ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ34ÖÜ

Ðû²¼Ê±¼ä 2019-09-02

>±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö



2019Äê8ÔÂ26ÈÕÖÁ9ÔÂ01ÈÕ¹²ÊÕ¼Çå¾²Îó²î49¸ö£¬£¬£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇCisco REST API ContainerÑéÖ¤ÈÆ¹ýÎó²î£»£»£»BloodHound components/Modals/HelpModal.jsxí§ÒâÏÂÁîÖ´ÐÐÎó²î£»£»£»Datalogic AV7000 Linear Barcode ScannerÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£»£»£»Delta Controls enteliBUS Controllers»º³åÇøÒç³öÎó²î£»£»£»Linux kernel net/wireless/marvell/mwifiex»º³åÇøÒç³öÎó²î ¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÍйÜЧÀÍÉÌHostinger½ü1400ÍòÓû§ÐÅÏ¢±»ÍϿ⣻£»£»2019ÄêÉϰëÄ걨¸æµÄÎó²îÖÐÁè¼Ý34%δÐÞ¸´£»£»£»Android¶ñÒâÓ¦ÓÃCamScannerÏÂÔØÁ¿³¬1ÒÚ£»£»£»2024ÄêÈ«ÇòÊý¾Ýй¶±¾Ç®Ô¤¼Æ½«´ï5ÍòÒÚÃÀÔª£»£»£»ÃÀ¹úÊý°Ù¼ÒÑÀ¿ÆÕïËùÔâÀÕË÷Èí¼þSodinokibi¹¥»÷ ¡£¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖÐ ¡£¡£¡£



>Ö÷ÒªÇå¾²Îó²îÁбí



1. Cisco REST API ContainerÑéÖ¤ÈÆ¹ýÎó²î


Cisco REST API Container REST APIÑé֤ʵÏÖ±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬¿É»ñÈ¡Óû§µÄÁîÅÆID£¬£¬£¬£¬£¬£¬£¬ÈƹýÇå¾²ÏÞÖÆ£¬£¬£¬£¬£¬£¬£¬Î´ÊÚȨ»á¼û ¡£¡£¡£
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-iosxe-rest-auth-bypass

2. BloodHound components/Modals/HelpModal.jsxí§ÒâÏÂÁîÖ´ÐÐÎó²î


BloodHound components/Modals/HelpModal.jsx±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îͨ¹ý½¨Éè´øJS´úÂëÃû³ÆµÄGPO£¬£¬£¬£¬£¬£¬£¬´¥·¢search-autocomplete¹¦Ð§£¬£¬£¬£¬£¬£¬£¬¿ÉÖ´ÐÐí§ÒâOSÏÂÁî ¡£¡£¡£
https://github.com/BloodHoundAD/BloodHound

3. Datalogic AV7000 Linear Barcode ScannerÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î


Datalogic AV7000 Linear Barcode ScannerʵÏÖ±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬ÈƹýÉí·ÝÑéÖ¤Ö´ÐÐí§Òâ´úÂë ¡£¡£¡£
https://www.us-cert.gov/ics/advisories/icsa-19-239-02

4. Delta Controls enteliBUS Controllers»º³åÇøÒç³öÎó²î


Delta Controls enteliBUS ControllersʵÏÖ±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬´¥·¢»º³åÇøÒç³öÖ´ÐÐí§Òâ´úÂë ¡£¡£¡£
https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9569

5. Linux kernel net/wireless/marvell/mwifiex»º³åÇøÒç³öÎó²î


Linux kernel net/wireless/marvell/mwifiex±£´æ»º³åÇøÒç³öÎó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬¿ÉʹЧÀͳÌÐò±ÀÀ£»£»£»òÖ´ÐÐí§Òâ´úÂë ¡£¡£¡£
https://vigilance.fr/vulnerability/Linux-kernel-buffer-overflow-via-net-wireless-marvell-mwifiex-30180



>Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö



1¡¢ÍйÜЧÀÍÉÌHostinger½ü1400ÍòÓû§ÐÅÏ¢±»ÍÏ¿â

¿­Ê±K66¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÍйÜЧÀÍÉÌHostingerÐû²¼Í¨¸æ³Æ½ü1400ÍòÓû§ÐÅÏ¢±»ÍϿ⠡£¡£¡£¸ÃÊÂÎñÓÚ8ÔÂ23ÈÕÐÇÆÚÎå±»·¢Ã÷£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÌåÏÖ¹¥»÷Õß»ñÈ¡ÁËÄÚ²¿Ð§ÀÍÆ÷µÄ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬£¬È»ºóÕÒµ½ÁËÄÚ²¿APIµÄÊÚȨÁîÅÆ£¬£¬£¬£¬£¬£¬£¬Å²ÓÃAPIÇÔÈ¡ÁËÓû§ÐÅÏ¢ ¡£¡£¡£Ð¹Â¶µÄÓû§ÐÅÏ¢°üÀ¨Óû§Ãû¡¢IPµØµã¡¢ÐÕÃû¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµãºÍ¼ÒÍ¥µØµãµÈ£¬£¬£¬£¬£¬£¬£¬»¹°üÀ¨SHA1Ëã·¨¼ÓÃܵĹþÏ£ÃÜÂë ¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖûÓвÆÎñÐÅÏ¢Êܵ½Ë𺦣¬£¬£¬£¬£¬£¬£¬µ«Î´Í¸Â¶ÊÜÓ°ÏìµÄÏêϸÈËÊý ¡£¡£¡£¸Ã¹«Ë¾»¹ÌåÏÖ¾öÒéÇ¿ÖÆÖØÖÃËùÓÐÊÜÓ°ÏìÕÊ»§µÄÃÜÂë ¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/hostinger-resets-customer-passwords-after-security-incident/

2¡¢2019ÄêÉϰëÄ걨¸æµÄÎó²îÖÐÁè¼Ý34%δÐÞ¸´

¿­Ê±K66¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ֤Risk Based SecurityÐû²¼µÄ¡¶2019ÄêÄêÖÐÎó²î»ØÊ×±¨¸æ¡·£¬£¬£¬£¬£¬£¬£¬2019ÄêÉϰëÄ걨¸æµÄËùÓÐÎó²îÖÐÁè¼Ý34£¥£¨3771¸ö£©µÄÎó²îδÐÞ¸´ ¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬ÔÚ±¨¸æµÄ×ܹ²11092¸öÎó²îÖУ¬£¬£¬£¬£¬£¬£¬14.7%£¨1630¸ö£©µÄÎó²îCVSS V2µÃ·ÖÁè¼Ý9.0£¬£¬£¬£¬£¬£¬£¬54.5£¥£¨6045¸ö£©µÄÎó²îÓëWebÓйØ£¬£¬£¬£¬£¬£¬£¬Ô¼53%£¨5878¸ö£©µÄÎó²î¿ÉÒÔÔ¶³ÌʹÓ㬣¬£¬£¬£¬£¬£¬66%µÄÎó²îÓëSQL×¢Èë¹¥»÷ÓйØ£¬£¬£¬£¬£¬£¬£¬Ô¼2.8%µÄÎó²îÓëSCADAÓÐ¹Ø ¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://pages.riskbasedsecurity.com/2019-midyear-vulnerability-quickview-report

3¡¢Android¶ñÒâÓ¦ÓÃCamScannerÏÂÔØÁ¿³¬1ÒÚ


¿­Ê±K66¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¿¨°Í˹»ùÑо¿Ö°Ô±·¢Ã÷CamScannerµÄÃâ·Ñ°æ±£´æÒ»¸öÒþ²ØµÄTrojan DropperÄ£¿£¿ £¿é£¬£¬£¬£¬£¬£¬£¬¿ÉÔÊÐíÔ¶³Ì¹¥»÷ÕßÔÚÓû§²»ÖªÇéµÄÇéÐÎÏÂÏÂÔØºÍ×°ÖöñÒâ³ÌÐò ¡£¡£¡£CamScannerÊÇÒ»¿îÊܽӴýµÄÊÖ»úPDF½¨ÉèAPP£¬£¬£¬£¬£¬£¬£¬ËüÔÚGoogle PlayÊÐËÁµÄÏÂÔØÁ¿Áè¼Ý1ÒÚ ¡£¡£¡£¶ñÒâÄ£¿£¿ £¿éÏÖʵÉϲ¢²»±£´æÓÚCamScanner×Ô¼ºµÄ´úÂëÖУ¬£¬£¬£¬£¬£¬£¬¶øÊÇÔÚµÚÈý·½¹ã¸æ¿âÖУ¬£¬£¬£¬£¬£¬£¬Òò´Ë¿ÉÒÔÍÆ¶ÏÕâÊÇÈí¼þ¿ª·¢ÕߺͲ»Æ·µÂµÄ¹ã¸æÉÌÏàÖúµÄЧ¹û ¡£¡£¡£¸ÃÄ£¿£¿ £¿é¿ÉÒÔͨ¹ý¶àÖÖ·½·¨Ê¹ÓÃÊÜѬȾµÄ×°±¸£¬£¬£¬£¬£¬£¬£¬´ÓÏÔʾÇÖÈëÐÔ¹ã¸æµ½¸¶·Ñ¶©ÔÄÇÔÈ¡»°·ÑµÈ ¡£¡£¡£Ó¦¸Ã×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬CamScannerµÄ¸¶·Ñ°æ±¾²»°üÀ¨µÚÈý·½¹ã¸æ¿â ¡£¡£¡£GoogleÒѾ­´Ó¹Ù·½PlayÊÐËÁÖÐɾ³ýÁ˸ÃAPP ¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://thehackernews.com/2019/08/android-camscanner-malware.html

