低危 Oracle Secure Global Desktop 5.3 Web Server 内存错误引用漏洞
CVE编号
CVE-2017-9798利用情况
POC 已公开补丁情况
官方补丁披露时间
2017-09-19漏洞描述
如果可以在用户的.htaccess文件中设置Limit指令,或者如果httpd.conf具有某些错误配置(即Optionsbleed),则Apache httpd允许远程攻击者从进程内存中读取秘密数据。这会影响 Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27。在尝试读取机密数据时,攻击者会发送未经身份验证的OPTIONS HTTP请求。这是一个UAF的问题,因此并不总是发送秘密数据,具体数据取决于许多因素,包括配置。可以使用server/core.c中的ap_limit_section函数的patch来阻止.htaccess的使用。解决建议
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:https://svn.apache.org/viewvc/httpd/httpd/branches/2.4.x/server/core.c?r1=1805223&r2=1807754&pathrev=1807754&view=patchhttps://github.com/hannob/optionsbleedhttps://github.com/apache/httpd/commit/29afdd2550b3d30a8defece2b95ae81edcf66ac9https://blog.fuzzing-project.org/uploads/apache-2.2-optionsbleed-backport.patch受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | apache | http_server | * | Up to (including) 2.2.34 | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.4.0 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.4.1 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.4.10 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.4.12 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.4.16 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.4.17 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.4.18 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.4.2 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.4.20 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.4.23 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.4.25 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.4.26 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.4.27 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.4.3 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.4.4 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.4.6 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.4.7 | - | |||||
运行在以下环境 | |||||||||
应用 | apache | http_server | 2.4.9 | - | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.10 | apache2 | * | Up to (excluding) 2.4.27-r1 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.11 | apache2 | * | Up to (excluding) 2.4.27-r1 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.12 | apache2 | * | Up to (excluding) 2.4.27-r1 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.13 | apache2 | * | Up to (excluding) 2.4.27-r1 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.14 | apache2 | * | Up to (excluding) 2.4.27-r1 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.15 | apache2 | * | Up to (excluding) 2.4.27-r1 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.16 | apache2 | * | Up to (excluding) 2.4.27-r1 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.17 | apache2 | * | Up to (excluding) 2.4.27-r1 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.18 | apache2 | * | Up to (excluding) 2.4.27-r1 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.3 | apache2 | * | Up to (excluding) 2.4.27-r1 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.4 | apache2 | * | Up to (excluding) 2.4.27-r1 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.5 | apache2 | * | Up to (excluding) 2.4.27-r1 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.6 | apache2 | * | Up to (excluding) 2.4.27-r1 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.7 | apache2 | * | Up to (excluding) 2.4.27-r1 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.8 | apache2 | * | Up to (excluding) 2.4.27-r1 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.9 | apache2 | * | Up to (excluding) 2.4.27-r1 | |||||
运行在以下环境 | |||||||||
系统 | alpine_edge | apache2 | * | Up to (excluding) 2.4.27-r1 | |||||
运行在以下环境 | |||||||||
系统 | amazon_AMI | httpd24 | * | Up to (excluding) 2.4.27-3.73.amzn1 | |||||
运行在以下环境 | |||||||||
系统 | centos_6 | httpd-devel | * | Up to (excluding) 2.2.15-60.el6.centos.6 | |||||
运行在以下环境 | |||||||||
系统 | centos_7 | httpd | * | Up to (excluding) 2.4.6-67.el7.centos.5 | |||||
运行在以下环境 | |||||||||
系统 | debian_10 | apache2 | * | Up to (excluding) 2.4.27-6 | |||||
运行在以下环境 | |||||||||
系统 | debian_11 | apache2 | * | Up to (excluding) 2.4.27-6 | |||||
运行在以下环境 | |||||||||
系统 | debian_12 | apache2 | * | Up to (excluding) 2.4.27-6 | |||||
运行在以下环境 | |||||||||
系统 | debian_7 | apache2 | * | Up to (excluding) 2.2.22-13+deb7u12 | |||||
运行在以下环境 | |||||||||
系统 | debian_8 | apache2 | * | Up to (excluding) 2.4.10-10+deb8u5 | |||||
运行在以下环境 | |||||||||
系统 | debian_9 | apache2 | * | Up to (excluding) 2.4.25-3+deb9u3 | |||||
运行在以下环境 | |||||||||
系统 | debian_sid | apache2 | * | Up to (excluding) 2.4.27-6 | |||||
运行在以下环境 | |||||||||
系统 | fedora_25 | mod_proxy_html | * | Up to (excluding) 2.4.27-4.fc25 | |||||
运行在以下环境 | |||||||||
系统 | fedora_26 | httpd-filesystem | * | Up to (excluding) 2.4.27-3.fc26 | |||||
运行在以下环境 | |||||||||
系统 | fedora_27 | httpd-tools-debuginfo | * | Up to (excluding) 2.4.27-8.fc27 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_aarch64_V10 | httpd | * | Up to (excluding) 2.4.6-97.el7_9.4.ns7.02 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_x86_64_V10 | httpd | * | Up to (excluding) 2.4.6-97.el7_9.4.ns7.02 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_42.2 | apache2-event | * | Up to (excluding) 2.4.23-16.1 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_42.3 | apache2-event | * | Up to (excluding) 5.1.36-50.1 | |||||
运行在以下环境 | |||||||||
系统 | oracle_6 | oraclelinux-release | * | Up to (excluding) 2.2.15-60.0.1.el6_9.6 | |||||
运行在以下环境 | |||||||||
系统 | oracle_7 | oraclelinux-release | * | Up to (excluding) 2.4.6-67.0.1.el7_4.5 | |||||
运行在以下环境 | |||||||||
系统 | redhat_6 | httpd | * | Up to (excluding) 0:2.2.15-60.el6_9.6 | |||||
运行在以下环境 | |||||||||
系统 | redhat_7 | httpd | * | Up to (excluding) 2.4.6-67.el7_4.5 | |||||
运行在以下环境 | |||||||||
系统 | suse_11_SP4 | apache2-example-pages | * | Up to (excluding) 2.2.34-70.12.1 | |||||
运行在以下环境 | |||||||||
系统 | suse_12 | apache2 | * | Up to (excluding) 2.4.23-29.6 | |||||
运行在以下环境 | |||||||||
系统 | suse_12_SP2 | apache2-example-pages | * | Up to (excluding) 2.4.23-29.6.1 | |||||
运行在以下环境 | |||||||||
系统 | suse_12_SP3 | apache2-example-pages | * | Up to (excluding) 2.4.23-29.6.1 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_14.04 | apache2 | * | Up to (excluding) 2.4.7-1ubuntu4.18 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_14.04.6_lts | apache2 | * | Up to (excluding) 2.4.7-1ubuntu4.18 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04 | apache2 | * | Up to (excluding) 2.4.18-2ubuntu3.5 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04.7_lts | apache2 | * | Up to (excluding) 2.4.18-2ubuntu3.5 | |||||
- 攻击路径 远程
- 攻击复杂度 复杂
- 权限要求 无需权限
- 影响范围 有限影响
- EXP成熟度 POC 已公开
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 100
CWE-ID | 漏洞类型 |
CWE-416 | 释放后使用 |
Exp相关链接
- https://github.com/brokensound77/OptionsBleed-POC-Scanner
- https://github.com/l0n3rs/CVE-2017-9798
- https://github.com/nitrado/CVE-2017-9798
- https://github.com/pabloec20/optionsbleed
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/scanner/http/apache_optionsbleed.rb
- https://www.exploit-db.com/exploits/42745

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论