产物&服务
攻防演练需要关注的高危误差清单
NOTICE
点
?
1.前言
2.近期袒露较多的误差
直到今天,我们在红蓝攻防演练中,作为攻击队依然发现大量可使用的nday误差。此类高频误差通告已于日前宣布,官方厂商也都宣布过补丁。但此类误差使用成熟度高,作为防守方仍需实时排查,尽快修补。
【近年高危误差(2024.05更新),清单由木牛实验室提供。】
高频误差清单一览表
序号 |
误差问题 |
影响规模 |
01 |
致远OA未授权短信验证码绕过重置密码误差 |
V5-G6、V8.1-SP2、V8.2 |
02 |
左券锁电子签章系统鉴权绕过远程代码执行误差 |
影响2023年8月以前的版本 |
03 |
亿赛通电子文档清静治理系统importFileType恣意文件上传误差 |
<=V5.6.1.109.122 |
04 |
绿盟WEB应用防护系统未授权密码重置误差 |
影响2023年8月以前的版本 |
05 |
腾讯企业微信敏感信息走漏误差 |
<=2.6.930000 |
06 |
JeecgBoot queryFieldBySql SSTI远程代码执行误差 |
>=3.0
<3.5.3 |
07 |
蓝凌OA sysUiComponent恣意文件上传误差 |
影响2023年8月以前的版本 |
08 |
Smartbi setEngineAddress权限绕过误差 |
清静补丁<2023-07-28 |
09 |
用友NC ServiceDispatcher远程代码执行误差 |
<=6.5 |
10 |
致远OA wpsAssistServlet恣意文件读取误差 |
V8.0-SP2 |
11 |
Confluence会见控制不妥误差(CVE-2023-22515) |
8.0.0 <= Atlassian Confluence < 8.3.3
8.4.0 <= Atlassian Confluence < 8.4.3
8.5.0 <= Atlassian Confluence < 8.5.2 |
12 |
致远OA getAjaxDataServlet XXE恣意文件读取误差 |
A6、A8、A8+ |
13 |
用友NC Cloud uploadChunk 恣意文件上传误差 |
<=6.5 |
14 |
Jeecg jeecgFormDemoController JNDI代码执行误差(CVE-2023-49442) |
<=4.0 |
15 |
Jeecg commonController恣意文件上传误差 |
<= 4.0 |
16 |
Confluence模版注入OGNL表达式(CVE-2023-22527) |
8.0.x
8.1.x
8.2.x
8.3.x
8.4.x
8.5.0-8.5.3 |
17 |
IDocView 2word恣意文件上传误差 |
<13.10.1_20231115 |
18 |
Apache Ofbiz XML-RPC认证绕过反序列化远程代码执行误差 |
<= 18.12.09 |
19 |
Gitlab密码重置账户接受误差 |
16.1 <= Gitlab CE/EE < 16.1.6
16.2 <= Gitlab CE/EE < 16.2.9
16.3 <= Gitlab CE/EE < 16.3.7
16.4 <= Gitlab CE/EE < 16.4.5
16.5 <= Gitlab CE/EE < 16.5.6
16.6 <= Gitlab CE/EE < 16.6.4
16.7 <= Gitlab CE/EE < 16.7.2 |
20 |
Jenkins恣意文件读取误差(CVE-2024-23897) |
<=2.441
<=LST2.426.2 |
21 |
Fortinet FortiOS和FortiProxy越界写入误差(CVE-2023-42789) |
7.4.0 < FortiOS?7.4.1
7.2.0
7.0.0
6.4.0
6.2.0 FortiProxy = 7.4.0
7.2.0
7.0.0
2.0.0 < FortiProxy < 2.0.13 |
22 |
pgAdmin4反序列化代码执行误差(CVE-2024-2044) |
< 8.4 |
23 |
Cisco IOS XE远程下令执行误差(CVE-2023-20198) |
16.3.5
16.12.4
17.3.5
17.6.1
17.9.4 |
24 |
XZ-Utils后门误差风险(CVE-2024-3094) |
5.6.0、5.6.1 |
25 |
Primeton EOS Platform /default/jmx.jmx反序列化远程代码执行误差 |
<=7.6 |
26 |
ZenTao PMS 项目治理系统身份认证绕过误差 |
16.x <= version < 18.12(开源版)
3.x <= version < 4.12(旗舰版)
6.x <= version < 8.12(企业版) |
27 |
JetBrains TeamCity认证绕过远程代码执行误差(CVE-2024-27198) |
<=2023.11.4 |
28 |
瑞友天翼应用虚拟化系统appsave SQL注入误差 |
|
29 |
