ÐÅÏ¢Çå¾²Öܱ¨-2020ÄêµÚ49ÖÜ

Ðû²¼Ê±¼ä 2020-12-08

> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö


2020Äê11ÔÂ30ÈÕÖÁ12ÔÂ06ÈÕ¹²ÊÕ¼Çå¾²Îó²î50¸ö£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇZeroshell cgi-bin kerbynet StartSessionSubmit×¢ÈëÎó²î £»£»£»£»£»£»Western Digital My Cloud OS devicesÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î £»£»£»£»£»£»SourceCodester Car Rental Management System SQL×¢ÈëÎó²î £»£»£»£»£»£»Crux Linux Docker images root¿ÕÃÜÂëÎó²î £»£»£»£»£»£»HPE Edgeline Infrastructure ManagerÔ¶³Ì´úÂëÖ´ÐÐÎó²î¡£¡£¡£¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇоƬ³§ÉÌAdvantechѬȾConti£¬£¬£¬±»ÀÕË÷1300ÍòÃÀÔª £»£»£»£»£»£»Carding Action 2020Ðж¯ÆÆ»ñÒ»Æð´ó¹æÄ£Õ©Æ­°¸¼þ £»£»£»£»£»£»Cisco TalosÅû¶WebKitÖжà¸öÑÏÖØµÄÎó²î £»£»£»£»£»£»Ñо¿ÍŶӷ¢Ã÷½©Ê¬ÍøÂçXantheʹÓÃDockerAPIѬȾLinux £»£»£»£»£»£»GitHubÐû²¼2020Äê¶ÈOctoverseÌ¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£¡£


Ö÷ÒªÇå¾²Îó²îÁбí


1.Zeroshell cgi-bin kerbynet StartSessionSubmit×¢ÈëÎó²î


Zeroshell cgi-bin kerbynet StartSessionSubmit±£´æÊäÈëÑéÖ¤Îó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿É×¢Èëí§ÒâÏÂÁî²¢Ö´ÐС£¡£¡£¡£¡£¡£

https://blog.quake.so/post/zeroshell_linux_router_rce/


2.Western Digital My Cloud OS devicesÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î


Western Digital My Cloud OS devicesÖÎÀíÆ½Ì¨±£´æÑéÖ¤ÈÆ¹ýÎó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£¡£

https://www.westerndigital.com/support/productsecurity/wdc-20009-os5-firmware-5-06-115


3.SourceCodester Car Rental Management System SQL×¢ÈëÎó²î


Sourcecodester SourceCodester Car Rental Management System±£´æSQL×¢ÈëÎó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄSQLÇëÇ󣬣¬£¬²Ù×÷Êý¾Ý¿â£¬£¬£¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£

https://github.com/BigTiger2020/Car-Rental-Management-System/blob/main/README.md


4.Crux Linux Docker images root¿ÕÃÜÂëÎó²î


Crux Linux Docker images±£´æROOT¿ÕÃÜÂëÎó²î£¬£¬£¬ÔÊÐíÍâµØ¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉÌáÉýȨÏÞ¡£¡£¡£¡£¡£¡£

https://github.com/koharin/koharin2/blob/main/CVE-2020-29389


5.HPE Edgeline Infrastructure ManagerÔ¶³Ì´úÂëÖ´ÐÐÎó²î


HPE Edgeline Infrastructure Manager±£´æÇå¾²Îó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉʹӦÓóÌÐò±ÀÀ £»£»£»£»£»£»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£

https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn04063en_us


> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢Ð¾Æ¬³§ÉÌAdvantechѬȾConti£¬£¬£¬±»ÀÕË÷1300ÍòÃÀÔª


