简体   繁体   English

macOS BigSur 上的 Apache httpd 漏洞

[英]Apache httpd vulnerability on macOS BigSur

I'm on the latest macOS (BigSur 11.4 20F71) and discovered a critical vulnerability in Apache httpd, which is located here /usr/sbin/httpd .我在最新的 macOS (BigSur 11.4 20F71) 上发现了 Apache httpd 中的一个严重漏洞,它位于/usr/sbin/httpd I never installed Apache httpd on my mac.我从未在我的 Mac 上安装 Apache httpd。 /usr/sbin is a Read-Only file system (Protected by SIP "System Integrity Protection") and it isn't possible to install anything in that folder, even as a root user, which makes me think that Apache http is bundled with BigSur by default. /usr/sbin是一个只读文件系统(受 SIP“系统完整性保护”保护)并且无法在该文件夹中安装任何东西,即使是根用户,这让我认为 Apache http 与默认情况下是 BigSur。 If so, how can I install the latest patch?如果是这样,我该如何安装最新的补丁?

The vulnerable version is 2.4.46 and there's a fix in 2.4.47, but I've had real issues updating httpd.易受攻击的版本是 2.4.46,2.4.47 中有一个修复程序,但我在更新 httpd 时遇到了真正的问题。

> /usr/sbin/httpd -v
Server version: Apache/2.4.46 (Unix)
Server built:   May  8 2021 03:38:34

Things I've tried so far:到目前为止我尝试过的事情:

  • Install the latest version of httpd using homebrew.使用 homebrew 安装最新版本的 httpd。 It installs the correct version in /usr/local/bin which isn't OK because it still leaves the vulnerable version intact.它在/usr/local/bin中安装了正确的版本,但这是不正确的,因为它仍然完整地保留了易受攻击的版本。
  • Making any change to /usr/sbin/httpd throws a "Operation not permitted" error, which led me to try to Disable System Integrity Protection because it should make the file system writable./usr/sbin/httpd进行任何更改都会引发“不允许操作”错误,这导致我尝试禁用系统完整性保护,因为它应该使文件系统可写。 After disabling it I tried to manually install the latest version of the httpd binary into /usr/sbin/httpd, but I still get this error: /usr/sbin/httpd: Read-only file system .禁用它后,我尝试手动将最新版本的 httpd 二进制文件安装到 /usr/sbin/httpd 中,但我仍然收到此错误: /usr/sbin/httpd: Read-only file system It looks like it's not possible to disable SIP completely.看起来不可能完全禁用 SIP。

How can I resolve this?我该如何解决这个问题? This vulnerability was discovered on June 6th, so it's over the 14 day limit required by a lot of InfoSec regulators to implement a fix.该漏洞是在 6 月 6 日发现的,因此超过了许多 InfoSec 监管机构实施修复所需的 14 天限制。

For reference, here are the details of the vulnerability (From Nessus):作为参考,这里是漏洞的详细信息(来自 Nessus):

The version of Apache httpd installed on the remote host is prior to 2.4.47.远程主机上安装的 Apache httpd 版本早于 2.4.47。 It is, therefore, affected by multiple vulnerabilities as referenced in the 2.4.47 changelog:因此,它受到 2.4.47 更新日志中引用的多个漏洞的影响:

  • Unexpected section matching with 'MergeSlashes OFF' (CVE-2021-30641)与“MergeSlashes OFF”匹配的意外部分 (CVE-2021-30641)

  • mod_auth_digest: possible stack overflow by one nul byte while validating the Digest nonce. mod_auth_digest:验证 Digest nonce 时可能堆栈溢出一个 nul 字节。 (CVE-2020-35452) (CVE-2020-35452)

  • mod_session: Fix possible crash due to NULL pointer dereference, which could be used to cause a Denial of Service with a malicious backend server and SessionHeader. mod_session:修复由于 NULL 指针取消引用可能导致的崩溃,这可能会导致恶意后端服务器和 SessionHeader 拒绝服务。 (CVE-2021-26691) (CVE-2021-26691)

  • mod_session: Fix possible crash due to NULL pointer dereference, which could be used to cause a Denial of Service. mod_session:修复由于 NULL 指针取消引用可能导致的崩溃,这可能会导致拒绝服务。 (CVE-2021-26690) (CVE-2021-26690)

  • mod_proxy_http: Fix possible crash due to NULL pointer dereference, which could be used to cause a Denial of Service. mod_proxy_http:修复由于 NULL 指针取消引用可能导致的崩溃,这可能会导致拒绝服务。 (CVE-2020-13950) (CVE-2020-13950)

  • Windows: Prevent local users from stopping the httpd process (CVE-2020-13938) Windows:防止本地用户停止 httpd 进程 (CVE-2020-13938)

  • mod_proxy_wstunnel, mod_proxy_http: Handle Upgradable protocols end-to-end negotiation. mod_proxy_wstunnel、mod_proxy_http:处理可升级协议端到端协商。 (CVE-2019-17567) (CVE-2019-17567)

Until new Apache version v2.4.47/8 is made available by Apple, you can ensure the built in web server service is disabled at startup ( disabled by default) - refer url https://community.jamf.com/t5/jamf-pro/macos-vulnerability-httpd/td-p/236022在 Apple 提供新的 Apache 版本 v2.4.47/8 之前,您可以确保在启动时禁用内置的 web 服务器服务(默认情况下禁用) - 请参阅 url https://community.jamf.com/t5/jamf- pro/macos-漏洞-httpd/td-p/236022

声明:本站的技术帖子网页,遵循CC BY-SA 4.0协议,如果您需要转载,请注明本站网址或者原文地址。任何问题请咨询:yoyou2525@163.com.

 
粤ICP备18138465号  © 2020-2024 STACKOOM.COM