{"id":22097,"date":"2025-02-25T00:05:22","date_gmt":"2025-02-25T03:05:22","guid":{"rendered":"https:\/\/www.ethicalhacker.com.br\/site\/?p=22097"},"modified":"2025-02-22T20:47:19","modified_gmt":"2025-02-22T23:47:19","slug":"microsoft-corrige-vulnerabilidade-de-escalonamento","status":"publish","type":"post","link":"https:\/\/www.ethicalhacker.com.br\/site\/2025\/02\/exploits\/microsoft-corrige-vulnerabilidade-de-escalonamento\/","title":{"rendered":"Microsoft corrige vulnerabilidade de escalonamento"},"content":{"rendered":"\n<p class=\"story-title\" style=\"text-align: justify;\"><strong>Microsoft corrige vulnerabilidade de escalonamento de privil\u00e9gios de Power Pages explorada ativamente<\/strong><\/p>\n<p style=\"text-align: justify;\">Recentemente, a Microsoft divulgou atualiza\u00e7\u00f5es de seguran\u00e7a para corrigir duas vulnerabilidades cr\u00edticas que afetam o Bing e o Power Pages. Uma delas, identificada como\u00a0<strong>CVE-2025-24989<\/strong>, j\u00e1 est\u00e1 sendo explorada ativamente por atacantes, permitindo a escala\u00e7\u00e3o de privil\u00e9gios em ambientes do Power Pages. Neste artigo, vamos explorar como essas vulnerabilidades funcionam e como podemos utilizar Python para mitigar riscos semelhantes em ambientes de desenvolvimento e opera\u00e7\u00e3o.<\/p>\n<p>\u00a0<\/p>\n<p><strong>Entendendo as vulnerabilidades<\/strong><\/p>\n<p><strong>CVE-2025-21355 &#8211; Execu\u00e7\u00e3o remota de c\u00f3digo no Bing<\/strong><\/p>\n<p style=\"text-align: justify;\">Essa vulnerabilidade ocorre devido \u00e0\u00a0falta de autentica\u00e7\u00e3o em fun\u00e7\u00f5es cr\u00edticas\u00a0no Bing, permitindo que um atacante n\u00e3o autorizado execute c\u00f3digo remotamente. A Microsoft j\u00e1 corrigiu o problema, mas \u00e9 importante entender como mitigar riscos semelhantes em sistemas pr\u00f3prios.<\/p>\n<p>\u00a0<\/p>\n<p><strong>CVE-2025-24989 &#8211; Escala\u00e7\u00e3o de Privil\u00e9gios no Power Pages<\/strong><\/p>\n<p style=\"text-align: justify;\">Essa falha envolve um\u00a0controle de acesso inadequado\u00a0no Power Pages, uma plataforma de baixo c\u00f3digo para cria\u00e7\u00e3o e hospedagem de sites. Um atacante pode explorar essa vulnerabilidade para elevar privil\u00e9gios e contornar controles de registro de usu\u00e1rios. A Microsoft j\u00e1 mitigou a falha, mas a inclus\u00e3o no cat\u00e1logo KEV (Known Exploited Vulnerabilities) da CISA refor\u00e7a a gravidade do problema.<\/p>\n<p>\u00a0<\/p>\n<p><strong>Como Python pode ajudar na mitiga\u00e7\u00e3o?<\/strong><\/p>\n<p style=\"text-align: justify;\">Python \u00e9 uma linguagem vers\u00e1til e amplamente utilizada em seguran\u00e7a cibern\u00e9tica. Abaixo, apresentamos exemplos de como Python pode ser usado para mitigar riscos semelhantes aos descritos nas vulnerabilidades acima.<\/p>\n<h3>\u00a0<\/h3>\n<p><strong>1. Verifica\u00e7\u00e3o de autentica\u00e7\u00e3o em fun\u00e7\u00f5es cr\u00edticas (CVE-2025-21355)<\/strong><\/p>\n<p style=\"text-align: justify;\">Uma das melhores pr\u00e1ticas para evitar falhas como a do Bing \u00e9 garantir que todas as fun\u00e7\u00f5es cr\u00edticas exijam autentica\u00e7\u00e3o. Podemos usar Python para criar um script que verifique se endpoints ou fun\u00e7\u00f5es est\u00e3o protegidos.<\/p>\n<p>\u00a0<\/p>\n<div class=\"md-code-block\">\n<pre><span class=\"token keyword\">import<\/span> requests\n\n<span class=\"token keyword\">def<\/span> <span class=\"token function\">check_authentication<\/span><span class=\"token punctuation\">(<\/span>url<span class=\"token punctuation\">,<\/span> headers<span class=\"token operator\">=<\/span><span class=\"token boolean\">None<\/span><span class=\"token punctuation\">)<\/span><span class=\"token punctuation\">:<\/span>\n    <span class=\"token keyword\">try<\/span><span class=\"token punctuation\">:<\/span>\n        response <span class=\"token operator\">=<\/span> requests<span class=\"token punctuation\">.