4¡¢2024ÄêÈ«ÇòÊý¾Ýй¶±¾Ç®Ô¤¼Æ½«´ï5ÍòÒÚÃÀÔª

¿­Ê±K66¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ֤հ²©ÍøÂçµÄ×îÐÂÕ¹Íû£¬£¬£¬£¬£¬£¬£¬Ëæ×Åî¿Ïµ·£¿£¿ £¿îµÄʵÑéÒÔ¼°ÆóÒµÔ½·¢ÒÀÀµÓÚÊý×Öϵͳ£¬£¬£¬£¬£¬£¬£¬µ½2024ÄêÈ«ÇòÊý¾Ýй¶µÄ±¾Ç®Ô¤¼Æ½«ÔöÌíµ½5ÍòÒÚÃÀÔªÒÔÉÏ ¡£¡£¡£ÕâÒ»Êý¾ÝÀ´×ÔÓڸù«Ë¾Ðû²¼µÄ×îб¨¸æ¡¶ÍøÂç·¸·¨ºÍÇå¾²µÄδÀ´£º2019-2024ÍþвÆÊÎö¡¢Ó°ÏìÆÀ¹À»ººÍ½âÕ½ÂÔ±¨¸æ¡· ¡£¡£¡£¸Ã¹«Ë¾Éù³Æ£¬£¬£¬£¬£¬£¬£¬ÔÚ±¨¸æÊ±´úÄÚÔ¤¼ÆÊý¾Ýй¶±¾Ç®½«´Ó2019ÄêµÄ3ÍòÒÚÃÀԪÿÄêÔöÌí11% ¡£¡£¡£±¨¸æÖл¹³ÆËäÈ»´ó¹æÄ£µÄÊý¾Ýй¶¿ÉÄܳÉΪͷÌõÐÂÎÅ£¬£¬£¬£¬£¬£¬£¬µ«ËüÃDz¢·×Æç¶¨»áÖ±½ÓÓ°Ï챾Ǯ£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚ·£¿£¿ £¿îºÍÓªÒµËðʧÓëÊý¾Ýй¶µÄ¹æÄ£²¢²»Ï¸ÃÜÏà¹Ø ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/breach-costs-trillion/

5¡¢ÃÀ¹úÊý°Ù¼ÒÑÀ¿ÆÕïËùÔâÀÕË÷Èí¼þSodinokibi¹¥»÷


¿­Ê±K66¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


8ÔÂ26ÈÕÃÀ¹úÊý°Ù¼ÒÑÀ¿ÆÕïËùÔâÀÕË÷Èí¼þSodinokibi¹¥»÷£¬£¬£¬£¬£¬£¬£¬»¼ÕßÐÅÏ¢±»¼ÓÃÜ ¡£¡£¡£ÕâÊǹ¥»÷Õßͨ¹ýÈëÇÖÈí¼þ¹©Ó¦É̲¢Ê¹ÓÃÆä²úÆ·ÔÚ¿Í»§ÏµÍ³ÉÏÖ²ÈëÀÕË÷Èí¼þµÄÁíÒ»¸ö°¸Àý ¡£¡£¡£ÔÚ±¾ÆðÊÂÎñÖУ¬£¬£¬£¬£¬£¬£¬Èí¼þ¹©Ó¦ÉÌÊÇThe Digital Dental RecordºÍPerCSoft£¬£¬£¬£¬£¬£¬£¬ËûÃÇÏàÖú¿ª·¢ÁËÒ½ÁƼͼÉúÑĺͱ¸·ÝÈí¼þDDS Safe ¡£¡£¡£ÉÏÖÜÄ©ºÚ¿ÍÍÅ»ïÈëÇÖÁ˸ÃÈí¼þ±³ºóµÄ»ù´¡ÉèÊ©£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃËüÔÚÊý°Ù¸öÑÀÒ½ÕïËùµÄÅÌËã»úÉϰ²ÅÅÁËÀÕË÷Èí¼þSodinokibi ¡£¡£¡£ÕâÁ½¼Ò¹«Ë¾Ñ¡ÔñÖ§¸¶Êê½ð»ñÈ¡½âÃÜÆ÷£¬£¬£¬£¬£¬£¬£¬µ«ÏÖÔÚ»Ö¸´½ø¶È»ºÂý£¬£¬£¬£¬£¬£¬£¬Ò»Ð©ÑÀ¿ÆÕïËùÉù³Æ½âÃÜÆ÷Ҫô²»Æð×÷Ó㬣¬£¬£¬£¬£¬£¬ÒªÃ´Ã»Óлָ´ËùÓÐÊý¾Ý ¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/ransomware-hits-hundreds-of-dentist-offices-in-the-us/