Palo Alto GlobalProtect未授权远程下令执行误差(CVE-2024-3400) |
<11.1.0-h3,<11.1.1-h1,<11.1.2-h3,<11.0.0-h3,<11.0.1-h4,<11.0.2-h4,<11.0.3-h10,<11.0.4-h1,<10.2.0-h3,<10.2.1-h2,<10.2.2-h5,<10.2.3-h13,<10.2.4-h16,<10.2.5-h6,<10.2.6-h3,<10.2.7-h8,<10.2.8-h3,<10.2.9-h1 |
30 |
F5 BIG-IP TMUI远程代码执行误差(CVE-2023-46747) |
F5 BIG-IP <= 17.1.0
16.1.0 <= F5 BIG-IP <= 16.1.4
15.1.0 <= F5 BIG-IP <= 15.1.10
14.1.0 <= F5 BIG-IP <= 14.1.5
13.1.0 <= F5 BIG-IP <= 13.1.5 |
31 |
Zabbix Server Audit Log SQL注入致使RCE误差(CVE-2024-22120) |
6.0.0 <= Zabbix <= 6.0.27
6.4.0 <= Zabbix <= 6.4.12
7.0.0alpha1 <= Zabbix <= 7.0.0beta1 |
32 |
Sonatype Nexus Repository路径穿越误差(CVE-2024-4956) |
Sonatype Nexus Repository 3 < 3.68.1 |
3.需要关注的高危误差
除了现网遗漏的高频误差,esb世博网信息CERT梳理汇总了2024年7月22日之前新发的高危误差并编写了2024攻防演练高危误差清单(获取方式见文末),其内容不仅包罗误差名称、误差影响规模、清静版本以及误差形貌等,且对这些高危误差举行评估并标注了需要重点修复的误差,旨在为防守单元提高网络清静壁垒,助力着实时修复风险误差。
【需要关注的高危误差,由esb世博网信息CERT提供】
高危误差清单一览表
序号 |
误差问题 |
影响规模 |
修复建议 |
01 |
用友 YonBIP ServiceDispatcher 反序列化误差 |
YonBIP高级版2207 |
建议修复 |
02 |
用友NC Cloud Smart SQL注入误差 |
NCC1903、NCC1909、NCC2005、NCC2105、NCC2111、YonBIP高级版2207 |
建议修复 |
03 |
用友NC Cloud mob xstream 反序列化误差 |
NCC1909 / NCC2005/ NCC2105 |
建议修复 |
04 |
用友NC及NC Cloud ufoe 文件上传误差 |
NC63/ NC633/ NC65 / NCC1903 / NCC1909 / NCC2005/ NCC2105 / NCC2111 / YonBIP高级版2207 /YonBIP高级版2305 |
建议修复 |
05 |
用友NC Cloud jsinvoke 未授权会见误差 |
NCC1909 / NCC2005/ NCC2105/NCC2111/YonBIP高级版2207 |
建议修复 |
06 |
用友YonBIP高级版 ServiceDispatcher 反序列化误差 |
YonBIP高级版2207 |
建议修复 |
07 |
用友NC Cloud PMCloud JNDI注入误差 |
NCC2105 / NCC2111 / YonBIP高级版2207/ YonBIP高级版2305 |
建议修复 |
08 |
GitLab 存在恣意密码重置误差CVE-2023-7028 |
16.1 <= Gitlab CE/EE < 16.1.6 16.2 <= Gitlab CE/EE < 16.2.9 16.3 <= Gitlab CE/EE < 16.3.7 16.4 <= Gitlab CE/EE < 16.4.5 16.5 <= Gitlab CE/EE < 16.5.6 16.6 <= Gitlab CE/EE < 16.6.4 16.7 <= Gitlab CE/EE < 16.7.2 |
重点修复 |
09 |
GitLab 存在身份伪造误差 CVE-2023-5356 |
8.13 <= Gitlab CE/EE < 16.5.6 16.6.6 <= Gitlab CE/EE < 16.6.4 16.7 <= Gitlab CE/EE < 16.7.2 |
重点修复 |
10 |
Atlassian Confluence Data Center and Server存在远程代码执行误差(CVE-2023-22527) |
Atlassian Confluence Data Center and Server 8.0.x Atlassian Confluence Data Center and Server 8.1.x Atlassian Confluence Data Center and Server 8.2.x Atlassian Confluence Data Center and Server 8.3.x Atlassian Confluence Data Center and Server 8.4.x Atlassian Confluence Data Center and Server 8.5.0-8.5.3 |