<\/span>get<span class=\"token punctuation\">(<\/span>url<span class=\"token punctuation\">,<\/span> headers<span class=\"token operator\">=<\/span>headers<span class=\"token punctuation\">)<\/span>\n        <span class=\"token keyword\">if<\/span> response<span class=\"token punctuation\">.<\/span>status_code <span class=\"token operator\">==<\/span> <span class=\"token number\">401<\/span> <span class=\"token keyword\">or<\/span> response<span class=\"token punctuation\">.<\/span>status_code <span class=\"token operator\">==<\/span> <span class=\"token number\">403<\/span><span class=\"token punctuation\">:<\/span>\n            <span class=\"token keyword\">print<\/span><span class=\"token punctuation\">(<\/span><span class=\"token string-interpolation\"><span class=\"token string\">f\"[SUCESSO] <\/span><span class=\"token interpolation\"><span class=\"token punctuation\">{<\/span>url<span class=\"token punctuation\">}<\/span><\/span><span class=\"token string\"> est\u00e1 protegido por autentica\u00e7\u00e3o.\"<\/span><\/span><span class=\"token punctuation\">)<\/span>\n        <span class=\"token keyword\">else<\/span><span class=\"token punctuation\">:<\/span>\n            <span class=\"token keyword\">print<\/span><span class=\"token punctuation\">(<\/span><span class=\"token string-interpolation\"><span class=\"token string\">f\"[ALERTA] <\/span><span class=\"token interpolation\"><span class=\"token punctuation\">{<\/span>url<span class=\"token punctuation\">}<\/span><\/span><span class=\"token string\"> pode n\u00e3o exigir autentica\u00e7\u00e3o!\"<\/span><\/span><span class=\"token punctuation\">)<\/span>\n    <span class=\"token keyword\">except<\/span> Exception <span class=\"token keyword\">as<\/span> e<span class=\"token punctuation\">:<\/span>\n        <span class=\"token keyword\">print<\/span><span class=\"token punctuation\">(<\/span><span class=\"token string-interpolation\"><span class=\"token string\">f\"[ERRO] Falha ao acessar <\/span><span class=\"token interpolation\"><span class=\"token punctuation\">{<\/span>url<span class=\"token punctuation\">}<\/span><\/span><span class=\"token string\">: <\/span><span class=\"token interpolation\"><span class=\"token punctuation\">{<\/span>e<span class=\"token punctuation\">}<\/span><\/span><span class=\"token string\">\"<\/span><\/span><span class=\"token punctuation\">)<\/span>\n\n<span class=\"token comment\"># Exemplo de uso<\/span>\ncheck_authentication<span class=\"token punctuation\">(<\/span><span class=\"token string\">\"https:\/\/exemplo.com\/funcao-critica\"<\/span><span class=\"token punctuation\">)<br \/><br \/><\/span><\/pre>\n<\/div>\n<p style=\"text-align: justify;\">Esse script verifica se uma URL retorna c\u00f3digos de status 401 (N\u00e3o autorizado) ou 403 (Proibido), indicando que a autentica\u00e7\u00e3o est\u00e1 em vigor.<\/p>\n<p>\u00a0<\/p>\n<p><strong>2. Monitoramento de controle de acesso (CVE-2025-24989)<\/strong><\/p>\n<p style=\"text-align: justify;\">Para evitar falhas de controle de acesso como a do Power Pages, podemos implementar um sistema de monitoramento que verifica permiss\u00f5es de usu\u00e1rios em tempo real.<\/p>\n<div class=\"md-code-block\">\n<div class=\"md-code-block-banner-wrap\">\n<div class=\"md-code-block-banner\">\n<div class=\"md-code-block-action\">\n<div class=\"ds-markdown-code-copy-button\">\u00a0<\/div>\n<\/div>\n<\/div>\n<\/div>\n<pre><span class=\"token keyword\">import<\/span> logging\n\n<span class=\"token comment\"># Configura\u00e7\u00e3o de logging<\/span>\nlogging<span class=\"token punctuation\">.<\/span>basicConfig<span class=\"token punctuation\">(<\/span>filename<span class=\"token operator\">=<\/span><span class=\"token string\">'access_control.log'<\/span><span class=\"token punctuation\">,<\/span> level<span class=\"token operator\">=<\/span>logging<span class=\"token punctuation\">.<\/span>INFO<span class=\"token punctuation\">)<\/span>\n\n<span class=\"token keyword\">def<\/span> <span class=\"token function\">log_access_attempt<\/span><span class=\"token punctuation\">(<\/span>user<span class=\"token punctuation\">,<\/span> resource<span class=\"token punctuation\">,<\/span> has_access<span class=\"token punctuation\">)<\/span><span class=\"token punctuation\">:<\/span>\n    <span class=\"token keyword\">if<\/span> has_access<span class=\"token punctuation\">:<\/span>\n        logging<span class=\"token punctuation\">.