Microsoft Jet RCE·ì϶°²È«¹«¸æ

°ä²¼¹¦·ò 2018-09-25

·ì϶±àºÅºÍ¼¶±ð


CVE±àºÅ£ºÎÞ £¬Î£ÏÕ¼¶±ð£º¸ßΣ £¬CVSS·ÖÖµ£º³§ÉÌ×ÔÆÀ7.3 £¬¹Ù·½Î´ÆÀ¶¨


Ó°Ïì°æ±¾


Microsoft Jet Database Engine


·ì϶¸ÅÊö


¸Ã·ì϶ÊÇJETÊý¾Ý¿âÒýÇæÖеÄÒ»¸öÔ½½ç£¨OOB£©Ð´ÈëÔì³ÉµÄ¡£
΢ÈíµÄOLE DB Provider for JETºÍAccess ODBC½öÖ§³Ö32λ £¬ÕâÒâζ×ÅÔÚ64λµÄÖ÷»úÉÏÎÞ·¨»ñµÃÖ±½ÓÀûÓá£
µ«ÔÚ64λÖ÷»úÉÏÄܹ»Í¨¹ýÆô¶¯c£º\ windows \ SysWOW64 \wscript.exe poc.jsÀ´Ê¹ÓÃ32λwscript.exeÀ´´¥·¢¸ÃPoC¡£
ͬʹØâÖÖ¹¥»÷Äܹ»Í¨¹ýInternet Explorer½øÐд¥·¢ £¬¼´±ãÔÚ64λWindowsÉÏ £¬Internet ExploreräÖȾ¹ý³ÌÒ²ÊÇ32λµÄ¡£
µ«ÔÚIE11ÉÏInternetºÍIntranetÇøÓòÖнûÓÃÁ˰²È«ÉèÖá°¿çÓò½Ó¼ûÊý¾ÝÔ´¡± £¬Õâ»áµ¼ÖÂJavaScriptÃýÎó¡£ÎÞ·¨´¥·¢·ì϶¡£

ͬʱ´Ó±¾µØÇý¶¯Æ÷£¨»òUSB´ÅÅÌ£©Æô¶¯¶ñÒâpoc.htmlÒ²»á´¥·¢¸Ã·ì϶¡£µ«±ØÒª»§°´Ï¡°ÔÊÐí×èÖ¹µÄÄÚÈÝ¡±²Å»á´¥·¢¡£


·ì϶ÑéÖ¤


PoC£ºhttps://github.com/thezdi/PoC/tree/master/ZDI-18-1075
ÄÚÈÝÈçÏÂ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


´¥·¢ºóÒýÆðwscript.exe±ÀÀ£


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


½¨¸´½¨Òé


¹Ù·½ÉÐδ°ä²¼Õë¶ÔµÄ²¹¶¡

ÉóÉ÷ÐÐÊ £¬²»Òª´ò¿ªÀ´×Ô²»ÐÅÀµÆðÔ´µÄÎļþ £¬¸üÐÂIEä¯ÀÀÆ÷°æ±¾ £¬Ô¤·ÀÇáÒ×µã»÷ÔÊÐí×èÖ¹ÄÚÈݰ´Å¥


²Î¿¼Á´½Ó


https://www.zerodayinitiative.com/blog/2018/9/20/zdi-can-6135-a-remote-code-execution-vulnerability-in-the-microsoft-windows-jet-database-engine
https://support.microsoft.com/en-in/help/957570/the-microsoft-ole-db-provider-for-jet-and-the-microsoft-access-odbc-dr