¡¾¸´ÏÖ¡¿n8n±í´ïʽעÈë¿Éµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2025-68613£©
Ðû²¼Ê±¼ä 2026-01-13n8nÊÇÒ»¸ö¿ªÔ´µÄÊÂÇéÁ÷³Ì×Ô¶¯»¯Æ½Ì¨£¬£¬£¬£¬£¬Ö¼ÔÚ¿ÉÊÓ»¯ÅþÁ¬Ó¦ÓóÌÐòºÍЧÀÍ£¬£¬£¬£¬£¬ÊµÏÖʹÃü×Ô¶¯»¯£¬£¬£¬£¬£¬²¢¼¯³ÉÇå¾²¹¤¾ßºÍSaaSƽ̨¡£¡£¡£¡£¡£Æä»ùÓÚNode.js¹¹½¨£¬£¬£¬£¬£¬Ê¹ÓÃJavaScript×÷Ϊƽ̨ÄÚ²¿½á¹¹ºÍÓû§ÊÂÇéÁ÷³ÌÂß¼¡£¡£¡£¡£¡£
2025Äê12ÔÂ20ÈÕn8nÐû²¼¸üУ¬£¬£¬£¬£¬ÐÞ¸´ÁËn8nÖÐͨ¹ý±í´ïʽעÈëµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2025-68613£©,CVSSÆÀ·Ö9.9·Ö£¨ÑÏÖØ£©¡£¡£¡£¡£¡£ÎÊÌâ³öÔÚÊÂÇéÁ÷³ÌÖеıí´ïʽÆÀ¹Àϵͳ¡£¡£¡£¡£¡£ÔÚijЩÇéÐÎÏ£¬£¬£¬£¬£¬¾ÓÉÉí·ÝÑéÖ¤µÄÓû§ÊäÈëµÄ±í´ïʽ¿ÉÒÔÔÚÓëµ×²ãÔËÐÐʱ¸ôÀëȱ·¦µÄÉÏÏÂÎÄÖÐÖ´ÐУ¬£¬£¬£¬£¬ÕâÔÊÐíʹÓÃn8nÀú³ÌµÄȨÏÞÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£ÏÖʵÉÏ£¬£¬£¬£¬£¬ÀÖ³ÉʹÓÿÉÄܵ¼Ö£º
? ÍêÈ«¿ØÖÆÊµÀý
? »á¼ûÉñÃØ£¨ÁîÅÆ¡¢Æ¾Ö¤¡¢API ÃÜÔ¿£©
? ³¤ÆÚÐÞ¸ÄÊÂÇéÁ÷³Ì
? ÔÚϵͳ¼¶±ðÖ´ÐÐÏÂÁî
? ½« n8n ÓÃ×÷ÍøÂçÖеÄÊàŦµã
ƾ֤¹¥»÷ÃæÖÎÀíÆ½Ì¨CensysµÄÊý¾Ý£¬£¬£¬£¬£¬×èÖ¹2025Äê12ÔÂ22ÈÕ£¬£¬£¬£¬£¬»¥ÁªÍøÉϱ£´æ103,476¸öDZÔÚµÄÒ×Êܹ¥»÷n8nʵÀý¡£¡£¡£¡£¡£ÓÉÓÚ¿´·¨ÑéÖ¤Îó²îʹÓóÌÐòÒѾÐû²¼£¬£¬£¬£¬£¬²¢ÇÒ¸ÃÎó²îÒÑÔÚ»¥ÁªÍøÉÏÆÕ±éÈö²¥£¬£¬£¬£¬£¬Ó°Ïì¹æÄ£½Ï´ó£¬£¬£¬£¬£¬ÌáÐÑÏà¹ØÓû§×öºÃÉý¼¶·À»¤ÊÂÇé¡£¡£¡£¡£¡£
Îó²îÐÎò
ÔÚn8nµÄÊÂÇéÁ÷±í´ïʽÆÀ¹ÀϵͳÖУ¬£¬£¬£¬£¬¸ÃϵͳÔÚÊÂÇéÁ÷ÉèÖÃÖÐÓÉÈÏÖ¤Óû§ÌṩµÄ±í´ïʽÔÚ²»Çå¾²µÄÖ´ÐÐÇéÐÎÖб»ÆÀ¹À¡£¡£¡£¡£¡£½¹µãÇå¾²Îó²îÊÇÒ»¸ö±í´ïʽעÈëÎó²î£¬£¬£¬£¬£¬Ê¹¾ÓÉÈÏÖ¤µÄ¹¥»÷ÕßÄܹ»ÒÔn8nÀú³ÌµÄȨÏÞÖ´ÐÐí§ÒâJavaScript´úÂë¡£¡£¡£¡£¡£ÏêϸÀ´Ëµ£º
