恒例の「当該週の脆弱性」 シリーズ。
今回も、各区分の件数は下記の通り。
- High: (vulnerabilities with a CVSS base score of 7.0–10.0) = 0 case
- Medium: (vulnerabilities with a CVSS base score of 4.0–6.9) = 0 case
- Low: (vulnerabilities with a CVSS base score of 0.0–3.9) = 0 case
- Severity Not Yet Assigned = roughly 440 cases!!
Severity Not Yet Assigned に挙げられているのは次の製品である。
数日~数週間のうちに Score、Severityが明らかになり、
以下、個人的に気になった箇所を引用し翻訳・コメントする(※付き)。
◆apache -- www-data
・CVE-2022-2104
The www-data (Apache web server) account is configured to run sudo with no password for many commands (including /bin/sh and /bin/bash).
www-data (Apache Web サーバー) アカウントは、多くのコマンド (/bin/sh や /bin/bash など) でパスワードなしの sudo を実行するように設定されています。
NIST: NVD Base Score: N/A
CNA: ICS-CERT Base Score: 9.9 CRITICAL
※、なんだってー!?
参考サイト「www-dataって何者?誰? (2021/03/26)」によると「www-dataは、Ub
debian系とredhat系で違う」とのこと。
◆autodesk -- autocad
全5件、いずれも Base Score: 7.8 HIGH。
下記以外の4件は、悪意の細工がされた JT, TGA, TIFF, CATファイルがトリガーになる。
・CVE-2022-27871
Autodesk AutoCAD product suite, Revit, Design Review and Navisworks releases using PDFTron prior to 9.1.17 version may be used to write beyond the allocated buffer while parsing PDF files. This vulnerability may be exploited to execute arbitrary code.
Autodesk AutoCAD 製品群、Revit、Design Review、Navisworks の 9.1.17 バージョン以前の PDFTron を使用すると、PDF ファイルの解析中に割り当てられたバッファを超えて書き込むこと
NIST: NVD Base Score: 7.8 HIGH
・CVE-2022-20829
A vulnerability in the packaging of Cisco Adaptive Security Device Manager (ASDM) images and the validation of those images by Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker with administrative privileges to upload an ASDM image that contains malicious code to a device that is running Cisco ASA Software. This vulnerability is due to insufficient validation of the authenticity of an ASDM image during its installation on a device that is running Cisco ASA Software. An attacker could exploit this vulnerability by installing a crafted ASDM image on the device that is running Cisco ASA Software and then waiting for a targeted user to access that device using ASDM. A successful exploit could allow the attacker to execute arbitrary code on the machine of the targeted user with the privileges of that user on that machine. Notes: To successfully exploit this vulnerability, the attacker must have administrative privileges on the device that is running Cisco ASA Software. Potential targets are limited to users who manage the same device that is running Cisco ASA Software using ASDM. Cisco has released and will release software updates that address this vulnerability.
Cisco Adaptive Security Device Manager (ASDM) イメージのパッケージングと Cisco Adaptive Security Appliance (ASA) Software によるこれらのイメージの検証における脆弱性により、
NIST: NVD Base Score: N/A
CNA: Cisco Systems, Inc. Base Score: 9.1 CRITICAL
◆dell -- bios
・CVE-2022-26864
Prior Dell BIOS versions contain an Input Validation vulnerability. A locally authenticated malicious user could potentially exploit this vulnerability by sending malicious input to an SMI in order to bypass security controls in SMM.
Dell BIOS の以前のバージョンには、Input Validation の脆弱性があります。
NIST: NVD Base Score: 7.8 HIGH
CNA: Dell Base Score: 6.3 MEDIUM
※ Ref.1, システムマネジメントモード(SMM)
※ Ref.2. 第11回 SMM(システム管理モード)を悪用した見えない攻撃 (2009/10/07)
・CVE-2022-26863 と CVE-2022-26862
の”Current Description”や”CVSS 3.x Severity and Metrics”は、CVE-2022-26864と同じ(20
22/07/01)
◆fujitsu -- eternus_centricstor_cs8000
・CVE-2022-31794
An issue was discovered on Fujitsu ETERNUS CentricStor CS8000 (Control Center) devices before 8.1A SP02 P04. The vulnerability resides in the requestTempFile function in hw_view.php. An attacker is able to influence the unitName POST parameter and inject special characters such as semicolons, backticks, or command-substitution sequences in order to force the application to execute arbitrary commands.
8.1A SP02 P04以前の富士通ETERNUS CentricStor CS8000 (Control Center) デバイスに、問題が発見されました。この脆弱性は、hw_
NIST: NVD Base Score: 9.8 CRITICAL
・CVE-2022-31795
An issue was discovered on Fujitsu ETERNUS CentricStor CS8000 (Control Center) devices before 8.1A SP02 P04. The vulnerability resides in the grel_finfo function in grel.php. An attacker is able to influence the username (user), password (pw), and file-name (file) parameters and inject special characters such as semicolons, backticks, or command-substitution sequences in order to force the application to execute arbitrary commands.
8.1A SP02 P04以前の富士通ETERNUS CentricStor CS8000 (Control Center) デバイスに問題が発見されました。この脆弱性は、grel.
NIST: NVD Base Score: 9.8 CRITICAL
◆vmware -- spring_cloud_function
・CVE-2022-22979
In Spring Cloud Function versions prior to 3.2.6, it is possible for a user who directly interacts with framework provided lookup functionality to cause a denial-of-service condition due to the caching issue in the Function Catalog component of the framework.
Spring Cloud Functionの3.2.6より前のバージョンでは、
NIST: NVD Base Score: 7.5 HIGH
◆vmware -- spring_data_mongodb
・CVE-2022-22980
A Spring Data MongoDB application is vulnerable to SpEL Injection when using @Query or @Aggregation-annotated query methods with SpEL expressions that contain query parameter placeholders for value binding if the input is not sanitized.
Spring Data MongoDB アプリケーションで、@Query または @Aggregation のアノテーションが付いたクエリーメソッドを、
※、MongoDBとは
MongoDBは、Server Side Public License で提供されるドキュメント指向データベースである。
MongoDBはRDBMSではなく、いわゆるNoSQLと呼ば
人気のあるデータベースをランキング形式で公表しているDB-
出典
Bulletin (SB22-178)
Vulnerability Summary for the Week of June 20, 2022
Original release date: June 27, 2022
No comments:
Post a Comment