VolusionÔâºÚ¿ÍÈëÇÖ £¬Áè¼Ý6500¼ÒµçÉÌÍøÕ¾Êܲ¨¼°£»¹È¸èÐû²¼10ÔÂAndroidÇå¾²¸üР£¬ÐÞ¸´¶à¸öRCEÎó²î

Ðû²¼Ê±¼ä 2019-10-10
 1.VolusionÔâºÚ¿ÍÈëÇÖ £¬Áè¼Ý6500¼ÒµçÉÌÍøÕ¾Êܲ¨¼°

×ðÁú¿­Ê± - ÈËÉú¾ÍÊDz«!

ƾ֤zdnetµÄÐÂÎÅ £¬ºÚ¿ÍÈëÇÖVolusionµÄ»ù´¡ÉèÊ©²¢Èö²¥¶ñÒâ´úÂë £¬µ¼ÖÂÁè¼Ý6500¼Òµç×ÓÊÐËÁÍøÕ¾ÊÜÓ°Ïì¡£¸ÃÊÂÎñÊÇÒ»¸öµä·¶µÄMAGECART¹©Ó¦Á´¹¥»÷ £¬¹¥»÷Õß»ñµÃÁËVolusionµÄGoogle Cloud»ù´¡ÉèÊ©»á¼ûȨÏÞ £¬²¢ÔÚÆäÖÐÐÞ¸ÄÁËJSÎļþ £¬Ìí¼ÓÓÃÓÚ¼ÍÈÎÃü»§ÐÅÓÿ¨ÐÅÏ¢µÄ¶ñÒâ´úÂë¡£ÕâЩ¶ñÒâ´úÂë±»¼ÓÔØµ½»ùÓÚVolusionµÄÔÚÏßÊÐËÁÖС£×èÖ¹ÏÖÔÚ¶ñÒâ´úÂëÈÔÔÚVolusionµÄ·þÎñÆ÷ÉÏ £¬VolusionÉÐδ¶Ô´ËÊÂÎñ¾ÙÐлØÓ¦¡£

   

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/hackers-breach-volusion-and-start-collecting-card-details-from-thousands-of-sites/


2.΢Èí×èÖ¹Õë¶ÔÊýÊ®¸öÆóÒµµÄLokiBotÀ¬»øÓʼþÔ˶¯


×ðÁú¿­Ê± - ÈËÉú¾ÍÊDz«!


΢ÈíDefender ATPÍŶÓ×èÖ¹Õë¶ÔÊýÊ®¸öÆóÒµµÄƾ֤͵ÇÔ¹¥»÷Ô˶¯¡£¸Ã¹¥»÷±¬·¢ÔÚ7Ô³õ £¬¹¥»÷Õßͨ¹ýÀ¬»øÓʼþÔ˶¯·Ö·¢¶ñÒâÈí¼þLokiBot £¬¿ìÒª100¼ÒÆóÒµ³ÉΪ¹¥»÷Ä¿µÄ £¬ÕâЩÆóÒµÖ÷ÒªÂþÑÜÔÚ°¢ÁªÇõ¡¢µÂ¹úºÍÆÏÌÑÑÀ¡£ÎªÁË·Ö·¢Lokibot £¬¹¥»÷ÕßʹÓÃÁËÕë¶ÔÐÔ½ÏÇ¿µÄ´¹ÂÚÓʼþ £¬ÀýÈç¹ØÓÚÒ»¼ÒÖÆÒ©¹«Ë¾ £¬¹¥»÷ÕßʹÓÃÁËרҵÊõÓïÀ´ÔöÌí¿ÉÐŶÈ¡£Ò»µ©Êܺ¦Õß·­¿ª¶ñÒ⸽¼þ £¬¾Í»á´Ó¹¥»÷Õß¿ØÖƵÄWordPressÍøÕ¾¼ÓÔØ¶ñÒâ´úÂë £¬²¢Ê¹ÓÃOffice¹«Ê½±à¼­Æ÷Îó²îCVE-2017-11882·Ö·¢Lokibot¡£Lokibot¿ÉÒÔÍøÂçÓÊÏäÃÜÂë¡¢FTPƾ֤¡¢ä¯ÀÀÆ÷´æ´¢µÄÃÜÂëµÈ¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/microsoft-blocks-credential-theft-attack-targeting-dozens-of-orgs/

3.¹È¸èÐû²¼10ÔÂAndroidÇå¾²¸üР£¬ÐÞ¸´¶à¸öRCEÎó²î

×ðÁú¿­Ê± - ÈËÉú¾ÍÊDz«!