? n8n´¦Öóͷ£ÓÃË«´óÀ¨ºÅ{{ }}°ü¹üµÄÓû§ÊäÈ룬£¬£¬£¬£¬×÷ΪJavaScript´úÂ룬£¬£¬£¬£¬ÇÒûÓÐ×ã¹»µÄɳºÐ»òÊäÈëÑéÖ¤¡£¡£¡£¡£¡£
? ±í´ïʽÇóÖµÆ÷ȱ·¦Êʵ±µÄÉÏÏÂÎĸôÀ룬£¬£¬£¬£¬Ê¹¹¥»÷ÕßÄܹ»ÌÓÀëÔ¤ÆÚµÄÆÀ¹ÀɳºÐ¡£¡£¡£¡£¡£
? ÈÏÖ¤¶Ô¸ÃÎó²îûÓÐʵÖÊÐԵı£»£»£»¤£¬£¬£¬£¬£¬ÈκξÓÉÈÏÖ¤µÄÓû§¶¼¿ÉÒÔʹÓÃËü¡£¡£¡£¡£¡£
n8n¹Ù·½ÐÎòΪ£ºn8n contains a critical Remote Code Execution (RCE) vulnerability in its workflow expression evaluation system. Under certain conditions, expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime.An authenticated attacker could abuse this behavior to execute arbitrary code with the privileges of the n8n process. Successful exploitation may lead to full compromise of the affected instance, including unauthorized access to sensitive data, modification of workflows, and execution of system-level operations.
Ó°Ïì¹æÄ£
? 0.211.0 <= n8n < 1.120.4
? n8n 1.121.0
Îó²îÔÀí
¸Ã°æ±¾´úÂëÖб£´æ¶à´¦Çå¾²ÎÊÌ⣺
£¨1£©Îó²îȪԴexpression.tsÎļþÖеÄresolveSimpleParameterValueº¯ÊýÖб£´æµÄÇå¾²ÎÊÌâÈçÏ£º
? ´úÂ뽫process¹¤¾ß̻¶¸øÁ˱í´ïʽÇóÖµµÄdataÉÏÏÂÎÄ¡£¡£¡£¡£¡£
? ËäȻֻ̻¶Á˲¿·ÖÊôÐÔ£¬£¬£¬£¬£¬µ«Õâ¸ödata.processÒýÓõÄÊÇÏÖʵµÄ Node.js process ¹¤¾ß¡£¡£¡£¡£¡£
? ¹¥»÷Õß¿ÉÒÔͨ¹ýthis.process.mainModule.require()ÈÆ¹ýɳÏäÏÞÖÆ»á¼ûÍêÕûµÄ process ¹¤¾ß¡£¡£¡£¡£¡£