<\/span>info<span class=\"token punctuation\">(<\/span><span class=\"token string-interpolation\"><span class=\"token string\">f\"Usu\u00e1rio <\/span><span class=\"token interpolation\"><span class=\"token punctuation\">{<\/span>user<span class=\"token punctuation\">}<\/span><\/span><span class=\"token string\"> acessou <\/span><span class=\"token interpolation\"><span class=\"token punctuation\">{<\/span>resource<span class=\"token punctuation\">}<\/span><\/span><span class=\"token string\"> com sucesso.\"<\/span><\/span><span class=\"token punctuation\">)<\/span>\n    <span class=\"token keyword\">else<\/span><span class=\"token punctuation\">:<\/span>\n        logging<span class=\"token punctuation\">.<\/span>warning<span class=\"token punctuation\">(<\/span><span class=\"token string-interpolation\"><span class=\"token string\">f\"Tentativa de acesso n\u00e3o autorizado: <\/span><span class=\"token interpolation\"><span class=\"token punctuation\">{<\/span>user<span class=\"token punctuation\">}<\/span><\/span><span class=\"token string\"> <br \/>tentou acessar <\/span><span class=\"token interpolation\"><span class=\"token punctuation\">{<\/span>resource<span class=\"token punctuation\">}<\/span><\/span><span class=\"token string\">.\"<\/span><\/span><span class=\"token punctuation\">)<\/span>\n\n<span class=\"token comment\"># Exemplo de uso<\/span>\nlog_access_attempt<span class=\"token punctuation\">(<\/span><span class=\"token string\">\"admin\"<\/span><span class=\"token punctuation\">,<\/span> <span class=\"token string\">\"\/painel-admin\"<\/span><span class=\"token punctuation\">,<\/span> <span class=\"token boolean\">True<\/span><span class=\"token punctuation\">)<\/span>\nlog_access_attempt<span class=\"token punctuation\">(<\/span><span class=\"token string\">\"usuario-comum\"<\/span><span class=\"token punctuation\">,<\/span> <span class=\"token string\">\"\/painel-admin\"<\/span><span class=\"token punctuation\">,<\/span> <span class=\"token boolean\">False<\/span><span class=\"token punctuation\">)<br \/><br \/><br \/><\/span><\/pre>\n<\/div>\n<p style=\"text-align: justify;\">Esse script registra tentativas de acesso, ajudando a identificar atividades suspeitas ou n\u00e3o autorizadas.<\/p>\n<p>\u00a0<\/p>\n<p><strong>3. Varredura de vulnerabilidades em depend\u00eancias<\/strong><\/p>\n<p style=\"text-align: justify;\">Muitas vulnerabilidades surgem de depend\u00eancias desatualizadas ou comprometidas. Podemos usar Python para verificar se as bibliotecas utilizadas em um projeto est\u00e3o atualizadas.<\/p>\n<div class=\"md-code-block\">\n<div class=\"md-code-block-banner-wrap\">\n<div class=\"md-code-block-banner\">\n<div class=\"md-code-block-action\">\n<div class=\"ds-markdown-code-copy-button\">\u00a0<\/div>\n<\/div>\n<\/div>\n<\/div>\n<pre><span class=\"token keyword\">import<\/span> subprocess\n\n<span class=\"token keyword\">def<\/span> <span class=\"token function\">check_dependencies<\/span><span class=\"token punctuation\">(<\/span><span class=\"token punctuation\">)<\/span><span class=\"token punctuation\">:<\/span>\n    <span class=\"token keyword\">try<\/span><span class=\"token punctuation\">:<\/span>\n        result <span class=\"token operator\">=<\/span> subprocess<span class=\"token punctuation\">.<\/span>run<span class=\"token punctuation\">(<\/span><span class=\"token punctuation\">[<\/span><span class=\"token string\">'pip'<\/span><span class=\"token punctuation\">,<\/span> <span class=\"token string\">'list'<\/span><span class=\"token punctuation\">,<\/span> <span class=\"token string\">'--outdated'<\/span><span class=\"token punctuation\">]<\/span><span class=\"token punctuation\">,<\/span> capture_output<span class=\"token operator\">=<\/span><span class=\"token boolean\">True<\/span><span class=\"token punctuation\">,<\/span> text<span class=\"token operator\">=<\/span><span class=\"token boolean\">True<\/span><span class=\"token punctuation\">)<\/span>\n        <span class=\"token keyword\">if<\/span> result<span class=\"token punctuation\">.