¹È¸èÐû²¼10ÔÂAndroidÇå¾²¸üР£¬ÐÞ¸´Ã½Ìå¿ò¼Ü×é¼þÖеÄ3¸öÑÏÖØ¼¶±ðµÄRCEÎó²î¡£ÕâЩÎó²î£¨CVE-2019-2184¡¢CVE-2019-2185¡¢CVE-2019-2186£©Ó°ÏìÁËAndroidϵͳ°æ±¾7.1.1¡¢7.1.2¡¢8.0¡¢8.1ºÍ9¡£±ðµÄ £¬¹È¸è»¹ÐÞ¸´Á˸ßͨ×é¼þÖеÄ18¸öÎó²î £¬ÆäÖÐ8¸öΪÑÏÖØ¼¶±ð £¬°üÀ¨ÄÚºËÎó²î£¨CVE-2018-13916£©¡¢¶àÄ£ºô½Ð´¦Öóͷ£Æ÷Îó²î£¨CVE-2019-2271£©ºÍÆôÏÂÊÖÒÕÎó²î£¨CVE-2019-2251£©µÈ¡£¹È¸è»¹¶Ô½üÆÚÅû¶µÄAndroid 0day£¨CVE-2019-2215£©Ðû²¼ÁËÐÞ¸´²¹¶¡ £¬¸ÃÎó²îÓ°ÏìÁËPixel¡¢ÈýÐÇ¡¢»ªÎª¡¢Ð¡Ã×µÈ18ÖÖÐͺŵÄÊÖ»ú¡£

  

Ô­ÎÄÁ´½Ó£º

https://threatpost.com/google-october-android-security-update/148964/

4.TwinCAT PLC±£´æ¶à¸öÎó²î £¬¿Éµ¼Ö¾ܾø·þÎñ¹¥»÷


×ðÁú¿­Ê± - ÈËÉú¾ÍÊDz«!


µÂ¹ú³§ÉÌBeckhoffÖÆÔìµÄTwinCAT PLC±£´æ¶à¸öDoSÎó²î¡£BeckhoffÖ÷ÒªÌṩ¹¤ÒµPC¡¢I/O¼°ÏÖ³¡×ÜÏß×é¼þ¡¢ÇýÏÂÊÖÒÕºÍ×Ô¶¯»¯Èí¼þµÈ¹¤Òµ½â¾ö¼Æ»® £¬¸Ã¹«Ë¾ÌåÏÖÆä²úÆ·ÒÑÔÚÈ«ÇòÁè¼Ý75¸ö¹ú¼Ò/µØÇøÊ¹Óá£Rapid7Ñо¿Ö°Ô±·¢Ã÷TwinCATÊÜÁ½¸öDoSÎó²îµÄÓ°Ïì £¬°üÀ¨ProfinetÇý¶¯³ÌÐòÖеÄÎó²î£¨CVE-2019-5637£©¼°×é¼þÄÚ²¿Í¨Ñ¶Ð­ÒéADSÓйصÄÎó²î£¨CVE-2019-5636£©¡£Rapid7Ö¸³ö £¬¿ÉÄܵ¼ÖÂDoS״̬µÄÊý¾Ý°üÀàÐÍͨ³£ÊÇÓÉnmapºÍÆäËûÍøÂçɨÃè³ÌÐò·¢³öµÄ £¬ÕâÒâζ×ÅÕýµ±µÄÍøÂçɨÃè»òÎó²î¹ÜÀíÔ˶¯¿ÉÄÜ»áÔÝÊ±ÆÆËð×°±¸ £¬µ«´ËÀà×°±¸Í¨³£²»»á̻¶ÔÚ»¥ÁªÍøÉÏ¡£

Ô­ÎÄÁ´½Ó£º
https://www.securityweek.com/vulnerabilities-expose-twincat-industrial-systems-dos-attacks

5.Ñо¿ÍŶÓÅû¶ʩÄÍµÂµçÆøModicon M580ÖеĶà¸öÎó²î


×ðÁú¿­Ê± - ÈËÉú¾ÍÊDz«!


