¿ÉÄܵ¼Ö´洢ÐÍXSSÎó²î£¬£¬ £¬£¬£¬µ«Ê¹ÓøÃÎó²îÐèͬʱ֪×ãÒÔÏÂÌõ¼þ£º

1.ÐèÒªÆôÓÃÏÂÔØÒ³ÃæµÄÌìÉú£¨¼´--download-links-directoryÐèÒªÉèÖòÎÊý£©¡£¡£

2.±ØÐèʹÓÃ×Ô½ç˵ÏÂÔØÒ³ÃæÄ£°å£¨--index-template-url²ÎÊý£©£¬£¬ £¬£¬£¬ÇÒËùʹÓõÄÄ£°å²»µÃͨ¹ýContent-Security-Policy×èÖ¹JavaScriptÖ´ÐС£¡£Ä¬ÈÏÄ£°åͨ¹ýÉùÃ÷Ò»¸öÏÞÖÆÐÔµÄContent-Security-PolicyÀ´±ÜÃâʹÓᣡ£

 

¶þ¡¢Ó°Ïì¹æÄ£

Jenkins Server°æ±¾£º2.270 - 2.393¡¢LTS 2.277.1 - 2.375.3

Jenkins update-center2 °æ±¾£º<= 3.14

 

Èý¡¢Çå¾²²½·¥

3.1 Éý¼¶°æ±¾

ÏÖÔÚÕâЩÎó²îÒѾ­ÐÞ¸´£¬£¬ £¬£¬£¬ÊÜÓ°ÏìÓû§¿ÉÉý¼¶µ½ÒÔϰ汾£º

Jenkins Server°æ±¾£ºÉý¼¶µ½ 2.394¡¢LTS 2.375.4 »ò LTS 2.387.1¡£¡£

Jenkins update-center2°æ±¾£ºÉý¼¶µ½3.15¡£¡£

ÏÂÔØÁ´½Ó£º

https://www.jenkins.io/download/

3.2 ÔÝʱ²½·¥

ÔÝÎÞ¡£¡£

3.3 ͨÓý¨Òé

l  °´ÆÚ¸üÐÂϵͳ²¹¶¡£¡£¬£¬ £¬£¬£¬ïÔ̭ϵͳÎó²î£¬£¬ £¬£¬£¬ÌáÉýЧÀÍÆ÷µÄÇå¾²ÐÔ¡£¡£

l  ÔöǿϵͳºÍÍøÂçµÄ»á¼û¿ØÖÆ£¬£¬ £¬£¬£¬Ð޸ķÀ»ðǽսÂÔ£¬£¬ £¬£¬£¬¹Ø±Õ·ÇÐëÒªµÄÓ¦Óö˿ڻòЧÀÍ£¬£¬ £¬£¬£¬ïÔÌ­½«Î£ÏÕЧÀÍ£¨ÈçSSH¡¢RDPµÈ£©Ì»Â¶µ½¹«Íø£¬£¬ £¬£¬£¬ïÔÌ­¹¥»÷Ãæ¡£¡£

l  ʹÓÃÆóÒµ¼¶Çå¾²²úÆ·£¬£¬ £¬£¬£¬ÌáÉýÆóÒµµÄÍøÂçÇå¾²ÐÔÄÜ¡£¡£

l  ÔöǿϵͳÓû§ºÍȨÏÞÖÎÀí£¬£¬ £¬£¬£¬ÆôÓöàÒòËØÈÏÖ¤»úÖÆºÍ×îСȨÏÞÔ­Ôò£¬£¬ £¬£¬£¬Óû§ºÍÈí¼þȨÏÞÓ¦¼á³ÖÔÚ×îµÍÏÞ¶È¡£¡£

l  ÆôÓÃÇ¿ÃÜÂëÕ½ÂÔ²¢ÉèÖÃΪ°´ÆÚÐ޸ġ£¡£

3.4 ²Î¿¼Á´½Ó

https://www.jenkins.io/security/advisory/2023-03-08/

https://blog.aquasec.com/jenkins-server-vulnerabilities

https://thehackernews.com/2023/03/jenkins-security-alert-new-security.html


ËÄ¡¢°æ±¾ÐÅÏ¢

°æ±¾

ÈÕÆÚ

±¸×¢

V1.0

2023-03-09

Ê×´ÎÐû²¼

 

Îå¡¢¸½Â¼

5.1 ÄϹ¬NGÓéÀÖ¼ò½é

ÄϹ¬NGÓéÀÖ½¨ÉèÓÚ1996Ä꣬£¬ £¬£¬£¬ÊÇÓÉÁôÃÀ²©Ê¿ÑÏÍû¼ÑŮʿ½¨ÉèµÄ¡¢ÓµÓÐÍêÈ«×ÔÖ÷֪ʶ²úȨµÄÐÅÏ¢Çå¾²¸ß¿Æ¼¼ÆóÒµ¡£¡£ÊǺ£ÄÚ×î¾ßʵÁ¦µÄÐÅÏ¢Çå¾²²úÆ·¡¢Ç徲ЧÀͽâ¾ö¼Æ»®µÄÁ캽ÆóÒµÖ®Ò»¡£¡£

¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°ÄϹ¬NGÓéÀÖ´óÏ㬣¬ £¬£¬£¬¹«Ë¾Ô±¹¤6000ÓàÈË£¬£¬ £¬£¬£¬Ñз¢ÍŶÓ1200ÓàÈË, ÊÖÒÕЧÀÍÍŶÓ1300ÓàÈË¡£¡£ÔÚÌìϸ÷Ê¡¡¢ÊС¢×ÔÖÎÇøÉèÁ¢·ÖÖ§»ú¹¹ÁùÊ®¶à¸ö£¬£¬ £¬£¬£¬ÓµÓÐÁýÕÖÌìϵÄÏúÊÛϵͳ¡¢ÇþµÀϵͳºÍÊÖÒÕÖ§³Öϵͳ¡£¡£¹«Ë¾ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉîÛÚÖÐС°å¹ÒÅÆÉÏÊС£¡££¨¹ÉƱ´úÂ룺002439£©

¶àÄêÀ´£¬£¬ £¬£¬£¬ÄϹ¬NGÓéÀÖÖÂÁ¦ÓÚÌṩ¾ßÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷Á¢ÒìµÄÇå¾²²úÆ·ºÍ×î¼Ñʵ¼ùЧÀÍ£¬£¬ £¬£¬£¬×ÊÖú¿Í»§ÖÜÈ«ÌáÉýÆäIT»ù´¡ÉèÊ©µÄÇå¾²ÐÔºÍÉú²úЧÄÜ£¬£¬ £¬£¬£¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢Çå¾²¹¤ÒµÁì¾üÆ·ÅÆ¶ø²»Ð¸Æð¾¢¡£¡£

5.2 ¹ØÓÚÄϹ¬NGÓéÀÖ

ÄϹ¬NGÓéÀÖÇå¾²Ó¦¼±ÏìÓ¦ÖÐÐÄÒÑÐû²¼1000¶à¸öÎó²îͨ¸æºÍΣº¦Ô¤¾¯£¬£¬ £¬£¬£¬ÎÒÃǽ«Ò»Á¬¸ú×ÙÈ«Çò×îеÄÍøÂçÇå¾²ÊÂÎñºÍÎó²î£¬£¬ £¬£¬£¬ÎªÆóÒµµÄÐÅÏ¢Çå¾²±£¼Ý»¤º½¡£¡£

¹Ø×¢ÎÒÃÇ£º

image.png