¡¾Îó²îͨ¸æ¡¿Adobe Magento Open SourceÏÂÁî×¢ÈëÎó²î£¨CVE-2024-20720£©

Ðû²¼Ê±¼ä 2024-04-08


Ò»¡¢Îó²î¸ÅÊö

Îó²îÃû³Æ

 Adobe Magento Open SourceÏÂÁî×¢ÈëÎó²î

CVE   ID

CVE-2024-20720

Îó²îÀàÐÍ

ÏÂÁî×¢Èë

·¢Ã÷ʱ¼ä

2024-04-07

Îó²îÆÀ·Ö

9.1

Îó²îÆ·¼¶

ÑÏÖØ

¹¥»÷ÏòÁ¿

ÍøÂç

ËùÐèȨÏÞ

¸ß

ʹÓÃÄѶÈ

µÍ

Óû§½»»¥

ÎÞ

PoC/EXP

δ֪

ÔÚҰʹÓÃ

ÒÑ·¢Ã÷

 

Adobe Magento Open SourceÊÇAdobe¹«Ë¾µÄÒ»Ì׿ªÔ´µÄPHPµç×ÓÉÌÎñϵͳ£¬ £¬ £¬£¬£¬ £¬¸ÃϵͳÌṩȨÏÞÖÎÀí¡¢ËÑË÷ÒýÇæºÍÖ§¸¶Íø¹ØµÈ¹¦Ð§¡£¡£¡£¡£¡£¡£ ¡£

2024Äê4ÔÂ7ÈÕ£¬ £¬ £¬£¬£¬ £¬Z6×ðÁú¿­Ê±VSRC¼à²âµ½ÍþвÕßÕýÔÚʹÓÃAdobe Magento Open SourceÏÂÁî×¢ÈëÎó²î£¨CVE-2024-20720£©Ïòµç×ÓÉÌÎñÍøÕ¾×¢È볤ÆÚºóÃÅ£¬ £¬ £¬£¬£¬ £¬ÏÖÔÚ¸ÃÎó²îµÄʹÓÃϸ½ÚÒѹûÕæ¡£¡£¡£¡£¡£¡£ ¡£

Adobe Magento Open Source 2.4.6-p4¡¢2.4.5-p6 ¼°2.4.4-p7֮ǰ°æ±¾Öб£´æÏÂÁî×¢ÈëÎó²î£¬ £¬ £¬£¬£¬ £¬¾ßÓÐÖÎÀíȨÏÞµÄÍþвÕß¿ÉʹÓøÃÎó²îµ¼ÖÂí§Òâ´úÂëÖ´ÐС£¡£¡£¡£¡£¡£ ¡£ÏÖÔÚ¸ÃÎó²îÒÑ·¢Ã÷±»Ê¹Ó㬠£¬ £¬£¬£¬ £¬ÍþвÕßͨ¹ýʹÓÃÊý¾Ý¿âÖжñÒâÉè¼ÆµÄ½á¹¹Ä£°åÀ´×Ô¶¯×¢ÈëXML´úÂ룬 £¬ £¬£¬£¬ £¬ÒÔʵÏÖϵͳµÄ³¤ÆÚѬȾ¡£¡£¡£¡£¡£¡£ ¡£

 


¶þ¡¢Ó°Ïì¹æÄ£

Adobe Magento Open Source <= 2.4.6-p3

Adobe Magento Open Source <= 2.4.5-p5

Adobe Magento Open Source <= 2.4.4-p6

 


Èý¡¢Çå¾²²½·¥

3.1 Éý¼¶°æ±¾

ÏÖÔÚ¸ÃÎó²îÒѾ­ÐÞ¸´£¬ £¬ £¬£¬£¬ £¬ÊÜÓ°ÏìÓû§¿ÉÉý¼¶µ½Magento °æ±¾2.4.6-p4¡¢2.4.5-p6 ¡¢2.4.4-p7»ò¸ü¸ß°æ±¾¡£¡£¡£¡£¡£¡£ ¡£

Á´½Ó£º

https://helpx.adobe.com/security/products/magento/apsb24-03.html

3.2 ÔÝʱ²½·¥

ÔÝÎÞ¡£¡£¡£¡£¡£¡£ ¡£

3.3 ͨÓý¨Òé

l  °´ÆÚ¸üÐÂϵͳ²¹¶¡£¡£¡£¡£¡£¡£ ¡£¬ £¬ £¬£¬£¬ £¬ïÔ̭ϵͳÎó²î£¬ £¬ £¬£¬£¬ £¬ÌáÉýЧÀÍÆ÷µÄÇå¾²ÐÔ¡£¡£¡£¡£¡£¡£ ¡£

l  ÔöǿϵͳºÍÍøÂçµÄ»á¼û¿ØÖÆ£¬ £¬ £¬£¬£¬ £¬Ð޸ķÀ»ðǽսÂÔ£¬ £¬ £¬£¬£¬ £¬¹Ø±Õ·ÇÐëÒªµÄÓ¦Óö˿ڻòЧÀÍ£¬ £¬ £¬£¬£¬ £¬ïÔÌ­½«Î£ÏÕЧÀÍ£¨ÈçSSH¡¢RDPµÈ£©Ì»Â¶µ½¹«Íø£¬ £¬ £¬£¬£¬ £¬ïÔÌ­¹¥»÷Ãæ¡£¡£¡£¡£¡£¡£ ¡£