重点修复 |
11 |
Jenkins存在恣意文件读取误差(CVE-2024-23897) |
Jenkins <=2.441 Jenkins <=LST2.426.2 |
重点修复 |
12 |
Linux glibc存在堆缓冲区溢出误差(CVE-2023-6246) |
glibc 2.36 glibc 2.37 Debian 12 Debian 13 Ubuntu 23.04 Ubuntu 23.10 Fedora 37 Fedora 38 Fedora 39 |
重点修复 |
13 |
Spring Security身份验证绕过误差(CVE-2024-22234) |
6.1.0<=Spring Security<6.1.7 6.2.0<=Spring Security<6.2.2 |
重点修复 |
14 |
JetBrains TeamCity 存在身份验证绕过误差(CVE-2024-27198) |
Teamcity < 2023.11.4 |
重点修复 |
15 |
GitLab存在身份验证绕过误差(CVE-2024-0199) |
11.3 <= Gitlab CE/EE < 16.7.7 16.7.6 <= Gitlab CE/EE < 16.8.4 16.8.3 <= Gitlab CE/EE < 16.9.2 |
重点修复 |
16 |
FortiOS & FortiProxy 存在越界写入误差CVE-2023-42789 |
7.4.0 < FortiOS < 7.4.1
7.2.0
7.0.0
6.4.0
6.2.0 FortiProxy = 7.4.0
7.2.0
7.0.0 2.0.0 < FortiProxy < 2.0.13 |
建议修复 |
17 |
FortiOS & FortiProxy存在缓冲区溢出误差CVE-2023-42790 |
7.4.0 < FortiOS < 7.4.1
7.2.0
7.0.0
6.4.0
6.2.0 FortiProxy = 7.4.0
7.2.0
7.0.0 2.0.0 < FortiProxy < 2.0.13 |
建议修复 |
18 |
FortiOS & FortiProxy SSLVPN存在身份验证绕过误差CVE-2024-23112 |
7.4.0 < FortiOS < 7.4.1
7.2.0
7.0.1
6.4.7
7.4.0
7.2.0
7.0.0 |
建议修复 |
19 |
泛微E-Office10存在phar反序列化误差 |
v10.0_20180516 < E-Office < v10.0_20240222 |
重点修复 |
20 |
JumpServer 存在远程代码执行误差CVE-2024-29201 |
v3.0.0 <= JumpServer <= v3.10.6 |
重点修复 |
21 |
JumpServer存在模板注入误差CVE-2024-29202 |
JumpServer > v3.10.6 |
重点修复 |
22 |
libzma / xz库存在后门(CVE-2024-3094) |
xz utils = 5.6.0 xz utils = 5.6.1 |
重点修复 |
23 |
Rust存在下令注入误差(CVE-2024-24576) |
Rust < 1.77.2(Windows) |
重点修复 |
24 |
Palo Alto Networks PAN-OS存在下令注入误差(CVE-2024-3400) |
PAN-OS 11.1 < 11.1.2-h3 PAN-OS 11.0 < 11.0.4-h1 PAN-OS 10.2 < 10.2.9-h1 |
重点修复 |
25 |
Oracle WebLogic Server 存在远程代码执行误差(CVE-2024-21007) |
WebLogic Server = 12.2.1.4.0 WebLogic Server = 14.1.1.0.0 |
重点修复 |
26 |
kkFileView存在文件上传误差 |
4.2.0 <= kkFileView <= v4.4.0-beta |
重点修复 |
27 |
禅道项目治理系统存在身份认证绕过误差 |
v16.x <= 禅道项目治理系统< v18.12 (开源版) v6.x <= 禅道项目治理系统< v8.12 (企业版) v3.x <= 禅道项目治理系统< v4.12 (旗舰版) |
重点修复 |
28 |
瑞友天翼应用虚拟化系统存在SQL注入误差 |
瑞友天翼应用虚拟化系统 < 7.0.5.1 |
重点修复 |
29 |
瑞友天翼应用虚拟化系统存在session反序列化误差 |
瑞友天翼应用虚拟化系统 < GWT7.0.5_patch_202405081139 |
重点修复 |
30 |
Git存在远程代码执行误差(CVE-2024-32002) |
version 2.45.*< 2.45.1 |
重点修复 |
31 |
Atlassian Confluence Data Center and Server存在远程代码执行误差(CVE-2024-21683) |