£¨2£©±í´ïʽÇóÖµÈë¿Úexpression-evaluator-proxy.tsÎļþÖб£´æµÄÇå¾²ÎÊÌâÈçÏ£º
? ʹÓÃTournament¿â×÷ΪɳÏäÇéÐΡ£¡£¡£¡£¡£
? Ö»ÓÐafter½×¶ÎµÄPrototypeSanitizerºÍDollarSignValidator¹ýÂËÆ÷¡£¡£¡£¡£¡£
? ûÓÐÓÐÓÃ×èֹͨ¹ýthisÒªº¦×Ö»á¼ûÖ´ÐÐÉÏÏÂÎÄ¡£¡£¡£¡£¡£

£¨3£©É³Ïä³õʼ»¯µÄexpression.tsÎļþÖеÄinitializeGlobalContextº¯ÊýÖб£´æµÄÇå¾²ÎÊÌâÈçÏ£º
? Ö»×èÖ¹ÁËÖ±½ÓŲÓÃeval¡¢FunctionµÈ¡£¡£¡£¡£¡£
? ûÓÐ×èֹͨ¹ýprocess.mainModule.require()»á¼ûNode.jsÄ£¿£¿£¿£¿£¿£¿é¡£¡£¡£¡£¡£

Îó²î¸´ÏÖ

¿ÉÒÔÍû¼ûÏÂÁîÖ´ÐеÄЧ¹ûÔÚÓұߡ£¡£¡£¡£¡£Îó²î´¥·¢ºó£¬£¬£¬£¬£¬Ö´ÐÐÁËϵͳÏÂÁ£¬£¬£¬£¬»ñÈ¡µ½ÁËidµÄÖµ¡£¡£¡£¡£¡£
Çå¾²½¨Òé
Á¬Ã¦Éý¼¶£º
? n8n¹Ù·½ÒÑÐû²¼ÐÞ¸´°æ±¾n8n v1.122.0£¬£¬£¬£¬£¬Ç¿ÁÒ½¨ÒéÓû§Éý¼¶µ½1.122.0»ò¸ü¸ß°æ±¾¡£¡£¡£¡£¡£
ÔÝʱ»º½â²½·¥£º
? ÏÞÖÆÊÂÇéÁ÷½¨ÉèºÍ±à¼È¨ÏÞ½öÏÞÓÚÍêÈ«ÐÅÈεÄÓû§¡£¡£¡£¡£¡£
? ½«n8n°²ÅÅÔÚ¾ßÓÐÊÜÏÞ²Ù×÷ϵͳȨÏÞºÍÍøÂç»á¼ûȨÏÞµÄÇ¿»¯ÇéÐÎÖУ¬£¬£¬£¬£¬ÒÔïÔÌDZÔÚÎó²îʹÓõÄÓ°Ïì¡£¡£¡£¡£¡£
[1]https://github.com/n8n-io/n8n/security/advisories/GHSA-v98v-ff95-f3cp
Z6×ðÁú¿Ê±Æð¾¢·ÀÓùʵÑéÊÒ£¨ADLab£©
ADLab½¨ÉèÓÚ1999Ä꣬£¬£¬£¬£¬ÊÇÖйúÇå¾²ÐÐÒµ×îÔ罨ÉèµÄ¹¥·ÀÊÖÒÕÑо¿ÊµÑéÊÒÖ®Ò»£¬£¬£¬£¬£¬Î¢ÈíMAPPÍýÏë½¹µã³ÉÔ±£¬£¬£¬£¬£¬¡°ºÚȸ¹¥»÷¡±¿´·¨Ê×ÍÆÕß¡£¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬£¬ADLabÒÑͨ¹ý CNVD/CNNVD/NVDB/CVEÀÛ¼ÆÐû²¼Çå¾²Îó²î7000Óà¸ö£¬£¬£¬£¬£¬Ò»Á¬¼á³Ö¹ú¼ÊÍøÂçÇå¾²ÁìÓòÒ»Á÷Ë®×¼¡£¡£¡£¡£¡£ÊµÑéÊÒÑо¿Æ«Ïòº¸Ç»ù´¡Çå¾²Ñо¿¡¢ÔËÓªÉÌ»ù´¡ÍøÂçÉèÊ©Çå¾²Ñо¿¡¢Òƶ¯ÖÕ¶ËÇå¾²Ñо¿¡¢ÔÆÇå¾²Ñо¿¡¢ÐÅ´´Çå¾²Ñо¿¡¢ÎïÁªÍøÇå¾²Ñо¿¡¢³µÁªÍøÇå¾²Ñо¿¡¢¹¤¿ØÇå¾²Ñо¿¡¢ÎÞÏßÇå¾²Ñо¿¡¢Êý¾ÝÇå¾²Ñо¿¡¢AIÇå¾²Ñо¿¡¢µÍ¿ÕÇå¾²Ñо¿¡¢¸ß¼¶ÍþвÑо¿¡¢¹¥·Àϵͳ½¨Éè¡£¡£¡£¡£¡£Ñо¿Ð§¹ûÓ¦ÓÃÓÚ²úÆ·½¹µãÊÖÒÕÑо¿¡¢¹ú¼ÒÖØµã¿Æ¼¼ÏîÄ¿¹¥¹Ø¡¢×¨ÒµÇ徲ЧÀ͵ȡ£¡£¡£¡£¡£



¾©¹«Íø°²±¸11010802024551ºÅ