¡¾·ì϶¹«¸æ¡¿Microsoft Exchange ServerÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2022-41082£©

°ä²¼¹¦·ò 2022-10-01


0x00 ·ì϶¸ÅÊö

CVE   ID

CVE-2022-41082

·¢ÏÖ¹¦·ò

2022-09-30

Àà    ÐÍ

RCE

µÈ    ¼¶

¸ßΣ

Ô¶³ÌÀûÓÃ


Ó°ÏìÁìÓò


¹¥»÷¸´ÔÓ¶È


Óû§½»»¥


PoC/EXP


ÔÚÒ°ÀûÓÃ

ÊÇ

 

0x01 ·ì϶ÏêÇé

9ÔÂ29ÈÕ£¬Î¢Èí°²È«ÏìÓ¦ÖÐÐİ䲼°²È«²¼¸æ£¬¹«¿ªÁËMicrosoft Exchange ServerÖÐÒѱ»ÀûÓõÄ2¸ö0 day·ì϶£¨ProxyNotShell£©£¬¿ÉÔÚ¾­¹ýExchange ServerÉí·ÝÑéÖ¤²¢ÇÒÓµÓÐ PowerShell ²Ù×÷ȨÏÞµÄÇé¿öÏÂÀûÓÃÕâЩ·ì϶£¨×éºÏÀûÓã©Ô¶³ÌÖ´ÐжñÒâ´úÂ룺

CVE-2022-41040£ºMicrosoft Exchange Server·þÎñÆ÷¶ËÒªÇóαÔì (SSRF) ·ì϶

CVE-2022-41082£ºMicrosoft Exchange ServerÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©·ì϶

ĿǰÕâЩ·ì϶ÒѾ­±»ÀûÓ㬲¢·¢´Ë¿ÌÊÜϰȾµÄ·þÎñÆ÷Éϲ¿Êðwebshell¡£

 

Ó°ÏìÁìÓò

Microsoft Exchange Server 2013

Microsoft Exchange Server 2016

Microsoft Exchange Server 2019

 

0x02 °²È«½¨Òé

΢ÈíÒѾ­°ä²¼ÁËÓйطì϶µÄ¿Í»§Ö¸ÄÏ£¬ÊÜÓ°Ïì¿Í»§¿É²Î¿¼Ö´ÐÐÖ¸ÄÏÖеĻº½â´ëÊ©£º

1.Microsoft Exchange Online ¿Í»§ÎÞÐè²ÉÈ¡ÈκÎÐж¯¡£

2.±¾µØ Microsoft Exchange ¿Í»§Ó¦²é¿´²¢ÀûÓÃÒÔÏ URL ³Áд£¨URL Rewrite£©×¢Ã÷²¢×èֹ¶³öµÄÔ¶³Ì PowerShell ¶Ë¿Ú¡£

»º½â´ëÊ©£ºÔÚ¡°IIS ÖÎÀíÆ÷ -> ĬÈÏÍøÕ¾ -> ×Ô¶¯·¢ÏÖ -> URL ³Áд -> ²Ù×÷¡±ÖÐÔö³¤×èÖ¹¹æ¶¨£¬ÒÔ×èÖ¹ÒÑÖªµÄ¹¥»÷ģʽ¡££¨×¢£ºÈôÊÇÒÀÕÕ½¨Òé×ÔÐÐ×°ÖÃURL³ÁдÄ£¿é£¬¶ÔExchangeÖ°ÄÜûÓÐÒÑÖªµÄÓ°Ïì¡££©

²½Ö裺

l  ´ò¿ª IIS ÖÎÀíÆ÷¡£

l  ·¢Õ¹Ä¬ÈÏÍøÕ¾¡£

l  Ñ¡Ôñ×Ô¶¯·¢ÏÖ¡£

l  ÔÚÖ°ÄÜÊÓͼÖУ¬µ¥»÷ URL ³Áд¡£

image.png

l  ÔÚÓÒ²àµÄ¡°²Ù×÷¡±´°¸ñÖУ¬µ¥»÷¡°Ôö³¤¹æ¶¨¡±¡£  

image.png

l  Ñ¡ÔñÒªÇó×èÖ¹£¬¶øºóµ¥»÷È·¶¨¡£ 

image.png

l  Ôö³¤×Ö·û´®¡°.*autodiscover\.json.*\@.*Powershell.*¡±£¨²»Ô̺¬ÒýºÅ£©£¬¶øºóµ¥»÷¡°È·¶¨¡±¡£ 

image.png

l  ·¢Õ¹¹æ¶¨²¢Ñ¡ÔñģʽΪ¡°.*autodiscover\.json.*\@.*Powershell.*¡±µÄ¹æ¶¨£¬¶øºóµ¥»÷ǰÌáϵıà×ë¡£ 

image.png

l  ½«Ç°ÌáÊäÈë´Ó {URL} ¸ü¸ÄΪ {REQUEST_URI} ¡£

image.png

´Ë±í£¬¾­¹ýÈÏÖ¤µÄ¹¥»÷ÕßÈôÊÇÄÜÔÚ´æÔÚ·ì϶µÄExchangeϵͳÉϽӼûPowerShell Remoting£¬¾ÍÄܹ»ÀûÓÃCVE-2022-41082´¥·¢RCE¡£½¨ÒéÖÎÀíÔ±×èÖ¹ÒÔÏÂÔ¶³Ì PowerShell ¶Ë¿ÚÒÔ×èÖ¹¹¥»÷£º