Atlassian Data Center = 8.9.0 8.8.0 <= Atlassian Data Center <= 8.8.1 8.7.0 <= Atlassian Data Center <= 8.7.2 8.6.0 <= Atlassian Data Center <= 8.6.2 8.5.0 <= Atlassian Data Center and Server <= 8.5.8 LTS 8.4.0 <= Atlassian Data Center and Server <= 8.4.5 8.3.0 <= Atlassian Data Center and Server <= 8.3.4 8.2.0 <= Atlassian Data Center and Server <= 8.2.3 8.1.0 <= Atlassian Data Center and Server <= 8.1.4 8.0.0 <= Atlassian Data Center and Server <= 8.0.4 7.20.0 <= Atlassian Data Center and Server <= 7.20.3 7.19.0 <= Atlassian Data Center and Server <= 7.19.21 LTS 7.18.0 <= Atlassian Data Center and Server <= 7.18.3 7.17.0 <= Atlassian Data Center and Server <= 7.17.5 |
重点修复 |
32 |
Sonatype Nexus Repository 3 存在路径遍历误差(CVE-2024-4956) |
Sonatype Nexus < 3.68.1 |
建议修复 |
33 |
Apache OFBiz 未授权远程代码执行误差(CVE-2023-51467) |
Apache OFBiz < 18.12.11 |
建议修复 |
34 |
Apache Struts文件上传组件存在目录遍历误差(CVE-2023-50164) |
2.5.0 <= Version <= 2.5.32 6.0.0 <= Version <= 6.3.0.0 |
建议修复 |
35 |
Atlassian Confluence远程代码执行误差(CVE-2023-22522) |
Confluence Data Center and Server:4.x.x、5.x.x、6.x.x、7.x.x、8.0.x、8.1.x、8.2.x、8.3.x、8.4.0、8.4.1、8.4.2、8.4.3、8.4.4、8.5.0、8.5.1、8.5.2、8.5.3 Confluence Data Center:8.6.0、8.6.1 |
建议修复 |
36 |
金蝶云星空ScpSupRegHandler恣意文件上传误差 |
金蝶云星空企业版私有云、企业版私有云(订阅)、尺度版私有云(订阅):V6.2(含17年12月补丁) 至 V8.1(含23年9月补丁) |
建议修复 |
37 |
思科IOS XE软件Web UI权限提升误差(CVE-2023-20198) |
16.12 <= Cisco IOS XE < 16.12.10a 17.3 <= Cisco IOS XE < 17.3.8a 17.6 <= Cisco IOS XE < 17.6.6a 17.9 <= Cisco IOS XE < 17.9.4a |
建议修复 |
38 |
F5 BIG-IP远程代码执行误差(CVE-2023-46747) |
F5 BIG-IP:17.1.0 16.1.0 <= F5 BIG-IP <=16.1.4 15.1.0 <= F5 BIG-IP <= 15.1.10 14.1.0 <= F5 BIG-IP <= 14.1.5 13.1.0 <= F5 BIG-IP <= 13.1.5 |
建议修复 |
39 |
Apache ActiveMQ远程下令执行误差 |
5.18.0 <= Apache ActiveMQ < 5.18.3 5.17.0 <= Apache ActiveMQ < 5.17.6 |
建议修复 |
40 |
Atlassian Confluence 权限提升误差(CVE-2023-22515) |
Confluence Data Center and Confluence Server:8.0.0、8.0.1、8.0.2、8.0.3、8.1.0、8.1.3、8.1.4、8.2.0、8.2.1、8.2.2、8.2.3、8.3.0、8.3.1、8.3.2、8.4.0、8.4.1、8.4.2、8.5.0 |
建议修复 |
41 |
JumpServer Session 未授权会见误差(CVE-2023-42442) |
3.0.0 <= JumpServer < 3.5.5 3.6.0 <= JumpServer < 3.6.4 |
重点修复 |
42 |
VMware Aria Operations for Networks存在身份验证绕过误差(CVE-2023-34039) |
6.0.6 <= VMware Aria Operations for Networks < 6.11 |
