ÐÅÏ¢Äþ¾²Öܱ¨-2019ÄêµÚ50ÖÜ
Ðû²¼Ê±¼ä 2019-12-23>±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö
2019Äê12ÔÂ16ÈÕÖÁ22ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´47¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇApache Log4j·´ÐòÁл¯´úÂëÖ´ÐЩ¶´; Citrix Application Delivery ControllerÈÎÒâ´úÂëÖ´ÐЩ¶´£»TRENDnet TEW-651BR»º³åÇøÒç³ö´úÂëÖ´ÐЩ¶´£»Google Chrome media pickerÄÚ´æ´íÎóÒýÓ鶴£»Joomla! configuration SQL×¢È멶´¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇ¿¨°Í˹»ùÐû²¼2019ÄêÍøÂçÍþвµÄͳ¼ÆÊý¾Ý³ÂËߣ»ÃÀ¹úÖÚÒéԺͨ¹ý¡¶±£ÕÏÄÜÔ´»ù´¡ÉèÊ©·¨°¸¡·£»LightInTheBoxй¶1.3TB Web·þÎñÆ÷ÈÕÖ¾£»MacÍþв¼ì²âÊýÁ¿ÔÚ2019Äê³ÊÉÏÉýÇ÷ÊÆ£»Gangnam Industrial StyleÃé×¼Êý°Ù¼Ò¹¤Òµ¹«Ë¾¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖС£
>ÖØÒªÄþ¾²Â©¶´Áбí
1. Apache Log4j·´ÐòÁл¯´úÂëÖ´ÐЩ¶´
Apache Log4j´æÔÚSocket Server·´ÐòÁл¯Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£
https://vigilance.fr/vulnerability/Apache-Log4j-1-2-code-execution-via-Socket-Server-Deserialization-31193
2. Citrix Application Delivery ControllerÈÎÒâ´úÂëÖ´ÐЩ¶´
Citrix Application Delivery Controller´æÔÚδÃ÷Äþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÖ´ÐÐÈÎÒâ´úÂë¡£
https://www.auscert.org.au/bulletins/ESB-2019.4708/
3. TRENDnet TEW-651BR»º³åÇøÒç³ö´úÂëÖ´ÐЩ¶´
TRENDnet TEW-651BR 'ccp_act'²ÎÊý´¦ÖôæÔÚ»º³åÇøÒç³ö©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄ'get_set.ccp' POSTÇëÇ󣬿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐÈÎÒâ´úÂë¡£
https://github.com/pr0v3rbs/CVE/tree/master/CVE-2019-11400
4. Google Chrome media pickerÄÚ´æ´íÎóÒýÓ鶴
Google Chrome media picker´æÔÚÊͷźóʹÓ鶴£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄWEBÇëÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐÈÎÒâ´úÂë¡£
