找回密码
 注册创意安天

漏洞风险提示(20250318)

[复制链接]
发表于 2025-3-18 09:47 | 显示全部楼层 |阅读模式
免责声明:以下内容原文来自互联网的公共方式,仅用于有限分享,译文内容不代表安天实验室观点,因此第三方对以下内 容进行分享、传播等行为,以及所带来的一切后果与译者和安天实验室无关。以下内容亦不得用于任何商业目的,若产生法律责任,译者与安天实验室一律不予承担。

1 Elastic Kibana 原型污染致任意代码执行漏洞(CVE-2025-25012)
一、漏洞描述:
         Elasticsearch.jpg
        Kibana 是一款开源的数据可视化和分析平台,主要用于与 Elasticsearch 集成,帮助用户通过直观的界面和丰富的可视化工具快速分析和探索数据,广泛应用于日志分析、实时监控和数据洞察等领域。该漏洞源于 Kibana 中的原型污染问题,攻击者可以通过精心构造的文件上传和特定的 HTTP 请求绕过验证机制,攻击者利用该漏洞后,可以在受影响的系统上执行任意代码。
二、风险等级:
        高
三、影响范围:
        8.15.0 <= Kibana <= 8.17.2
四、修复建议:
        目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
        https://discuss.elastic.co/t/kib ... -esa-2025-06/375441



2 ruby-saml 身份认证绕过漏洞(CVE-2025-25291)
一、漏洞描述:
         gitlab.jpg
        ruby-saml 是 GitLab 用于实现 SAML 单点登录功能的 Ruby 工具包,通过 OmniAuth-SAML 进行集成,帮助用户实现 便捷的身份验证和访问控制。ruby-saml 使用了两种 XML 解析器 ReXML 和 Nokogiri,由于解析 XML 的方式不同导致签名验证错误从而产生身份验证绕过。
二、风险等级:
        高
三、影响范围:
        ruby-saml <= 1.12.3
        1.13.0 <= ruby-saml < 1.18.0
        omniauth-saml <= 2.2.2
        omniauth-saml <= 1.10.5
        GitLab CE/EE < 17.7.7
        GitLab CE/EE 17.8.* < 17.8.5
        GitLab CE/EE 17.9.* < 17.9.2
四、修复建议:
        目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
        https://github.com/SAML-Toolkits/ruby-saml/releases/tag/v1.12.4

        https://github.com/SAML-Toolkits/ruby-saml/releases/tag/v1.18.0
        https://about.gitlab.com/update


3 Microsoft管理控制台安全功能绕过漏洞(CVE-2025-26633)
一、漏洞描述:
         Microsoft Windows.jpg
        Microsoft管理控制台存在安全功能绕过漏洞,由于Microsoft管理控制台对用户提供的输入验证不足,未经身份验证的攻击者可通过欺骗受害者打开特制文件,从而绕过文件信誉保护在目标系统上执行任意代码。
二、风险等级:
        高
三、影响范围:
        Windows 10 for 32-bit Systems
        Windows 10 for x64-based Systems
        Windows 10 Version 1607 for 32-bit Systems
        Windows 10 Version 1607 for x64-based Systems
        Windows 10 Version 1809 for 32-bit Systems
        Windows 10 Version 1809 for x64-based Systems
        Windows 10 Version 21H2 for 32-bit Systems
        Windows 10 Version 21H2 for ARM64-based Systems
        Windows 10 Version 21H2 for x64-based Systems
        Windows 10 Version 22H2 for 32-bit Systems
        Windows 10 Version 22H2 for ARM64-based Systems
        Windows 10 Version 22H2 for x64-based Systems
        Windows 11 Version 22H2 for ARM64-based Systems
        Windows 11 Version 22H2 for x64-based Systems
        Windows 11 Version 23H2 for ARM64-based Systems
        Windows 11 Version 23H2 for x64-based Systems
        Windows 11 Version 24H2 for ARM64-based Systems
        Windows 11 Version 24H2 for x64-based Systems
        Windows Server 2008 for 32-bit Systems Service Pack 2
        Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
        Windows Server 2008 for x64-based Systems Service Pack 2
        Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
        Windows Server 2008 R2 for x64-based Systems Service Pack 1
        Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
        Windows Server 2012
        Windows Server 2012 (Server Core installation)
        Windows Server 2012 R2
        Windows Server 2012 R2 (Server Core installation)
        Windows Server 2016
        Windows Server 2016 (Server Core installation)
        Windows Server 2019
        Windows Server 2019 (Server Core installation)
        Windows Server 2022
        Windows Server 2022 (Server Core installation)
        Windows Server 2022, 23H2 Edition (Server Core installation)
        Windows Server 2025
        Windows Server 2025 (Server Core installation)
四、修复建议:
        目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
        https://portal.msrc.microsoft.co ... notedetail/2025-Mar



4 Windows NTFS信息泄露漏洞(CVE-2025-24991)
一、漏洞描述:
         Microsoft Windows.jpg
        Windows NTFS存在信息泄露漏洞,由于Windows NTFS中的边界条件存在缺陷,未经身份验证的攻击者可以通过欺骗本地用户挂载特制的VHD文件,从而触发越界读取错误并读取目标系统的内存数据。
二、风险等级:
        高
三、影响范围:
        Windows 10 for 32-bit Systems
        Windows 10 for x64-based Systems
        Windows 10 Version 1607 for 32-bit Systems
        Windows 10 Version 1607 for x64-based Systems
        Windows 10 Version 1809 for 32-bit Systems
        Windows 10 Version 1809 for x64-based Systems
        Windows 10 Version 21H2 for 32-bit Systems
        Windows 10 Version 21H2 for ARM64-based Systems
        Windows 10 Version 21H2 for x64-based Systems
        Windows 10 Version 22H2 for 32-bit Systems
        Windows 10 Version 22H2 for ARM64-based Systems
        Windows 10 Version 22H2 for x64-based Systems
        Windows 11 Version 22H2 for ARM64-based Systems
        Windows 11 Version 22H2 for x64-based Systems
        Windows 11 Version 23H2 for ARM64-based Systems
        Windows 11 Version 23H2 for x64-based Systems
        Windows 11 Version 24H2 for ARM64-based Systems
        Windows 11 Version 24H2 for x64-based Systems
        Windows Server 2008 for 32-bit Systems Service Pack 2
        Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
        Windows Server 2008 for x64-based Systems Service Pack 2
        Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
        Windows Server 2008 R2 for x64-based Systems Service Pack 1
        Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
        Windows Server 2012
        Windows Server 2012 (Server Core installation)
        Windows Server 2012 R2
        Windows Server 2012 R2 (Server Core installation)
        Windows Server 2016
        Windows Server 2016 (Server Core installation)
        Windows Server 2019
        Windows Server 2019 (Server Core installation)
        Windows Server 2022
        Windows Server 2022 (Server Core installation)
        Windows Server 2022, 23H2 Edition (Server Core installation)
        Windows Server 2025
        Windows Server 2025 (Server Core installation)
四、修复建议:
        目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
        https://portal.msrc.microsoft.co ... notedetail/2025-Mar


您需要登录后才可以回帖 登录 | 注册创意安天

本版积分规则

Archiver|手机版|小黑屋|创意安天 ( 京ICP备09068574,ICP证100468号。 )

GMT+8, 2025-4-4 04:58

Powered by Discuz! X3.5

© 2001-2024 Discuz! Team.

快速回复 返回顶部 返回列表