<\/span>returncode <span class=\"token operator\">==<\/span> <span class=\"token number\">0<\/span><span class=\"token punctuation\">:<\/span>\n            outdated_packages <span class=\"token operator\">=<\/span> result<span class=\"token punctuation\">.<\/span>stdout<span class=\"token punctuation\">.<\/span>splitlines<span class=\"token punctuation\">(<\/span><span class=\"token punctuation\">)<\/span><span class=\"token punctuation\">[<\/span><span class=\"token number\">2<\/span><span class=\"token punctuation\">:<\/span><span class=\"token punctuation\">]<\/span>\n            <span class=\"token keyword\">if<\/span> outdated_packages<span class=\"token punctuation\">:<\/span>\n                <span class=\"token keyword\">print<\/span><span class=\"token punctuation\">(<\/span><span class=\"token string\">\"[ALERTA] Pacotes desatualizados encontrados:\"<\/span><span class=\"token punctuation\">)<\/span>\n                <span class=\"token keyword\">for<\/span> package <span class=\"token keyword\">in<\/span> outdated_packages<span class=\"token punctuation\">:<\/span>\n                    <span class=\"token keyword\">print<\/span><span class=\"token punctuation\">(<\/span>package<span class=\"token punctuation\">)<\/span>\n            <span class=\"token keyword\">else<\/span><span class=\"token punctuation\">:<\/span>\n                <span class=\"token keyword\">print<\/span><span class=\"token punctuation\">(<\/span><span class=\"token string\">\"[SUCESSO] Todos os pacotes est\u00e3o atualizados.\"<\/span><span class=\"token punctuation\">)<\/span>\n        <span class=\"token keyword\">else<\/span><span class=\"token punctuation\">:<\/span>\n            <span class=\"token keyword\">print<\/span><span class=\"token punctuation\">(<\/span><span class=\"token string\">\"[ERRO] Falha ao verificar depend\u00eancias.\"<\/span><span class=\"token punctuation\">)<\/span>\n    <span class=\"token keyword\">except<\/span> Exception <span class=\"token keyword\">as<\/span> e<span class=\"token punctuation\">:<\/span>\n        <span class=\"token keyword\">print<\/span><span class=\"token punctuation\">(<\/span><span class=\"token string-interpolation\"><span class=\"token string\">f\"[ERRO] <\/span><span class=\"token interpolation\"><span class=\"token punctuation\">{<\/span>e<span class=\"token punctuation\">}<\/span><\/span><span class=\"token string\">\"<\/span><\/span><span class=\"token punctuation\">)<\/span>\n\n<span class=\"token comment\"># Exemplo de uso<\/span>\ncheck_dependencies<span class=\"token punctuation\">(<\/span><span class=\"token punctuation\">)<br \/><br \/><\/span><\/pre>\n<\/div>\n<p style=\"text-align: justify;\">Esse script utiliza o comando\u00a0<code>pip list --outdated<\/code>\u00a0para identificar pacotes desatualizados, ajudando a manter o ambiente seguro.<\/p>\n<p>\u00a0<\/p>\n<p><strong>4. Simula\u00e7\u00e3o de ataques de escala\u00e7\u00e3o de privil\u00e9gios<\/strong><\/p>\n<p style=\"text-align: justify;\">Podemos usar Python para simular ataques de escala\u00e7\u00e3o de privil\u00e9gios e testar a robustez dos controles de acesso.<\/p>\n<div class=\"md-code-block\">\n<div class=\"md-code-block-banner-wrap\">\n<div class=\"md-code-block-banner\">\n<div class=\"md-code-block-action\">\n<div class=\"ds-markdown-code-copy-button\">\u00a0<\/div>\n<\/div>\n<\/div>\n<\/div>\n<pre><span class=\"token keyword\">import<\/span> os\n\n<span class=\"token keyword\">def<\/span> <span class=\"token function\">simulate_privilege_escalation<\/span><span class=\"token punctuation\">(<\/span><span class=\"token punctuation\">)<\/span><span class=\"token punctuation\">:<\/span>\n    <span class=\"token keyword\">try<\/span><span class=\"token punctuation\">:<\/span>\n        <span class=\"token comment\"># Tentativa de acessar um recurso restrito<\/span>\n        os<span class=\"token punctuation\">.