1.jpg


¹¤Òµ×Ô¶¯»¯ºÍ¹¤ÒµÎïÁªÍø£¨IIoT£©Ð¾Æ¬ÖÆÔìÉÌAdvantechѬȾÀÕË÷Èí¼þConti£¬£¬£¬±»ÀÕË÷750 BTC£¨Ô¼Îª12600000ÃÀÔª£©¡£¡£¡£¡£¡£¡£AdvantechÊÇIT²úÆ·Ï¢Õù¾ö¼Æ»®µÄÈ«ÇòÁìÏÈÖÆÔìÉÌ£¬£¬£¬²úÆ·°üÀ¨Ç¶ÈëʽPC¡¢ÍøÂç×°±¸¡¢IoT¡¢Ð§ÀÍÆ÷ºÍÒ½ÁƱ£½¡½â¾ö¼Æ»®¡£¡£¡£¡£¡£¡£11ÔÂ26ÈÕ£¬£¬£¬ºÚ¿ÍÔÚÆäÐ¹Â¶ÍøÕ¾ÉÏÐû²¼ÁË3.03GB±»µÁÊý¾ÝÖеÄ2£¥£¬£¬£¬ÒÔ¼°Ò»¸ö°üÀ¨Á˱»µÁÎļþÁбíµÄÎı¾Îĵµ¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬Advantech¹«Ë¾ÉÐδ¶Ô´ËʽÒÏþ̸ÂÛ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/iiot-chip-maker-advantech-hit-by-ransomware-125-million-ransom/


2¡¢Carding Action 2020Ðж¯ÆÆ»ñÒ»Æð´ó¹æÄ£Õ©Æ­°¸¼þ


2.jpg


ÍøÂçÇå¾²¹«Ë¾Group-IBÓëÅ·ÖÞµÄÐÙÑÀÀû¡¢Ó¢¹úºÍÒâ´óÀûÕþ¸®ÏàÖú£¬£¬£¬ÌᳫCarding Action 2020Ðж¯£¬£¬£¬ÆÆ»ñÒ»Æð´ó¹æÄ£ÐÅÓÿ¨ÉúÒâÕ©Æ­°¸¼þ¡£¡£¡£¡£¡£¡£¸Ã»î¶¯Õë¶Ô¶à¸ö°µÍøÊг¡£¬£¬£¬ÔÚÐÅÓÿ¨ÉúÒâÊÐËÁºÍ°µÍøÉúÒâÆ½Ì¨ÉϲéÕÒÓëÉúÒâ±»µÁ¿¨ÏêϸÐÅÏ¢ÓйصÄڲƭÕߣ¬£¬£¬Ö¼ÔÚ¼õÇáºÍ±ÜÃâ½ðÈÚ»ú¹¹ºÍ³Ö¿¨ÈËÔâÊÜËðʧ£¬£¬£¬ÏÖÔÚÔ¼×èÖ¹ÁË4000ÍòÅ·ÔªµÄËðʧ¡£¡£¡£¡£¡£¡£¹ú¼ÊÐ̾¯×éÖ¯Ðû²¼¾Ð²¶ÁËÈýÃûÀ´×ÔÄáÈÕÀûÑǵÄÏÓÒÉÈË£¬£¬£¬¾ÝÐÅËûÃÇÊÇÒ»¸ö¹¥»÷ÁË150¸öÕþ¸®×éÖ¯ºÍ¹«Ë¾µÄÍÅ»ïµÄ³ÉÔ±¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/authorities-disrupt-dark-web-credit-card-trading-scam/


3¡¢Cisco TalosÅû¶WebKitÖжà¸öÑÏÖØµÄÎó²î


3.jpg


Cisco TalosÅû¶WebKitä¯ÀÀÆ÷ÒýÇæ±£´æ¶à¸öÑÏÖØµÄÎó²î¡£¡£¡£¡£¡£¡£ÕâЩÎó²îÓëWebKitµÄWebSocket¡¢AudioSourceProviderGStreamerºÍImageDecoderGStreamer¹¦Ð§ÓйØ¡£¡£¡£¡£¡£¡£»®·ÖΪWebSocket´úÂëÖ´ÐÐÎó²î£¨CVE-2020-13543£©£¬£¬£¬¿Éͨ¹ý´¥·¢ÊͷźóʹÓÃÎó²îÀ´Ô¶³ÌÖ´ÐдúÂë £»£»£»£»£»£»ImageDecoderGStreamerÊͷźóʹÓÃÎó²î£¨CVE-2020-13584£©£¬£¬£¬¿Éµ¼ÖÂÔ¶³ÌÖ´ÐдúÂ룬£¬£¬ÒÔ¼°±»×·×ÙΪCVE-2020-13543µÄÎó²î¡£¡£¡£¡£¡£¡£    


