¡¾Îó²îͨ¸æ¡¿Microsoft Exchange ServerÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2022-41082£©
Ðû²¼Ê±¼ä 2022-10-010x00 Îó²î¸ÅÊö
CVE ID | CVE-2022-41082 | ·¢Ã÷ʱ¼ä | 2022-09-30 |
Àà ÐÍ | RCE | µÈ ¼¶ | ¸ßΣ |
Ô¶³ÌʹÓà | Ó°Ïì¹æÄ£ | ||
¹¥»÷ÖØÆ¯ºó | Óû§½»»¥ | ||
PoC/EXP | ÔÚҰʹÓà | ÊÇ |
0x01 Îó²îÏêÇé
9ÔÂ29ÈÕ£¬£¬£¬£¬£¬£¬£¬Î¢ÈíÇå¾²ÏìÓ¦ÖÐÐÄÐû²¼Ç徲ͨ¸æ£¬£¬£¬£¬£¬£¬£¬¹ûÕæÁËMicrosoft Exchange ServerÖÐÒѱ»Ê¹ÓõÄ2¸ö0 dayÎó²î£¨ProxyNotShell£©£¬£¬£¬£¬£¬£¬£¬¿ÉÔÚ¾ÓÉExchange ServerÉí·ÝÑéÖ¤²¢ÇÒ¾ßÓÐ PowerShell ²Ù×÷ȨÏÞµÄÇéÐÎÏÂʹÓÃÕâЩÎó²î£¨×éºÏʹÓã©Ô¶³ÌÖ´ÐжñÒâ´úÂ룺
CVE-2022-41040£ºMicrosoft Exchange ServerЧÀÍÆ÷¶ËÇëÇóαÔì (SSRF) Îó²î
CVE-2022-41082£ºMicrosoft Exchange ServerÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©Îó²î
ÏÖÔÚÕâЩÎó²îÒѾ±»Ê¹Ó㬣¬£¬£¬£¬£¬£¬²¢·¢Ã÷ÔÚÊÜѬȾµÄЧÀÍÆ÷Éϰ²ÅÅwebshell¡£¡£¡£¡£¡£¡£
Ó°Ïì¹æÄ£
Microsoft Exchange Server 2013
Microsoft Exchange Server 2016
Microsoft Exchange Server 2019
0x02 Çå¾²½¨Òé
΢ÈíÒѾÐû²¼ÁËÏà¹ØÎó²îµÄ¿Í»§Ö¸ÄÏ£¬£¬£¬£¬£¬£¬£¬ÊÜÓ°Ïì¿Í»§¿É²Î¿¼ÊµÑéÖ¸ÄÏÖеĻº½â²½·¥£º
1.Microsoft Exchange Online ¿Í»§ÎÞÐè½ÓÄÉÈκÎÐж¯¡£¡£¡£¡£¡£¡£
2.ÍâµØ Microsoft Exchange ¿Í»§Ó¦Éó²é²¢Ó¦ÓÃÒÔÏ URL ÖØÐ´£¨URL Rewrite£©ËµÃ÷²¢×èֹ̻¶µÄÔ¶³Ì PowerShell ¶Ë¿Ú¡£¡£¡£¡£¡£¡£
»º½â²½·¥£ºÔÚ¡°IIS ÖÎÀíÆ÷ -> ĬÈÏÍøÕ¾ -> ×Ô¶¯·¢Ã÷ -> URL ÖØÐ´ -> ²Ù×÷¡±ÖÐÌí¼Ó×èÖ¹¹æÔò£¬£¬£¬£¬£¬£¬£¬ÒÔ×èÖ¹ÒÑÖªµÄ¹¥»÷ģʽ¡£¡£¡£¡£¡£¡££¨×¢£ºÈôÊÇÆ¾Ö¤½¨Òé×ÔÐÐ×°ÖÃURLÖØÐ´Ä£¿£¿£¿é£¬£¬£¬£¬£¬£¬£¬¶ÔExchange¹¦Ð§Ã»ÓÐÒÑÖªµÄÓ°Ïì¡£¡£¡£¡£¡£¡££©