https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop_17.html
5. Joomla! configuration SQL×¢È멶´
Joomla! configuration²ÎÊý´¦ÖôæÔÚÊäÈëÑé֤©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄSQLÇëÇ󣬲Ù×÷Êý¾Ý¿â£¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»òÖ´ÐÐÈÎÒâ´úÂë¡£
https://www.auscert.org.au/bulletins/ESB-2019.4713/
>ÖØÒªÄþ¾²Ê¼þ×ÛÊö
1¡¢¿¨°Í˹»ùÐû²¼2019ÄêÍøÂçÍþвµÄͳ¼ÆÊý¾Ý³ÂËß
¿¨°Í˹»ùÐû²¼2019ÄêÍøÂçÍþвͳ¼ÆÊý¾Ý³ÂËߣ¬¸Ã³ÂËßÊÇ»ùÓÚ2018Äê11Ôµ½2019Äê10ÔÂÆÚ¼ä´ÓÈ«Çò203¸ö¹ú¼ÒºÍµØÓòµÄKSNÓû§ÊÕ¼¯µÄ¶ñÒâ»î¶¯Êý¾Ý¡£ÔÚ³ÂËßÆڼ䣬ÓÐ19.8%µÄÓû§¼ÆËã»úÖÁÉÙÔâÊÜÒ»´Î¶ñÒâÈí¼þÀà´ËÍâÍøÂç¹¥»÷¡£¿¨°Í˹»ùÄþ¾²½â¾ö·½°¸×èÖ¹ÁËÀ´×ÔÈ«ÇòÔÚÏß×ÊÔ´µÄ9.7Òڴι¥»÷¡£Web·´²¡¶¾×é¼þʶ±ð³ö2.7ÒÚ¸ö²îÒìµÄ¶ñÒâURL¡£ÍøÂç·À²¡¶¾Èí¼þ¼ì²âµ½2461Íò¸ö²îÒìµÄ¶ñÒâÑù±¾¡£75.5Íò¸öÓû§¼ÆËã»úÔâµ½ÀÕË÷Èí¼þ¹¥»÷¡£226ÍòÓû§¼ÆËã»úÔâµ½¶ñÒâÍÚ¿ó¹¥»÷¡£¿¨°Í˹»ùÄþ¾²½â¾ö·½°¸ÔÚ76.6Íǫ̀É豸ÉÏ×èÖ¹ÁËÕë¶ÔÔÚÏßÒøÐÐÕË»§µÄ¶ñÒâÈí¼þ¹¥»÷¡£
ÔÎÄÁ´½Ó£º
https://securelist.com/kaspersky-security-bulletin-2019-statistics/95475/
2¡¢ÃÀ¹úÖÚÒéԺͨ¹ý¡¶±£ÕÏÄÜÔ´»ù´¡ÉèÊ©·¨°¸¡·
Ëæ×Å2020Ä꡶¹ú·ÀÊÚȨ·¨¡·£¨NDAA£©µÄͨ¹ý£¬ÃÀ¹úÖÚÒéԺҲͨ¹ýÁË¡¶±£ÕÏÄÜÔ´»ù´¡ÉèÊ©·¨°¸¡·¡£¸Ã·¨°¸½«ÔÚÃÀ¹úÄÜÔ´²¿¹ú¼ÒʵÑéÊÒÄÚ½¨Á¢Ò»¸öΪÆÚÁ½ÄêµÄÊÔµã¼Æ»®£¬ÆäÄ¿±êÊÇ·¢ÏÖÄÜÔ´²¿ÃÅʵÌå»ú¹¹ÖеÄÄþ¾²Â©¶´ºÍ¸ôÀëÒªº¦µÄµçÍøϵͳ¡£ÆÀ¹ÀµÄ¼¼ÊõºÍ³ß¶È°üÂÞÄ£ÄâºÍ·ÇÊý×Ö¿ØÖÆϵͳ¡¢×¨ÓÿØÖÆϵͳºÍÎïÀí¿ØÖÆ·½°¸¡£¸Ã·¨°¸»¹ÒªÇó½¨Á¢Ò»¸öÊÂÇé×飬ÆäÈÎÎñÊÇ·ÖÎö¹ú¼ÒʵÑéÊÒÌá³öµÄ½â¾ö·½°¸£¬²¢Öƶ¨Ò»Ïî±£»¤ÄÜÔ´ÍøµÄ¹ú¼ÒÕ½ÂÔ¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/bill-protect-us-energy-grid-cyberattacks-passes-ndaa
3¡¢LightInTheBoxй¶1.3TB Web·þÎñÆ÷ÈÕÖ¾