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/webkit-vulnerabilities-allow-remote-code-execution-malicious-websites


4¡¢Ñо¿ÍŶӷ¢Ã÷½©Ê¬ÍøÂçXantheʹÓÃDockerAPIѬȾLinux


4.jpg


Ñо¿ÍŶӷ¢Ã÷ÁËÒ»¸öÃûΪXantheµÄÃÅÂÞ±Ò¼ÓÃܽ©Ê¬ÍøÂ磬£¬£¬¿ÉʹÓÃÉèÖùýʧµÄDocker APIÀ´Ñ¬È¾Linuxϵͳ¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ¿ÉʹÓöàÖÖÒªÁì¾ÙÐÐÈö²¥£¬£¬£¬ÈçÍøÂç¿Í»§¶ËÖ¤ÊéÒÔͨ¹ýSSHÈö²¥µ½Ä¿µÄÖ÷»ú¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬Xanthe¾ßÓÐËĸöÓÃÀ´Èƹý¼ì²â²¢ÔöÌí³¤ÆÚÐԵĸ½¼ÓÄ£¿£¿£¿é£¬£¬£¬»®·ÖΪÀú³ÌÒþ²ØÄ£¿£¿£¿é£¨libprocesshider.so£© £»£»£»£»£»£»½ûÓÃÆäËû¿ó¹¤ºÍÇ徲ЧÀ͵Äshell¾ç±¾£¨xesa.txt£© £»£»£»£»£»£»ÓÃÓÚɾ³ýDockerÈÝÆ÷ÖеľºÕùÐÔDockerÄ¿µÄ¼ÓÃÜľÂíµÄshell¾ç±¾(fczyo)ºÍXMRig¶þ½øÖÆÎļþ£¨ÒÔ¼°JSONÉèÖÃÎļþconfig.json£©¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/misconfigured-docker-servers-xanthe-malware/161732/


5¡¢GitHubÐû²¼2020Äê¶ÈOctoverseÌ¬ÊÆµÄÆÊÎö±¨¸æ


5.jpg


GitHubÐû²¼ÁË2020Äê¶ÈOctoverseÌ¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¸Ã±¨¸æÖ÷Ҫͳ¼ÆÁËÁè¼Ý5600ÍòÃû¿ª·¢Ö°Ô±ÔÚ2020Ä꽨ÉèµÄÁè¼Ý6000Íò¸öд洢¿â¡£¡£¡£¡£¡£¡£Ñо¿·¢Ã÷£¬£¬£¬Óë2019ÄêÏà±È£¬£¬£¬ÏÖÔÚ94£¥µÄÏîÄ¿ÒÀÀµ¿ªÔ´×é¼þ£¬£¬£¬Æ½¾ùÓп¿½ü700¸öÒÀÀµÏ£¬£¬JavaScriptÖÐÓÐ94£¥µÄ¿ªÔ´ÒÀÀµ¹ØÏµ£¬£¬£¬¶øRubyºÍ.NETÖÐÓÐ90£¥µÄ¿ªÔ´ÒÀÀµ¹ØÏµ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬¿ªÔ´Èí¼þÖеĴó´ó¶¼Îó²î²¢²»ÊǶñÒâµÄ£¬£¬£¬Ïà·´£¬£¬£¬GitHub·¢³öµÄCVE¾¯±¨ÖÐÓÐ83£¥µÄÎó²îÊÇÓÉÈËΪ¹ýʧÒýÆðµÄ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://octoverse.github.com/