CVE-2020-4703 | Spectrum Protect Plusí§Òâ´úÂëÖ´ÐÐÎó²îͨ¸æ

Ðû²¼Ê±¼ä 2020-09-16

0x00 Îó²î¸ÅÊö

²úÆ·Ãû³Æ

CVE ID

Àà ÐÍ

Îó²îÆ·¼¶

Ô¶³ÌʹÓÃ

Ó°Ïì¹æÄ£

IBM Spectrum Protect Plus

CVE-2020-4703

í§Òâ´úÂëÖ´ÐÐ

¸ßΣ

ÊÇ

10.1.0-10.1.6°æ±¾

 

IBM Spectrum Protect PlusÊÇÓÃÓÚÐéÄâÇéÐεÄÊý¾Ý±£»¤ºÍ¿ÉÓÃÐÔ½â¾ö¼Æ»®£¬¿ÉÔÚ¼¸·ÖÖÓÄÚÍê³É°²ÅÅ£¬²¢ÔÚһСʱÄÚΪÇéÐÎÌṩ±£»¤¡£Ëü½«Êý¾Ý±£»¤»¯·±Îª¼ò£¬ÎÞÂÛÊÇ´æ´¢ÔÚÎïÀíÇéÐΡ¢ÐéÄâÇéÐΡ¢Èí¼þ½ç˵µÄÇéÐÎÕÕ¾ÉÔÆÇéÐÎÖеÄÊý¾Ý¶¼ÊÇÔÆÔÆ¡£Ëü¿É×÷Ϊ×ÔÁ¦½â¾ö¼Æ»®À´ÊµÑ飬»òÕßÓë IBM Spectrum Protect ÇéÐμ¯³É£¬´Ó¶ø´ó¹æÄ£¸ßÐ§×ªÒÆ¸±±¾ÓÃÓÚºã¾Ã´æ´¢ºÍÊý¾Ýî¿Ïµ¡£

2020Äê9ÔÂ14ÈÕ£¬IBM¹Ù·½Ðû²¼ÆäSpectrum Protect PlusµÄÖÎÀí¿ØÖÆÌ¨Öб£´æÒ»¸öµÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2020-4703£©£¬¸ÃÎó²îÊÇÓÉÓÚ6ÔÂÅû¶µÄÒ»¸ö¸ßΣÎó²îCVE-2020-4470µÄÐÞ¸´²»ÍêÕûÔì³ÉµÄ¡£ÆäCVSSÆÀ·ÖΪ8¡£

0x01 Îó²îÏêÇé

image.png 

 

CVE-2020-4470ÊÇIBM Spectrum Protect Plus 10.1.0µ½10.1.5°æ±¾Öб£´æµÄÒ»¸öí§Òâ´úÂëÖ´ÐÐÎó²î¡£ÀÖ³ÉʹÓøÃÎó²îµÄ¹¥»÷Õß¿ÉÒÔÉÏ´«í§ÒâÎļþµ½Ò×Êܹ¥»÷µÄ·þÎñÆ÷ÉÏÖ´ÐÐí§Òâ´úÂë¡£CVE-2020-4770Îó²îʹÓÃÐèÒªÁ½¸ö°ì·¨¡£

µÚÒ»²½ÊÇͨ¹ýÏòURL¶Ëµãhttps://<spp_host>:8090/api/plugin·¢ËÍHTTP POSTÐÂÎÅ£¬½«¶ñÒâµÄRPMÈí¼þ°üÉÏ´«µ½ÖÎÀíÔ±ÕÊ»§¿ÉдµÄĿ¼ÖС£

µÚ¶þ²½ÊÇͨ¹ýÏòURL¶Ëµãhttp://<spp_host>:8090/emi/api/hotfix·¢ËÍHTTP POSTÐÂÎÅÀ´×°ÖöñÒâRPM°ü¡£