°ì·¨£º
l ·¿ª IIS ÖÎÀíÆ÷¡£¡£¡£¡£¡£¡£
l Õö¿ªÄ¬ÈÏÍøÕ¾¡£¡£¡£¡£¡£¡£
l Ñ¡Ôñ×Ô¶¯·¢Ã÷¡£¡£¡£¡£¡£¡£
l ÔÚ¹¦Ð§ÊÓͼÖУ¬£¬£¬£¬£¬£¬£¬µ¥»÷ URL ÖØÐ´¡£¡£¡£¡£¡£¡£
l ÔÚÓÒ²àµÄ¡°²Ù×÷¡±´°¸ñÖУ¬£¬£¬£¬£¬£¬£¬µ¥»÷¡°Ìí¼Ó¹æÔò¡±¡£¡£¡£¡£¡£¡£
l Ñ¡ÔñÇëÇó×èÖ¹£¬£¬£¬£¬£¬£¬£¬È»ºóµ¥»÷È·¶¨¡£¡£¡£¡£¡£¡£
l Ìí¼Ó×Ö·û´®¡°.*autodiscover\.json.*\@.*Powershell.*¡±£¨²»°üÀ¨ÒýºÅ£©£¬£¬£¬£¬£¬£¬£¬È»ºóµ¥»÷¡°È·¶¨¡±¡£¡£¡£¡£¡£¡£
l Õö¿ª¹æÔò²¢Ñ¡ÔñģʽΪ¡°.*autodiscover\.json.*\@.*Powershell.*¡±µÄ¹æÔò£¬£¬£¬£¬£¬£¬£¬È»ºóµ¥»÷Ìõ¼þϵı༡£¡£¡£¡£¡£¡£
l ½«Ìõ¼þÊäÈë´Ó {URL} ¸ü¸ÄΪ {REQUEST_URI} ¡£¡£¡£¡£¡£¡£
±ðµÄ£¬£¬£¬£¬£¬£¬£¬¾ÓÉÈÏÖ¤µÄ¹¥»÷ÕßÈôÊÇÄÜÔÚ±£´æÎó²îµÄExchangeϵͳÉÏ»á¼ûPowerShell Remoting£¬£¬£¬£¬£¬£¬£¬¾Í¿ÉÒÔʹÓÃCVE-2022-41082´¥·¢RCE¡£¡£¡£¡£¡£¡£½¨ÒéÖÎÀíÔ±×èÖ¹ÒÔÏÂÔ¶³Ì PowerShell ¶Ë¿ÚÒÔ×èÖ¹¹¥»÷£º
? HTTP£º5985
? HTTPS£º5986
ÈôÊÇÏë¼ì²é Exchange ServerÊÇ·ñÒѱ»ÈëÇÖ£¬£¬£¬£¬£¬£¬£¬ÖÎÀíÔ±¿ÉÒÔʹÓÃÒÔÏ·½·¨£º
1.ÔËÐÐÒÔÏ PowerShell ÏÂÁîÀ´É¨Ãè IIS ÈÕÖ¾ÎļþÒÔѰÕÒÈëÇÖ¼£Ïó£º
Get-ChildItem -Recurse -Path
2.ʹÓÃGTSC¿ª·¢µÄËÑË÷¹¤¾ß£¬£¬£¬£¬£¬£¬£¬»ùÓÚexploitÊðÃû£¬£¬£¬£¬£¬£¬£¬ËÑË÷ʱ¼ä±ÈʹÓÃpowershellÒª¶Ì¡£¡£¡£¡£¡£¡£
ÏÂÔØÁ´½Ó£ºhttps://github.com/ncsgroupvn/NCSE0Scanner
×¢£º1.ÈôÒѱ»¹¥»÷£¬£¬£¬£¬£¬£¬£¬IIS ÈÕÖ¾ÖпÉÄܼì²âµ½Óë ProxyShell Îó²îÃûÌÃÀàËÆµÄʹÓÃÇëÇó£ºautodiscover/autodiscover.json?@evil.com/
2.»º½â²½·¥£¨¸üУ©Ïê¼û²Î¿¼Á´½ÓÖеÄ΢ÈíÇå¾²Ö¸ÄÏ¡£¡£¡£¡£¡£¡£
0x03 ²Î¿¼Á´½Ó