vpnMentorÑо¿ÈËÔ±·¢ÏÖÔÚÏßÁãÊÛÉÌLightInTheBoxµÄElasticsearchÊý¾Ý¿â¿É¹ûÈ»·ÃÎÊ£¬ÆäÖаüÂÞ1.3TB Web·þÎñÆ÷ÈÕÖ¾¡£LightInTheBoxרעÓÚСÅä¼þ¡¢·þ×°ºÍÅäÊεÄÏúÊÛ£¬Æä´ó²¿ÃÅ¿Í»§Î»ÓÚ±±ÃÀºÍÅ·ÖÞ¡£Ñо¿ÈËÔ±ÔÚ11ÔÂÏÂÑ®·¢ÏÖÁ˸ÃÊý¾Ý¿â£¬Êý¾Ý¿âÖеļǼ×ܼÆÁè¼Ý15ÒÚÌõ£¬»¹°üÂÞÆä×ÓÍøÕ¾MiniInTheBox.comµÄÊý¾Ý¡£ÈÕÖ¾°üÂÞ8ÔÂ9ÈÕÖÁ10ÔÂ11ÈÕÖ®¼äµÄÍøÕ¾»î¶¯£¬°üÂÞµç×ÓÓʼþµØÖ·¡¢IPµØÖ·¡¢¾Óס¹ú¼Ò/µØÓòÒÔ¼°Ã¿¸ö·Ã¿Í·ÃÎʵÄÒ³ÃæµÈÐÅÏ¢¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/95231/data-breach/lightinthebox-data-leak.html
4¡¢MacÍþв¼ì²âÊýÁ¿ÔÚ2019Äê³ÊÉÏÉýÇ÷ÊÆ
ƾ¾ÝMalwarebytesµÄ×îгÂËߣ¬MacÍþв¼ì²âÊýÁ¿ÔÚ2019Äê³ÊÉÏÉýÇ÷ÊÆ¡£¾¡¹Ü´«Í³¿´·¨ÈÏΪMacÊܵ½µÄѬȾҪ±ÈWindows PCÉٵö࣬µ«2019ÄêMalwarebytesµÄÒ£²âÊý¾Ý±íÃ÷MacÍþв¼ì²âÊýÁ¿·ºÆðÁ˾ªÈ˵ÄÉÏÉýÇ÷ÊÆ¡£ÔÚËùÓÐƽ̨£¨Windows PC¡¢MacºÍAndroid£©ÉϵÄÍþв¼ì²âÅÅÐаñ£¨Top25£©ÖУ¬ÓÐ6¸öÊÇMacÍþв£¬×ÜÌå¶øÑÔ£¬MacÍþвռ×ܼìÕÉÁ¿µÄ16£¥ÒÔÉÏ¡£¿¼Âǵ½MalwarebytesµÄMacÓû§ÈºÔ¼ÄªÊÇWindowsÓû§ÈºµÄ1/12£¬ÕâÒ»Êý×ÖÔ½·¢Ã÷ÏÔ¡£ÔÚ2019Äêµ¥¸ö¼ÆËã»úÉϵÄÍþв¼ì²âÊýÁ¿ÖУ¬Windows PCΪƽ¾ù4.2´Î£¬¶øMacÓû§ÎªÆ½¾ù9.8´Î£¬ÊÇWindowsÓû§µÄÁ½±¶¡£
ÔÎÄÁ´½Ó£º
https://blog.malwarebytes.com/mac/2019/12/mac-threat-detections-on-the-rise-in-2019/
5¡¢Gangnam Industrial StyleÃé×¼Êý°Ù¼Ò¹¤Òµ¹«Ë¾
CyberXÍþвÑо¿Ð¡×éSection 52Åû¶Ö÷ÒªÕë¶Ô¹¤Òµ¡¢¹¤³ÌºÍÖÆÔìÆóÒµµÄAPT¹¥»÷»î¶¯£¬¸Ã¹¥»÷ÍŻﱻ³ÆΪGangnam Industrial Style£¬Ä¿Ç°ÒÑÓÐÖÁÉÙ200¼Ò¹«Ë¾³ÉΪÊܺ¦Õß¡£¾¡¹Ü´ó¶àÊýÊܺ¦ÕßλÓÚº«¹ú£¬µ«°üÂÞÈÕ±¾¡¢Ó¡¶ÈÄáÎ÷ÑÇ¡¢ÍÁ¶úÆä¡¢µÂ¹ú¡¢¶ò¹Ï¶à¶ûºÍÓ¢¹úÔÚÄÚµÄÐí¶à¹ú¼ÒµÄ¹«Ë¾¶¼Êܵ½Ó°Ïì¡£¹¥»÷ÕßÖ÷Ҫͨ¹ýµöÓãÓʼþÌᳫ¹¥»÷£¬ÕâЩÓʼþµÄÖ÷Ìâ/¸½¼þÓ빤ҵÓйأ¬°üÂÞ°×ƤÊé¡¢µç³§Ê¾ÒâͼÒÔ¼°¶ÔÉè¼ÆÉèÊ©£¨ÈçÌìÈ»Æø´¦ÖúÍÉú²ú×°Ö㩵ı¨¼ÛÇëÇóµÈ¡£¹¥»÷ÕßʹÓõĶñÒâÈí¼þÖ÷ҪΪSeparµÄ±äÖÖ£¬Separ¿ÉÇÔÈ¡Firefox¡¢ChromeºÍSafari´æ´¢µÄÃÜÂëÒÔ¼°´ÓGmail¡¢Yahoo¡¢Windows LiveºÍHotmailÖÐÇÔÈ¡ÓʼþÕË»§µÄƾ¾Ý¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/south-korean-industrial-giants-slammed-in-new-info-stealing-hacker-campaign/