ÔÚÒ×Êܹ¥»÷µÄ·þÎñÆ÷ÉÏ£¬Á½¸ö°ì·¨¶¼²»ÐèÒªÉí·ÝÑéÖ¤¡£CVE-2020-4470µÄÐÞ¸´³ÌÐò½öͨ¹ý¶Ô/emi/api/hotfix¶ËµãÇ¿ÖÆÖ´ÐÐÉí·ÝÑéÖ¤À´½â¾öµÚ¶þ¸ö°ì·¨¡£ËüÈÔÈ»ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄí§ÒâÎļþÉÏ´«µ½ÖÎÀíÔ±ÕÊ»§¿ÉдµÄĿ¼²¢ÔÚ¸ÃĿ¼ÏÂÔËÐС£Õâµ¼Ö¶ñÒâ¹¥»÷Õß¿ÉÓëCVE-2020-4711Îó²îÍŽáʹÓ㬽«ÈκÎÎļþÉÏ´«µ½·þÎñÆ÷µÄí§ÒâĿ¼£¬´Ó¶øµ¼ÖÂδ¾­Éí·ÝÑéÖ¤µÄRCE¡£

¸ÃÎó²îµÄPoCÈçÏ£º

image.png 

 

±¾´ÎIBM»¹ÐÞ¸´ÁËSpectrum Protect PlusµÄÒ»¸öĿ¼±éÀúÎó²î£¨CVE-2020-4711£©¡£

CVE-2020-4711ÊÇSpectrum Protect PlusµÄ¾ç±¾/opt/ECX/tools/scripts/restore_wrapper.shÖеÄÒ»¸öĿ¼±éÀúÎó²î¡£¸ÃÎó²îÊÇÓÉÓÚĿ¼·¾¶µÄ¼ì²é±»Èƹý¡£

image.png 

δ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉÒÔͨ¹ýÏòURL¶Ëµãhttps://<spp_host>:8090/catalogmanager/api/catalog·¢ËÍÌØÖÆµÄHTTPÇëÇóÀ´Ê¹ÓôËÎÊÌ⣬µ±cmode²ÎÊýΪrestorefromjobʱ£¬²»ÐèÒªÉí·ÝÑéÖ¤£º

image.png 

¶Ëµã´¦Öóͷ£³ÌÐòŲÓÃcom.catalogic.ecx.catalogmanager.domain.CatalogManagerServiceImpl.restoreFromJobÒªÁ죬¶øÎÞÐè¼ì²éÓû§Æ¾Ö¤¡£restoreFromJobÒªÁìÒÔrootÓû§Éí·ÝÖ´ÐÐ/opt/ECX/tools/scripts/restore_wrapper.sh¾ç±¾£¬½«¹¥»÷Õß¿ØÖƵÄHTTP²ÎÊýctarget / cRestoreTargetת´ï¸ø¸Ã¾ç±¾£º

image.png 

Õâʹ¹¥»÷Õß¿ÉÒÔͨ¹ý·¾¶±éÀúÖ´ÐÐchmod -R 777£º

image.png 

 

0x02 ´¦Öóͷ£½¨Òé

ÏÖÔÚ£¬IBM¹Ù·½ÒѾ­Ðû²¼ÔÝʱÐÞ¶©°æ±¾£¬½¨Ò龡¿ì¾ÙÐÐÇå¾²¸üС£

ÏÂÔØÁ´½Ó¼°×°ÖÃ˵Ã÷£º

https://www.ibm.com/support/pages/node/6254732

0x03 Ïà¹ØÐÂÎÅ

https://threatpost.com/rce-exploit-ibm-data-risk-manager-no-patch/154986/

 

0x04 ²Î¿¼Á´½Ó

https://www.ibm.com/support/pages/node/6328867

https://www.tenable.com/cve/CVE-2020-4470

https://zh-cn.tenable.com/security/research/tra-2020-54?tns_redirect=true

0x05 Ê±¼äÏß

2020-09-1 IBMÐû²¼Îó²îͨ¸æ

2020-09-16  VSRCÐû²¼Ç徲ͨ¸æ

 

image.png