Ò»¡¢·ì϶¸ÅÊö
·ìϼûû³Æ | JumpServer ÏνÓÁîÅÆÐ¹Â¶·ì϶ |
CVE ID | CVE-2025-62712 |
·ì϶ÀàÐÍ | ȨÏÞÑé֤ȱʧ | ·¢ÏÖ¹¦·ò | 2025-11-4 |
·ì϶ÆÀ·Ö | 9.6 | ·ì϶µÈ¼¶ | ÑϳÁ |
¹¥»÷ÏòÁ¿ | ÍøÂç | ËùÐèȨÏÞ | µÍ |
ÀûÓÃÄÑ¶È | µÍ | Óû§½»»¥ | ²»±ØÒª |
PoC/EXP | δ¹«¿ª | ÔÚÒ°ÀûÓà | δ·¢ÏÖ |
JumpServerÊÇÒ»¿î¿ªÔ´µÄµï±¤»ú£¨Ìø°å»ú£©Èí¼þ£¬ÖØÒªÓÃÓÚÆóÒµÄÚ²¿×ʲúµÄ°²È«ÖÎÀíÓëÉ󼯡£Ëüͨ¹ý¼¯ÖÐÖÎÀíºÍÉó¼ÆÔËάÈËÔ±¶Ô·þÎñÆ÷µÄ½Ó¼û£¬ÌṩͳһµÄ½Ó¼û½ÚÔ졢ȨÏÞÖÎÀí¡¢»á»°Â¼ÔìµÈÖ°ÄÜ£¬È·±£Ãô¸Ð²Ù×÷µÄ°²È«ÐÔÓë¿É×·ÒäÐÔ¡£JumpServerÖ§³Ö¶àÖÖÈÏÖ¤·½Ê½ºÍȨÏÞÅäÖã¬¿í·ºÀûÓÃÓÚITÔËά¡¢ÏµÍ³ÖÎÀíÒÔ¼°ÔÆÆ½Ì¨»·¾³ÖУ¬Ô®ÊÔìóÒµÌáÉý°²È«·À»¤ÄÜÁ¦ºÍºÏ¹æÐÔ¡£
2025Äê10ÔÂ28ÈÕ£¬GA»Æ½ð¼×¼¯ÍÅVSRC¼à²âµ½JumpServerÖеÄÒ»¸öÑϳÁ·ì϶£¬Ô´ÓÚÆäsuper-connection-token½Ó¿Úδ½øÐÐÑϸñµÄȨÏÞÑéÖ¤¡£¸Ã½Ó¿Ú·µ»ØÁËËùÓÐЧ»§£¨Ô̺¬ÖÎÀíÔ±£©´´½¨µÄÏνÓÁîÅÆ£¬¶ø·Ç½öÏÞÓÚÒªÇóÕß×Ô¼ºµÄÁîÅÆ¡£µÍȨÏÞ¹¥»÷Õß¿ÉÀûÓô˷ì϶»ñÈ¡¸ßȨÏÞÓû§£¨ÈçÖÎÀíÔ±£©µÄÏνÓÁîÅÆ£¬´Ó¶ø¼ÙÒâÖÎÀíÔ±Éí·Ý½Ó¼ûºÍÖÎÀíÃô¸Ð×ʲú£¬Ö´ÐжñÒâ²Ù×÷£¬µ¼ÖÂȨÏÞÌáÉýºÍδÊÚȨ½Ó¼û¡£·ì϶ÆÀ·Ö9.6·Ö£¬·ì϶¼¶±ðÑϳÁ¡£
¶þ¡¢Ó°ÏìÁìÓò
JumpServer < v3.10.19-ltsJumpServer < v4.10.10-lts
Èý¡¢°²È«´ëÊ©
3.1 Éý¼¶°æ±¾
¹Ù·½ÒѰ䲼½¨¸´²¹¶¡£¬ÒÔ½¨¸´¸Ã·ì϶¡£JumpServer >= v3.10.20-ltsJumpServer >= v4.10.11-lts
ÏÂÔØÁ´½Ó£º
https://community.fit2cloud.com//products/jumpserver/downloads/
3.2 һʱ´ëÊ©
±à×ë Nginx ÅäÖÃÎļþ£¬Ôö³¤ÒÔϹ涨£¬ÒÔÔ¤·Àͨ³£Óû§Í¨¹ý GET ÒªÇó½Ó¼û³¬ÏνÓÁîÅÆ½Ó¿Ú£ºlocation = /api/v1/authentication/super-connection-token/ {if ($request_method = GET) { return 405 } ÏÔʽ×èÖ¹ GET ÒªÇóproxy_pass http://jumpserver_backendlocation = /api/v1/resources/super-connection-tokens/ {if ($request_method = GET) { return 405 } ÏÔʽ×èÖ¹ GET ÒªÇóproxy_pass http://jumpserver_backend
3.3 ͨÓý¨Òé
? ¶¨ÆÚ¸üÐÂϵͳ²¹¶¡£¬Ï÷¼õϵͳ·ì϶£¬ÌáÉý·þÎñÆ÷µÄ°²È«ÐÔ¡£? ¼ÓǿϵͳºÍÍøÂçµÄ½Ó¼û½ÚÔ죬Åú¸Ä·À»ðǽսÊõ£¬¹Ø¹Ø·Ç±ØÒªµÄÀûÓö˿ڻò·þÎñ£¬Ï÷¼õ½«Î£ÏÕ·þÎñ£¨ÈçSSH¡¢RDPµÈ£©Â¶³öµ½¹«Íø£¬Ï÷¼õ¹¥»÷Ãæ¡£? ʹÓÃÆóÒµ¼¶°²È«²úÆ·£¬ÌáÉýÆóÒµµÄÍøÂ簲ȫ»úÄÜ¡£? ¼ÓǿϵͳÓû§ºÍȨÏÞÖÎÀí£¬ÆôÓöà³É·ÖÈÏÖ¤»úÔìºÍ×îÓ×ȨÏÞ×¼Ôò£¬Óû§ºÍÈí¼þȨÏÞӦά³ÖÔÚ×îµÍÏÞ¶È¡£? ÆôÓÃÇ¿ÃÜÂëÕ½Êõ²¢ÉèÖÃΪ¶¨ÆÚÅú¸Ä¡£
3.4 ²Î¿¼Á´½Ó
https://github.com/jumpserver/jumpserver/security/advisories/GHSA-6ghx-6vpv-3wg7/https://nvd.nist.gov/vuln/detail/CVE-2025-62712