Rashin lahani a cikin uwar garken Apache 2.4.49 http wanda ke ba ku damar karɓar fayiloli a wajen tushen rukunin yanar gizon

An ƙirƙiri wani sabuntawa na gaggawa ga uwar garken Apache 2.4.50 http, wanda ke kawar da lahani na kwanaki 0 ​​da aka riga aka yi amfani da shi (CVE-2021-41773), wanda ke ba da damar yin amfani da fayiloli daga wuraren da ke waje da tushen tushen shafin. Yin amfani da rauni, yana yiwuwa a zazzage fayilolin tsarin sabani da rubutun tushen rubutun yanar gizo, wanda mai amfani da sabar http ke gudana a ƙarƙashinsa. An sanar da masu haɓakawa game da matsalar a ranar 17 ga Satumba, amma sun sami damar sakin sabuntawar kawai a yau, bayan an rubuta lokuta na raunin da ake amfani da su don kai hari ga gidajen yanar gizon a kan hanyar sadarwa.

Rage haɗarin rauni shine matsalar ta bayyana ne kawai a cikin sigar 2.4.49 da aka fitar kwanan nan kuma baya shafar duk abubuwan da aka fitar a baya. Tsayayyen rassan rarraba uwar garken masu ra'ayin mazan jiya ba su yi amfani da sakin 2.4.49 ba (Debian, RHEL, Ubuntu, SUSE), amma matsalar ta ci gaba da sabunta rarrabawar kamar Fedora, Arch Linux da Gentoo, gami da tashoshin jiragen ruwa na FreeBSD.

Lalacewar ta samo asali ne saboda kwaro da aka gabatar yayin sake rubuta lambar don daidaita hanyoyi a cikin URIs, saboda abin da "%2e" da aka sanya alamar digo a hanya ba za ta daidaita ba idan an riga ta sami wani digo. Don haka, yana yiwuwa a musanya ɗanyen haruffa "../" cikin hanyar da aka samo ta hanyar tantance jerin ".% 2e/" a cikin buƙatar. Misali, bukata kamar "https://example.com/cgi-bin/.%2e/.%2e/.%2e/.%2e/etc/passwd" ko "https://example.com/cgi -bin /.%2e/%2e%2e/%2e%2e/%2e%2e/etc/hosts" ya baka damar samun abinda ke cikin fayil din "/etc/passwd".

Matsalar ba ta faruwa idan an hana samun damar yin amfani da kundayen adireshi a sarari ta amfani da saitin “na buƙatar duk an ƙi”. Misali, don kariyar juzu'i zaka iya sakawa a cikin fayil ɗin daidaitawa: bukatar duk an hana

Apache httpd 2.4.50 kuma yana gyara wani rauni (CVE-2021-41524) yana shafar tsarin da ke aiwatar da ka'idar HTTP/2. Rashin lahani ya sa ya yiwu a fara ɓata maƙasudi ta hanyar aika buƙatun ƙira na musamman da haifar da ɓarna. Wannan raunin kuma yana bayyana ne kawai a cikin sigar 2.4.49. A matsayin tsarin tsaro, zaku iya musaki goyan bayan ka'idar HTTP/2.

source: budenet.ru

Add a comment