Ò»¡¢Îó²î¸ÅÊö
Îó²îÃû³Æ | JumpServer ÅþÁ¬ÁîÅÆÐ¹Â¶Îó²î |
CVE ID | CVE-2025-62712 |
Îó²îÀàÐÍ | ȨÏÞÑé֤ȱʧ | ·¢Ã÷ʱ¼ä | 2025-11-4 |
Îó²îÆÀ·Ö | 9.6 | Îó²îÆ·¼¶ | ÑÏÖØ |
¹¥»÷ÏòÁ¿ | ÍøÂç | ËùÐèȨÏÞ | µÍ |
ʹÓÃÄÑ¶È | µÍ | Óû§½»»¥ | ²»ÐèÒª |
PoC/EXP | δ¹ûÕæ | ÔÚҰʹÓà | δ·¢Ã÷ |
JumpServerÊÇÒ»¿î¿ªÔ´µÄ±¤ÀÝ»ú£¨Ìø°å»ú£©Èí¼þ£¬Ö÷ÒªÓÃÓÚÆóÒµÄÚ²¿×ʲúµÄÇå¾²ÖÎÀíÓëÉ󼯡£Ëüͨ¹ý¼¯ÖÐÖÎÀíºÍÉó¼ÆÔËάְԱ¶Ô·þÎñÆ÷µÄ»á¼û£¬ÌṩͳһµÄ»á¼û¿ØÖÆ¡¢È¨ÏÞÖÎÀí¡¢»á»°Â¼ÖƵȹ¦Ð§£¬È·±£Ãô¸Ð²Ù×÷µÄÇå¾²ÐÔÓë¿É×·ËÝÐÔ¡£JumpServerÖ§³Ö¶àÖÖÈÏÖ¤·½·¨ºÍȨÏÞÉèÖã¬ÆÕ±éÓ¦ÓÃÓÚITÔËά¡¢ÏµÍ³ÖÎÀíÒÔ¼°ÔÆÆ½Ì¨ÇéÐÎÖУ¬×ÊÖúÆóÒµÌáÉýÇå¾²·À»¤ÄÜÁ¦ºÍºÏ¹æÐÔ¡£
2025Äê10ÔÂ28ÈÕ£¬×ðÁú¿Ê±¼¯ÍÅVSRC¼à²âµ½JumpServerÖеÄÒ»¸öÑÏÖØÎó²î£¬Ô´ÓÚÆäsuper-connection-token½Ó¿Úδ¾ÙÐÐÑÏ¿áµÄȨÏÞÑéÖ¤¡£¸Ã½Ó¿Ú·µ»ØÁËËùÓÐÓû§£¨°üÀ¨ÖÎÀíÔ±£©½¨ÉèµÄÅþÁ¬ÁîÅÆ£¬¶ø·Ç½öÏÞÓÚÇëÇóÕß×Ô¼ºµÄÁîÅÆ¡£µÍȨÏÞ¹¥»÷Õß¿ÉʹÓôËÎó²î»ñÈ¡¸ßȨÏÞÓû§£¨ÈçÖÎÀíÔ±£©µÄÅþÁ¬ÁîÅÆ£¬´Ó¶øÃ°³äÖÎÀíÔ±Éí·Ý»á¼ûºÍÖÎÀíÃô¸Ð×ʲú£¬Ö´ÐжñÒâ²Ù×÷£¬µ¼ÖÂȨÏÞÌáÉýºÍδÊÚȨ»á¼û¡£Îó²îÆÀ·Ö9.6·Ö£¬Îó²î¼¶±ðÑÏÖØ¡£
¶þ¡¢Ó°Ïì¹æÄ£
JumpServer < v3.10.19-ltsJumpServer < v4.10.10-lts
Èý¡¢Çå¾²²½·¥
3.1 Éý¼¶°æ±¾
¹Ù·½ÒÑÐû²¼ÐÞ¸´²¹¶¡£¬ÒÔÐÞ¸´¸ÃÎó²î¡£JumpServer >= v3.10.20-ltsJumpServer >= v4.10.11-lts
ÏÂÔØÁ´½Ó£º
https://community.fit2cloud.com//products/jumpserver/downloads/
3.2 ÔÝʱ²½·¥
±à¼ Nginx ÉèÖÃÎļþ£¬Ìí¼ÓÒÔϹæÔò£¬ÒÔ±ÜÃâͨË×Óû§Í¨¹ý GET ÇëÇó»á¼û³¬ÅþÁ¬ÁîÅÆ½Ó¿Ú£ºlocation = /api/v1/authentication/super-connection-token/ {if ($request_method = GET) { return 405 } ÏÔʽ×èÖ¹ GET ÇëÇóproxy_pass http://jumpserver_backendlocation = /api/v1/resources/super-connection-tokens/ {if ($request_method = GET) { return 405 } ÏÔʽ×èÖ¹ GET ÇëÇóproxy_pass http://jumpserver_backend
3.3 ͨÓý¨Òé
? °´ÆÚ¸üÐÂϵͳ²¹¶¡£¬ïÔÌϵͳÎó²î£¬ÌáÉý·þÎñÆ÷µÄÇå¾²ÐÔ¡£? ÔöǿϵͳºÍÍøÂçµÄ»á¼û¿ØÖÆ£¬Ð޸ķÀ»ðǽսÂÔ£¬¹Ø±Õ·ÇÐëÒªµÄÓ¦Óö˿ڻò·þÎñ£¬ïÔ̽«Î£ÏÕ·þÎñ£¨ÈçSSH¡¢RDPµÈ£©Ì»Â¶µ½¹«Íø£¬ïÔ̹¥»÷Ãæ¡£? ʹÓÃÆóÒµ¼¶Çå¾²²úÆ·£¬ÌáÉýÆóÒµµÄÍøÂçÇå¾²ÐÔÄÜ¡£? ÔöǿϵͳÓû§ºÍȨÏÞÖÎÀí£¬ÆôÓöàÒòËØÈÏÖ¤»úÖÆºÍ×îСȨÏÞÔÔò£¬Óû§ºÍÈí¼þȨÏÞÓ¦¼á³ÖÔÚ×îµÍÏÞ¶È¡£? ÆôÓÃÇ¿ÃÜÂëÕ½ÂÔ²¢ÉèÖÃΪ°´ÆÚÐ޸ġ£
3.4 ²Î¿¼Á´½Ó
https://github.com/jumpserver/jumpserver/security/advisories/GHSA-6ghx-6vpv-3wg7/https://nvd.nist.gov/vuln/detail/CVE-2025-62712