?  HTTP£º5985

?  HTTPS£º5986

ÈôÊÇÏë²é³­ Exchange ServerÊÇ·ñÒѱ»ÈëÇÖ£¬ÖÎÀíÔ±Äܹ»Ê¹ÓÃÒÔÏ·½Ê½£º

1.ÔËÐÐÒÔÏ PowerShell ºÅÁîÀ´É¨Ãè IIS ÈÕÖ¾ÎļþÒÔѰÕÒÈëÇÖ¼£Ïó£º

Get-ChildItem -Recurse -Path-Filter "*.log" | Select-String -Pattern 'powershell.*autodiscover\.json.*\@.*200'

2.ʹÓÃGTSC¿ª·¢µÄËÑË÷¹¤¾ß£¬»ùÓÚexploitÊðÃû£¬ËÑË÷¹¦·ò±ÈʹÓÃpowershellÒª¶Ì¡£

ÏÂÔØÁ´½Ó£ºhttps://github.com/ncsgroupvn/NCSE0Scanner

×¢£º1.ÈôÒѱ»¹¥»÷£¬IIS ÈÕÖ¾ÖпÉÄܼì²âµ½Óë ProxyShell ·ì϶ÌåʽÀàËÆµÄÀûÓÃÒªÇó£ºautodiscover/autodiscover.json?@evil.com/&Email=autodiscover/autodiscover.json %3f@evil.com¡£

2.»º½â´ëÊ©£¨¸üУ©Ïê¼û²Î¿¼Á´½ÓÖеÄ΢Èí°²È«Ö¸ÄÏ¡£


0x03 ²Î¿¼Á´½Ó

https://msrc-blog.microsoft.com/2022/09/29/customer-guidance-for-reported-zero-day-vulnerabilities-in-microsoft-exchange-server/

https://gteltsc.vn/blog/warning-new-attack-campaign-utilized-a-new-0day-rce-vulnerability-on-microsoft-exchange-server-12715.html

 

0x04 °æ±¾ÐÅÏ¢

°æ±¾

ÈÕÆÚ

Åú¸ÄÄÚÈÝ

V1.0

2022-09-30

³õ´Î°ä²¼

 

 

0x05 ¸½Â¼

GA»Æ½ð¼×¼ò½é

GA»Æ½ð¼×³ÉÁ¢ÓÚ1996Ä꣬ÊÇÓÉÁôÃÀ²©Ê¿ÑÏÍû¼ÑŮʿ´´½¨µÄ¡¢Õ¼ÓÐÆëÈ«×ÔÖ÷֪ʶ²úȨµÄÐÅÏ¢°²È«¸ß¿Æ¼¼ÆóÒµ¡£ÊǹúÄÚ×î¾ßʵÁ¦µÄÐÅÏ¢°²È«²úÆ·¡¢°²È«·þÎñ½â¾ö¹æ»®µÄÁ캽ÆóÒµÖ®Ò»¡£

¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°GA»Æ½ð¼×´óÏ㬹«Ë¾Ô±¹¤½ü4000ÈË£¬Ñз¢ÍŶÓ1200ÓàÈË, ¼¼Êõ·þÎñÍŶÓ1300ÓàÈË¡£ÔÚÈ«¹ú¸÷Ê¡¡¢ÊÓ×¢×ÔÖÎÇøÉèÁ¢·ÖÖ§»ú¹¹ÁùÊ®¶à¸ö£¬Õ¼Óи²¸ÇÈ«¹úµÄÏúÊÛϵͳ¡¢Çþ·ϵͳºÍ¼¼ÊõÖ§³Öϵͳ¡£¹«Ë¾ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉîÛÚÖÐÓ×°å¹ÒÅÆÉÏÊС££¨¹ÉƱ´úÂ룺002439£©

¶àÄêÀ´£¬GA»Æ½ð¼×ÖÂÁ¦ÓÚÌṩӵÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷´´Ðµİ²È«²úÆ·ºÍ×î¼Ñʵ¼Ê·þÎñ£¬Ô®ÊÖ¿Í»§È«ÃæÌáÉýÆäIT»ù´¡ÉèÊ©µÄ°²È«ÐԺͳö²úЧÁ¦£¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢°²È«²úÒµÁì¾üÆ·ÅÆ¶ø²»Ð¸ÖÂÁ¦¡£

 

¹ØÓÚGA»Æ½ð¼×

GA»Æ½ð¼×°²È«Ó¦¼±ÏìÓ¦ÖÐÐÄÖØÒªÕë¶Ô³ÁÒª°²È«·ì϶µÄÔ¤¾¯¡¢¸ú×ٺͷÖÏíÈ«Çò×îеÄÍþвµý±¨ºÍ°²È«»ã±¨¡£

¹Ø×¢ÒÔϹ«¼ÒºÅ£¬»ñȡȫÇò×îа²È«×ÊѶ£º

image.png