<\/span>system<span class=\"token punctuation\">(<\/span><span class=\"token string\">\"echo 'Tentando acessar recurso restrito...'\"<\/span><span class=\"token punctuation\">)<\/span>\n        os<span class=\"token punctuation\">.<\/span>system<span class=\"token punctuation\">(<\/span><span class=\"token string\">\"cat \/etc\/shadow\"<\/span><span class=\"token punctuation\">)<\/span>\n    <span class=\"token keyword\">except<\/span> Exception <span class=\"token keyword\">as<\/span> e<span class=\"token punctuation\">:<\/span>\n        <span class=\"token keyword\">print<\/span><span class=\"token punctuation\">(<\/span><span class=\"token string-interpolation\"><span class=\"token string\">f\"[ERRO] Falha na simula\u00e7\u00e3o: <\/span><span class=\"token interpolation\"><span class=\"token punctuation\">{<\/span>e<span class=\"token punctuation\">}<\/span><\/span><span class=\"token string\">\"<\/span><\/span><span class=\"token punctuation\">)<\/span>\n\n<span class=\"token comment\"># Exemplo de uso<\/span>\nsimulate_privilege_escalation<span class=\"token punctuation\">(<\/span><span class=\"token punctuation\">)<br \/><br \/><\/span><\/pre>\n<\/div>\n<p style=\"text-align: justify;\">Esse script simula uma tentativa de acesso a um arquivo restrito do sistema. Em um ambiente real, voc\u00ea pode usar ferramentas como o\u00a0<strong>OWASP ZAP<\/strong>\u00a0ou\u00a0<strong>Metasploit<\/strong>\u00a0para testes mais avan\u00e7ados.<\/p>\n<h2>\u00a0<\/h2>\n<p><strong>Conclus\u00e3o<\/strong><\/p>\n<p style=\"text-align: justify;\">As vulnerabilidades\u00a0<strong>CVE-2025-21355<\/strong>\u00a0e\u00a0<strong>CVE-2025-24989<\/strong>\u00a0destacam a import\u00e2ncia de controles robustos de autentica\u00e7\u00e3o e acesso. Utilizando Python, podemos implementar verifica\u00e7\u00f5es proativas, monitorar atividades suspeitas e garantir que nossos sistemas estejam protegidos contra amea\u00e7as semelhantes.<\/p>\n<p style=\"text-align: justify;\">A seguran\u00e7a cibern\u00e9tica \u00e9 um processo cont\u00ednuo, e ferramentas como Python nos permitem automatizar e aprimorar nossas defesas. Se voc\u00ea trabalha com desenvolvimento ou opera\u00e7\u00f5es, considere integrar essas pr\u00e1ticas em seu fluxo de trabalho para mitigar riscos e proteger seus sistemas.<\/p>\n<p>\u00a0<\/p>\n<p>Fonte e imagens: <a href=\"https:\/\/thehackernews.com\/2025\/02\/microsoft-patches-actively-exploited.html\" target=\"_blank\" rel=\"noopener\">https:\/\/thehackernews.com\/2025\/02\/microsoft-patches-actively-exploited.html<\/a><\/p>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Microsoft corrige vulnerabilidade de escalonamento de privil\u00e9gios de Power Pages explorada ativamente Recentemente, a Microsoft divulgou atualiza\u00e7\u00f5es de seguran\u00e7a para corrigir duas vulnerabilidades cr\u00edticas que afetam o Bing e o Power Pages. Uma delas, identificada como\u00a0CVE-2025-24989, j\u00e1 est\u00e1 sendo explorada ativamente por atacantes, permitindo a escala\u00e7\u00e3o de privil\u00e9gios em ambientes do Power Pages. Neste artigo, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":22099,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[89,100,21],"tags":[],"class_list":["post-22097","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-basico","category-diversos","category-exploits"],"_links":{"self":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/22097","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/comments?post=22097"}],"version-history":[{"count":5,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/22097\/revisions"}],"predecessor-version":[{"id":22103,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/22097\/revisions\/22103"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media\/22099"}],"wp:attachment":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media?parent=22097"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/categories?post=22097"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/tags?post=22097"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}