ÐÅÏ¢Äþ¾²Öܱ¨-2019ÄêµÚ50ÖÜ

Ðû²¼Ê±¼ä 2019-12-23

>±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö


2019Äê12ÔÂ16ÈÕÖÁ22ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´47¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇApache Log4j·´ÐòÁл¯´úÂëÖ´ÐЩ¶´; Citrix Application Delivery ControllerÈÎÒâ´úÂëÖ´ÐЩ¶´£»TRENDnet TEW-651BR»º³åÇøÒç³ö´úÂëÖ´ÐЩ¶´£»Google Chrome media pickerÄÚ´æ´íÎóÒýÓ鶴£»Joomla! configuration SQL×¢È멶´¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇ¿¨°Í˹»ùÐû²¼2019ÄêÍøÂçÍþвµÄͳ¼ÆÊý¾Ý³ÂËߣ»ÃÀ¹úÖÚÒéԺͨ¹ý¡¶±£ÕÏÄÜÔ´»ù´¡ÉèÊ©·¨°¸¡·£»LightInTheBoxй¶1.3TB Web·þÎñÆ÷ÈÕÖ¾£»MacÍþв¼ì²âÊýÁ¿ÔÚ2019Äê³ÊÉÏÉýÇ÷ÊÆ£»Gangnam Industrial StyleÃé×¼Êý°Ù¼Ò¹¤Òµ¹«Ë¾¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖС£



>ÖØÒªÄþ¾²Â©¶´Áбí


1. Apache Log4j·´ÐòÁл¯´úÂëÖ´ÐЩ¶´


Apache Log4j´æÔÚSocket Server·´ÐòÁл¯Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£

https://vigilance.fr/vulnerability/Apache-Log4j-1-2-code-execution-via-Socket-Server-Deserialization-31193


2. Citrix Application Delivery ControllerÈÎÒâ´úÂëÖ´ÐЩ¶´


Citrix Application Delivery Controller´æÔÚδÃ÷Äþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÖ´ÐÐÈÎÒâ´úÂë¡£

https://www.auscert.org.au/bulletins/ESB-2019.4708/


3. TRENDnet TEW-651BR»º³åÇøÒç³ö´úÂëÖ´ÐЩ¶´


TRENDnet TEW-651BR 'ccp_act'²ÎÊý´¦ÖôæÔÚ»º³åÇøÒç³ö©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄ'get_set.ccp' POSTÇëÇ󣬿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐÈÎÒâ´úÂë¡£

https://github.com/pr0v3rbs/CVE/tree/master/CVE-2019-11400


4. Google Chrome media pickerÄÚ´æ´íÎóÒýÓ鶴


Google Chrome media picker´æÔÚÊͷźóʹÓ鶴£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄWEBÇëÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐÈÎÒâ´úÂë¡£

https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop_17.html


5. Joomla! configuration SQL×¢È멶´


Joomla! configuration²ÎÊý´¦ÖôæÔÚÊäÈëÑé֤©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄSQLÇëÇ󣬲Ù×÷Êý¾Ý¿â£¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»òÖ´ÐÐÈÎÒâ´úÂë¡£

https://www.auscert.org.au/bulletins/ESB-2019.4713/


>ÖØÒªÄþ¾²Ê¼þ×ÛÊö


1¡¢¿¨°Í˹»ùÐû²¼2019ÄêÍøÂçÍþвµÄͳ¼ÆÊý¾Ý³ÂËß


×ðÁú¶¶È¦ - Ϊdu¶øÉú


¿¨°Í˹»ùÐû²¼2019ÄêÍøÂçÍþвͳ¼ÆÊý¾Ý³ÂËߣ¬¸Ã³ÂËßÊÇ»ùÓÚ2018Äê11Ôµ½2019Äê10ÔÂÆÚ¼ä´ÓÈ«Çò203¸ö¹ú¼ÒºÍµØÓòµÄKSNÓû§ÊÕ¼¯µÄ¶ñÒâ»î¶¯Êý¾Ý¡£ÔÚ³ÂËßÆڼ䣬ÓÐ19.8%µÄÓû§¼ÆËã»úÖÁÉÙÔâÊÜÒ»´Î¶ñÒâÈí¼þÀà´ËÍâÍøÂç¹¥»÷¡£¿¨°Í˹»ùÄþ¾²½â¾ö·½°¸×èÖ¹ÁËÀ´×ÔÈ«ÇòÔÚÏß×ÊÔ´µÄ9.7Òڴι¥»÷¡£Web·´²¡¶¾×é¼þʶ±ð³ö2.7ÒÚ¸ö²îÒìµÄ¶ñÒâURL¡£ÍøÂç·À²¡¶¾Èí¼þ¼ì²âµ½2461Íò¸ö²îÒìµÄ¶ñÒâÑù±¾¡£75.5Íò¸öÓû§¼ÆËã»úÔâµ½ÀÕË÷Èí¼þ¹¥»÷¡£226ÍòÓû§¼ÆËã»úÔâµ½¶ñÒâÍÚ¿ó¹¥»÷¡£¿¨°Í˹»ùÄþ¾²½â¾ö·½°¸ÔÚ76.6Íǫ̀É豸ÉÏ×èÖ¹ÁËÕë¶ÔÔÚÏßÒøÐÐÕË»§µÄ¶ñÒâÈí¼þ¹¥»÷¡£