建议修复 |
43 |
Showdoc 远程代码执行误差 |
ShowDoc < V3.2.5 |
重点修复 |
44 |
普元 Primeton EOS Platform jmx 反序列化误差 |
Primeton EOS Platform <= 7.6 |
重点修复 |
45 |
Jeecg FormDemoController JNDI注入误差(CVE-2023-49442) |
JEECG <= 4.0 |
建议修复 |
46 |
XXL-JOB 未授权接口反序列化误差 |
XXL-JOB <= 2.2.0 |
重点修复 |
47 |
蓝凌 OA datajson.js script 远程代码执行误差 |
全版本 |
建议修复 |
48 |
Weblogic ForeignOpaqueReference 远程代码执行误差(CVE-2024-20931) |
Oracle WebLogic Server 12.2.1.4.0 Oracle WebLogic Server 14.1.1.0.0 |
建议修复 |
49 |
Fortinet FortiOS & FortiProxy越界写入误差(CVE-2024-21762) |
FortiOS 7.4:7.4.0 - 7.4.2 FortiOS 7.2:7.2.0 - 7.2.6 FortiOS 7.0:7.0.0 - 7.0.13 FortiOS 6.4:6.4.0 - 6.4.14 FortiOS 6.2:6.2.0 - 6.2.15 FortiOS 6.0:6.0.0 - 6.0.17 FortiProxy 7.4:7.4.0 - 7.4.2 FortiProxy 7.2:7.2.0 - 7.2.8 FortiProxy 7.0:7.0.0 - 7.0.14 FortiProxy 2.0:2.0.0 - 2.0.13 FortiProxy 1.2:1.2 所有 FortiProxy 1.1:1.1 所有 FortiProxy 1.0:1.0所有 |
建议修复 |
50 |
Apache Struts2 目录遍历误差(CVE-2023-50164) |
2.0.0 <= Apache Structs < 2.5.33 6.0.0 <= Apache Structs < 6.3.0.2 |
建议修复 |
51 |
Apache ActiveMQ Jolokia & REST API未授权会见误差(CVE-2024-32114) |
Apache ActiveMQ 6.* < 6.1.2 |
建议修复 |
52 |
Cacti远程代码执行误差(CVE-2024-25641) |
Cacti < 1.2.27 |
建议修复 |
53 |
Citrix ADC & Citrix Gateway 会话令牌走漏误差(CVE-2024-4966) |
12.1 <= Netscaler application delivery controller < 12.1-55.300 13.0 <= Netscaler application delivery controller < 13.0-92.19 13.1 <= Netscaler application delivery controller <13.1-49.15 14.1 <= Netscaler application delivery controller < 14.1-8.50 13.0 <= netscaler gateway < 13.0-91.19 13.1 <= netscaler gateway < 13.1-49.15 14.1 <= netscaler gateway < 14.1-8.50 |
建议修复 |
54 |
MySQL2代码注入误差(CVE-2024-21511) |
mysql2 (npm) < 3.9.7 |
建议修复 |
55 |
Check Point Security Gateways存在文件读取误差(CVE-2024-24919) |
Check Point Security Gateways R77.20(EOL) Check Point Security Gateways R77.30(EOL) Check Point Security Gateways R80.10(EOL) Check Point Security Gateways R80.20(EOL) Check Point Security Gateways R80.20.x Check Point Security Gateways R80.20SP(EOL) Check Point Security Gateways R80.30(EOL) Check Point Security Gateways R80.30SP(EOL) Check Point Security Gateways R80.40(EOL) Check Point Security Gateways R81 Check Point Security Gateways R81.10 Check Point Security Gateways R81.10.x Check Point Security Gateways R81.20Check Point Security Gateways |