l  ʹÓÃÆóÒµ¼¶Çå¾²²úÆ·£¬ £¬ £¬£¬£¬ £¬ÌáÉýÆóÒµµÄÍøÂçÇå¾²ÐÔÄÜ¡£¡£¡£¡£¡£¡£ ¡£

l  ÔöǿϵͳÓû§ºÍȨÏÞÖÎÀí£¬ £¬ £¬£¬£¬ £¬ÆôÓöàÒòËØÈÏÖ¤»úÖÆºÍ×îСȨÏÞÔ­Ôò£¬ £¬ £¬£¬£¬ £¬Óû§ºÍÈí¼þȨÏÞÓ¦¼á³ÖÔÚ×îµÍÏÞ¶È¡£¡£¡£¡£¡£¡£ ¡£

l  ÆôÓÃÇ¿ÃÜÂëÕ½ÂÔ²¢ÉèÖÃΪ°´ÆÚÐ޸ġ£¡£¡£¡£¡£¡£ ¡£

3.4 ²Î¿¼Á´½Ó

https://sansec.io/research/magento-xml-backdoor

https://helpx.adobe.com/security/products/magento/apsb24-03.html

https://www.securityweek.com/magento-vulnerability-exploited-to-deploy-persistent-backdoor/

 

 

ËÄ¡¢°æ±¾ÐÅÏ¢

°æ±¾

ÈÕÆÚ

±¸×¢

V1.0

2024-04-08

Ê×´ÎÐû²¼

 

 

Îå¡¢¸½Â¼

5.1 Z6×ðÁú¿­Ê±¼ò½é

Z6×ðÁú¿­Ê±½¨ÉèÓÚ1996Ä꣬ £¬ £¬£¬£¬ £¬ÊÇÓÉÁôÃÀ²©Ê¿ÑÏÍû¼ÑŮʿ½¨ÉèµÄ¡¢ÓµÓÐÍêÈ«×ÔÖ÷֪ʶ²úȨµÄÐÅÏ¢Çå¾²¸ß¿Æ¼¼ÆóÒµ¡£¡£¡£¡£¡£¡£ ¡£ÊǺ£ÄÚ×î¾ßʵÁ¦µÄÐÅÏ¢Çå¾²²úÆ·¡¢Ç徲ЧÀͽâ¾ö¼Æ»®µÄÁ캽ÆóÒµÖ®Ò»¡£¡£¡£¡£¡£¡£ ¡£

¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°Z6×ðÁú¿­Ê±´óÏ㬠£¬ £¬£¬£¬ £¬¹«Ë¾Ô±¹¤6000ÓàÈË£¬ £¬ £¬£¬£¬ £¬Ñз¢ÍŶÓ1200ÓàÈË, ÊÖÒÕЧÀÍÍŶÓ1300ÓàÈË¡£¡£¡£¡£¡£¡£ ¡£ÔÚÌìϸ÷Ê¡¡¢ÊС¢×ÔÖÎÇøÉèÁ¢·ÖÖ§»ú¹¹ÁùÊ®¶à¸ö£¬ £¬ £¬£¬£¬ £¬ÓµÓÐÁýÕÖÌìϵÄÏúÊÛϵͳ¡¢ÇþµÀϵͳºÍÊÖÒÕÖ§³Öϵͳ¡£¡£¡£¡£¡£¡£ ¡£¹«Ë¾ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉîÛÚÖÐС°å¹ÒÅÆÉÏÊС£¡£¡£¡£¡£¡£ ¡££¨¹ÉƱ´úÂ룺002439£©

¶àÄêÀ´£¬ £¬ £¬£¬£¬ £¬Z6×ðÁú¿­Ê±ÖÂÁ¦ÓÚÌṩ¾ßÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷Á¢ÒìµÄÇå¾²²úÆ·ºÍ×î¼Ñʵ¼ùЧÀÍ£¬ £¬ £¬£¬£¬ £¬×ÊÖú¿Í»§ÖÜÈ«ÌáÉýÆäIT»ù´¡ÉèÊ©µÄÇå¾²ÐÔºÍÉú²úЧÄÜ£¬ £¬ £¬£¬£¬ £¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢Çå¾²¹¤ÒµÁì¾üÆ·ÅÆ¶ø²»Ð¸Æð¾¢¡£¡£¡£¡£¡£¡£ ¡£

5.2 ¹ØÓÚZ6×ðÁú¿­Ê±

Z6×ðÁú¿­Ê±Çå¾²Ó¦¼±ÏìÓ¦ÖÐÐÄÒÑÐû²¼1000¶à¸öÎó²îͨ¸æºÍΣº¦Ô¤¾¯£¬ £¬ £¬£¬£¬ £¬ÎÒÃǽ«Ò»Á¬¸ú×ÙÈ«Çò×îеÄÍøÂçÇå¾²ÊÂÎñºÍÎó²î£¬ £¬ £¬£¬£¬ £¬ÎªÆóÒµµÄÐÅÏ¢Çå¾²±£¼Ý»¤º½¡£¡£¡£¡£¡£¡£ ¡£

¹Ø×¢ÎÒÃÇ£º

image.png