Ô­ÎÄÁ´½Ó£º

https://securelist.com/kaspersky-security-bulletin-2019-statistics/95475/


2¡¢ÃÀ¹úÖÚÒéԺͨ¹ý¡¶±£ÕÏÄÜÔ´»ù´¡ÉèÊ©·¨°¸¡·


×ðÁú¶¶È¦ - Ϊdu¶øÉú


Ëæ×Å2020Ä꡶¹ú·ÀÊÚȨ·¨¡·£¨NDAA£©µÄͨ¹ý£¬ÃÀ¹úÖÚÒéԺҲͨ¹ýÁË¡¶±£ÕÏÄÜÔ´»ù´¡ÉèÊ©·¨°¸¡·¡£¸Ã·¨°¸½«ÔÚÃÀ¹úÄÜÔ´²¿¹ú¼ÒʵÑéÊÒÄÚ½¨Á¢Ò»¸öΪÆÚÁ½ÄêµÄÊÔµã¼Æ»®£¬ÆäÄ¿±êÊÇ·¢ÏÖÄÜÔ´²¿ÃÅʵÌå»ú¹¹ÖеÄÄþ¾²Â©¶´ºÍ¸ôÀëÒªº¦µÄµçÍøϵͳ¡£ÆÀ¹ÀµÄ¼¼ÊõºÍ³ß¶È°üÂÞÄ£ÄâºÍ·ÇÊý×Ö¿ØÖÆϵͳ¡¢×¨ÓÿØÖÆϵͳºÍÎïÀí¿ØÖÆ·½°¸¡£¸Ã·¨°¸»¹ÒªÇó½¨Á¢Ò»¸öÊÂÇé×飬ÆäÈÎÎñÊÇ·ÖÎö¹ú¼ÒʵÑéÊÒÌá³öµÄ½â¾ö·½°¸£¬²¢Öƶ¨Ò»Ïî±£»¤ÄÜÔ´ÍøµÄ¹ú¼ÒÕ½ÂÔ¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/bill-protect-us-energy-grid-cyberattacks-passes-ndaa


3¡¢LightInTheBoxй¶1.3TB Web·þÎñÆ÷ÈÕÖ¾


×ðÁú¶¶È¦ - Ϊdu¶øÉú


vpnMentorÑо¿ÈËÔ±·¢ÏÖÔÚÏßÁãÊÛÉÌLightInTheBoxµÄElasticsearchÊý¾Ý¿â¿É¹ûÈ»·ÃÎÊ£¬ÆäÖаüÂÞ1.3TB Web·þÎñÆ÷ÈÕÖ¾¡£LightInTheBoxרעÓÚСÅä¼þ¡¢·þ×°ºÍÅäÊεÄÏúÊÛ£¬Æä´ó²¿ÃÅ¿Í»§Î»ÓÚ±±ÃÀºÍÅ·ÖÞ¡£Ñо¿ÈËÔ±ÔÚ11ÔÂÏÂÑ®·¢ÏÖÁ˸ÃÊý¾Ý¿â£¬Êý¾Ý¿âÖеļǼ×ܼÆÁè¼Ý15ÒÚÌõ£¬»¹°üÂÞÆä×ÓÍøÕ¾MiniInTheBox.comµÄÊý¾Ý¡£ÈÕÖ¾°üÂÞ8ÔÂ9ÈÕÖÁ10ÔÂ11ÈÕÖ®¼äµÄÍøÕ¾»î¶¯£¬°üÂÞµç×ÓÓʼþµØÖ·¡¢IPµØÖ·¡¢¾Óס¹ú¼Ò/µØÓòÒÔ¼°Ã¿¸ö·Ã¿Í·ÃÎʵÄÒ³ÃæµÈÐÅÏ¢¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/95231/data-breach/lightinthebox-data-leak.html