重点修复 |
56 |
PHP-CGI存在远程代码执行误差(CVE-2024-4577) |
PHP 8.3 < 8.3.8 PHP 8.2 < 8.2.20 PHP 8.1 < 8.1.29 |
重点修复 |
57 |
Composer PHP依赖项治理器存在下令注入误差(CVE-2024-35242) |
2.0 <= Composer < 2.2.24 2.3 <= Composer < 2.7.7 |
建议修复 |
58 |
Windows Wi-Fi驱动法式存在远程代码执行误差(CVE-2024-30078) |
参考下文误差详情 |
建议修复 |
59 |
vCenter Server堆溢出误差(CVE-2024-37079) |
vCenter Server 7.0 vCenter Server 8.0 Cloud Foundation (vCenter Server) 4.x Cloud Foundation (vCenter Server) 5.x |
建议修复 |
60 |
vCenter Server堆溢出误差(CVE-2024-37080) |
vCenter Server 7.0 vCenter Server 8.0 Cloud Foundation (vCenter Server) 4.x Cloud Foundation (vCenter Server) 5.x |
建议修复 |
61 |
vCenter Server权限提升误差(CVE-2024-37081) |
vCenter Server 7.0 vCenter Server 8.0 Cloud Foundation (vCenter Server) 4.x Cloud Foundation (vCenter Server) 5.x |
建议修复 |
62 |
Apache Kafka UI 存在远程代码执行误差(CVE-2024-32030) |
Apache Kafka UI < 0.7.2 |
建议修复 |
63 |
GitLab存在身份验证绕过误差(CVE-2024-5655) |
15.8 <= GitLab CE/EE < 16.11.5 17.0 <= GitLab CE/EE < 17.0.3 17.1 <= GitLab CE/EE < 17.1.1 |
建议修复 |
64 |
OpenSSH存在远程代码执行误差(CVE-2024-6387) |
8.5p1 <= OpenSSH < 9.8p1 |
建议修复 |
65 |
OpenStack存在敏感信息泄露误差(CVE-2024-32498) |
Cinder < 22.1.3 23.0.0 <= Cinder <23.1.1 Cinder 24.0.0 Glance < 26.0.1 Glance 27.0.0 28.0.0 <= Glance <28.0.2 Nova < 27.3.1 28.0.0 <= Nova <28.1.1 29.0.0 <= Nova <29.0.3 |
建议修复 |
66 |
GeoServer 存在远程代码执行误差(CVE-2024-36401) |
GeoServer < 2.23.6 2.24.0 <= GeoServer < 2.24.4 2.25.0 <= GeoServer < 2.25.2 |
重点修复 |
67 |
GitLab存在身份验证绕过误差(CVE-2024-6385) |
15.8 <= GitLab CE/EE < 16.11.6 17.0 <= GitLab CE/EE < 17.0.4 17.1 <= GitLab CE/EE < 17.1.2 |
建议修复 |
68 |
泛微 E-COLOGY存在SQL注入误差 |
version < 10.64.1 |
重点修复 |
69 |
JumpServer 存在恣意文件读取误差(CVE-2024-40628) |
v3.0.0 <= JumpServer <= v3.10.11 |
重点修复 |
70 |
JumpServer存在文件写入误差(CVE-2024-40629) |
v3.0.0 <= JumpServer <= v3.10.11 |
重点修复 |
71 |
Oracle WebLogic Server存在远程代码执行误差(CVE-2024-21181) |
version = |
重点修复 |
esb世博网信息应急响应中央(CERT)
esb世博网信息应急响应中央(CERT)是专注于对全网主要网络清静误差、清静事务等威胁情报举行实时自动发现、快速预警、联动响应的清静应急协调中央。中央成员由具备富厚攻防履历的资深清静手艺专家组成,联动esb世博网威胁情报中央,配合针对最新威胁情报自动发现,重大清静误差和清静事务举行深度挖掘、剖析、溯源,并团结自主研发的网络空间测绘系统-「全球网络空间超级雷达」梳理全网受影响水平,第一时间通过多渠道对客户举行清静预警通知,并向国家有关部门转达,同时在有关部门的指导下,对影响面极广的误差对外宣布清静预警和应急措施建议,助力营造康健、清静的数字化经济情形,与各方配合建设清静的中国