˼¿ÆTalosÅû¶ʩÄÍµÂµçÆøModicon M580ÖеĶà¸öÎó²î¡£Modicon M580ÊÇÊ©ÄÍµÂµçÆøµÄModicon¿É±à³Ì×Ô¶¯»¯¿ØÖÆÆ÷²úÆ·ÏßÖеÄ×îвúÆ·¡£Ñо¿Ö°Ô±·¢Ã÷Modicon¶ÔFTPµÄʹÓÃÖб£´æ¶à¸öÎó²î £¬°üÀ¨FTPÃ÷ÎÄÉí·ÝÑéÖ¤Îó²î£¨CVE-2019-6846£©¡¢FTP¹Ì¼þ¸üй¦Ð§µ¼Öµľܾø·þÎñÎó²î£¨CVE-2019-6844~CVE-2019-6841 £¬CVE-2019-6847£©¡¢UMASÃ÷ÎÄÊý¾Ý´«ÊäÎó²î£¨CVE-2019-6845£©ÒÔ¼°TFTP·þÎñÆ÷ÐÅϢй¶Îó²î£¨CVE-2019-6851£©¡£ÊÜÓ°ÏìµÄ²úÆ·°æ±¾ÎªModicon M580 BMEP582040 SV2.80¡£

Ô­ÎÄÁ´½Ó£º
https://blog.talosintelligence.com/2019/10/vuln-spotlight-schneider-electric-m580-part-2-sept-2019.html

6.macOSÖÕ¶ËÄ£ÄâÆ÷iTerm2ÆØ³ö±£´æ7ÄêµÄRCEÎó²î


×ðÁú¿­Ê± - ÈËÉú¾ÍÊDz«!


Çå¾²³§ÉÌROS·¢Ã÷macOSÖÕ¶ËÄ£ÄâÆ÷iTerm2±£´æÒ»¸ö¾ßÓÐ7ÄêÀúÊ·µÄÑÏÖØRCEÎó²î£¨CVE-2019-9535£© £¬¸ÃÑо¿ÊÇMozilla¿ªÔ´Ö§³ÖÍýÏ루MOSS£©µÄÒ»²¿·Ö¡£Æ¾Ö¤MozillaÐû²¼µÄ²©¿ÍÎÄÕ £¬¸ÃRCEÎó²î±£´æÓÚiTerm2µÄtmux¼¯ÀÖ³ÉÄÜÖÐ £¬¹¥»÷Õß¿Éͨ¹ýÏòÖÕ¶ËÌṩ¶ñÒâÊä³öÀ´Ö´ÐÐí§ÒâÏÂÁî¡£ÊÓÆµÑÝʾÅú×¢ £¬´ËÎó²îµÄDZÔÚ¹¥»÷ǰÑÔ°üÀ¨ÅþÁ¬µ½¹¥»÷Õß¿ØÖƵĶñÒâSSH·þÎñÆ÷¡¢Ê¹ÓÃcurlµÈÏÂÁî»ñÈ¡¶ñÒâÍøÕ¾»òʹÓÃtail -f¸ú×Ù°üÀ¨Ä³Ð©¶ñÒâÄÚÈݵÄÈÕÖ¾ÎļþµÈ £¬»òÊÇʹÓÃÏÂÁîÐй¤¾ßÓÕʹÓû§´òÓ¡¹¥»÷Õß¿ØÖƵÄÄÚÈÝÀ´´¥·¢¡£MozillaÖÒÑԳƸÃÎó²îÓ°Ïì3.3.5¼°¸ü¸ß°æ±¾µÄiTerm2 £¬²¢ÒÑÔÚiTerm2 3.3.6ÖÐÐÞ¸´¡£

  

Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2019/10/iterm2-macos-terminal-rce.html