4¡¢MacÍþв¼ì²âÊýÁ¿ÔÚ2019Äê³ÊÉÏÉýÇ÷ÊÆ


×ðÁú¶¶È¦ - Ϊdu¶øÉú


ƾ¾ÝMalwarebytesµÄ×îгÂËߣ¬MacÍþв¼ì²âÊýÁ¿ÔÚ2019Äê³ÊÉÏÉýÇ÷ÊÆ¡£¾¡¹Ü´«Í³¿´·¨ÈÏΪMacÊܵ½µÄѬȾҪ±ÈWindows PCÉٵö࣬µ«2019ÄêMalwarebytesµÄÒ£²âÊý¾Ý±íÃ÷MacÍþв¼ì²âÊýÁ¿·ºÆðÁ˾ªÈ˵ÄÉÏÉýÇ÷ÊÆ¡£ÔÚËùÓÐƽ̨£¨Windows PC¡¢MacºÍAndroid£©ÉϵÄÍþв¼ì²âÅÅÐаñ£¨Top25£©ÖУ¬ÓÐ6¸öÊÇMacÍþв£¬×ÜÌå¶øÑÔ£¬MacÍþвռ×ܼìÕÉÁ¿µÄ16£¥ÒÔÉÏ¡£¿¼Âǵ½MalwarebytesµÄMacÓû§ÈºÔ¼ÄªÊÇWindowsÓû§ÈºµÄ1/12£¬ÕâÒ»Êý×ÖÔ½·¢Ã÷ÏÔ¡£ÔÚ2019Äêµ¥¸ö¼ÆËã»úÉϵÄÍþв¼ì²âÊýÁ¿ÖУ¬Windows PCΪƽ¾ù4.2´Î£¬¶øMacÓû§ÎªÆ½¾ù9.8´Î£¬ÊÇWindowsÓû§µÄÁ½±¶¡£


Ô­ÎÄÁ´½Ó£º

https://blog.malwarebytes.com/mac/2019/12/mac-threat-detections-on-the-rise-in-2019/


5¡¢Gangnam Industrial StyleÃé×¼Êý°Ù¼Ò¹¤Òµ¹«Ë¾


×ðÁú¶¶È¦ - Ϊdu¶øÉú


CyberXÍþвÑо¿Ð¡×éSection 52Åû¶Ö÷ÒªÕë¶Ô¹¤Òµ¡¢¹¤³ÌºÍÖÆÔìÆóÒµµÄAPT¹¥»÷»î¶¯£¬¸Ã¹¥»÷ÍŻﱻ³ÆΪGangnam Industrial Style£¬Ä¿Ç°ÒÑÓÐÖÁÉÙ200¼Ò¹«Ë¾³ÉΪÊܺ¦Õß¡£¾¡¹Ü´ó¶àÊýÊܺ¦ÕßλÓÚº«¹ú£¬µ«°üÂÞÈÕ±¾¡¢Ó¡¶ÈÄáÎ÷ÑÇ¡¢ÍÁ¶úÆä¡¢µÂ¹ú¡¢¶ò¹Ï¶à¶ûºÍÓ¢¹úÔÚÄÚµÄÐí¶à¹ú¼ÒµÄ¹«Ë¾¶¼Êܵ½Ó°Ïì¡£¹¥»÷ÕßÖ÷Ҫͨ¹ýµöÓãÓʼþÌᳫ¹¥»÷£¬ÕâЩÓʼþµÄÖ÷Ìâ/¸½¼þÓ빤ҵÓйØ£¬°üÂÞ°×ƤÊé¡¢µç³§Ê¾ÒâͼÒÔ¼°¶ÔÉè¼ÆÉèÊ©£¨ÈçÌìÈ»Æø´¦ÖúÍÉú²ú×°Ö㩵ı¨¼ÛÇëÇóµÈ¡£¹¥»÷ÕßʹÓõĶñÒâÈí¼þÖ÷ҪΪSeparµÄ±äÖÖ£¬Separ¿ÉÇÔÈ¡Firefox¡¢ChromeºÍSafari´æ´¢µÄÃÜÂëÒÔ¼°´ÓGmail¡¢Yahoo¡¢Windows LiveºÍHotmailÖÐÇÔÈ¡ÓʼþÕË»§µÄƾ¾Ý¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/south-korean-industrial-giants-slammed-in-new-info-stealing-hacker-campaign/