https://msrc-blog.microsoft.com/2022/09/29/customer-guidance-for-reported-zero-day-vulnerabilities-in-microsoft-exchange-server/
https://gteltsc.vn/blog/warning-new-attack-campaign-utilized-a-new-0day-rce-vulnerability-on-microsoft-exchange-server-12715.html
0x04 °æ±¾ÐÅÏ¢
°æ±¾ | ÈÕÆÚ | ÐÞ¸ÄÄÚÈÝ |
V1.0 | 2022-09-30 | Ê×´ÎÐû²¼ |
0x05 ¸½Â¼
¼øºÚµ£±£Íø¼ò½é
¼øºÚµ£±£Íø½¨ÉèÓÚ1996Ä꣬£¬£¬£¬£¬£¬£¬ÊÇÓÉÁôÃÀ²©Ê¿ÑÏÍû¼ÑŮʿ½¨ÉèµÄ¡¢ÓµÓÐÍêÈ«×ÔÖ÷֪ʶ²úȨµÄÐÅÏ¢Çå¾²¸ß¿Æ¼¼ÆóÒµ¡£¡£¡£¡£¡£¡£ÊǺ£ÄÚ×î¾ßʵÁ¦µÄÐÅÏ¢Çå¾²²úÆ·¡¢Ç徲ЧÀͽâ¾ö¼Æ»®µÄÁ캽ÆóÒµÖ®Ò»¡£¡£¡£¡£¡£¡£
¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°¼øºÚµ£±£Íø´óÏ㬣¬£¬£¬£¬£¬£¬¹«Ë¾Ô±¹¤½ü4000ÈË£¬£¬£¬£¬£¬£¬£¬Ñз¢ÍŶÓ1200ÓàÈË, ÊÖÒÕЧÀÍÍŶÓ1300ÓàÈË¡£¡£¡£¡£¡£¡£ÔÚÌìϸ÷Ê¡¡¢ÊС¢×ÔÖÎÇøÉèÁ¢·ÖÖ§»ú¹¹ÁùÊ®¶à¸ö£¬£¬£¬£¬£¬£¬£¬ÓµÓÐÁýÕÖÌìϵÄÏúÊÛϵͳ¡¢ÇþµÀϵͳºÍÊÖÒÕÖ§³Öϵͳ¡£¡£¡£¡£¡£¡£¹«Ë¾ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉîÛÚÖÐС°å¹ÒÅÆÉÏÊС£¡£¡£¡£¡£¡££¨¹ÉƱ´úÂ룺002439£©
¶àÄêÀ´£¬£¬£¬£¬£¬£¬£¬¼øºÚµ£±£ÍøÖÂÁ¦ÓÚÌṩ¾ßÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷Á¢ÒìµÄÇå¾²²úÆ·ºÍ×î¼Ñʵ¼ùЧÀÍ£¬£¬£¬£¬£¬£¬£¬×ÊÖú¿Í»§ÖÜÈ«ÌáÉýÆäIT»ù´¡ÉèÊ©µÄÇå¾²ÐÔºÍÉú²úЧÄÜ£¬£¬£¬£¬£¬£¬£¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢Çå¾²¹¤ÒµÁì¾üÆ·ÅÆ¶ø²»Ð¸Æð¾¢¡£¡£¡£¡£¡£¡£
¹ØÓÚ¼øºÚµ£±£Íø
¼øºÚµ£±£ÍøÇå¾²Ó¦¼±ÏìÓ¦ÖÐÐÄÖ÷ÒªÕë¶ÔÖ÷ÒªÇå¾²Îó²îµÄÔ¤¾¯¡¢¸ú×ٺͷÖÏíÈ«Çò×îеÄÍþвÇ鱨ºÍÇå¾²±¨¸æ¡£¡£¡£¡£¡£¡£
¹Ø×¢ÒÔϹ«Öںţ¬£¬£¬£¬£¬£¬£¬»ñȡȫÇò×îÐÂÇå¾²×ÊѶ£º