DiscordÐÞ¸´Æä×ÀÃæÓ¦ÓÃÖпɵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐеÄÎó²î£»£»£»£»£»£»TalosÅû¶F2FS¹¤¾ß¼¯Öб£´æ´úÂëÖ´ÐкÍÐÅϢй¶Îó²î

Ðû²¼Ê±¼ä 2020-10-20
1.DiscordÐÞ¸´Æä×ÀÃæÓ¦ÓÃÖпɵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐеÄÎó²î


1.jpg


DiscordÒÑÐÞ¸´×ÀÃæ°æÓ¦ÓóÌÐòÖеÄÒ»¸öÒªº¦Îó²î£¬£¬£¬£¬£¬¿Éµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©¹¥»÷¡£ ¡£¡£¡£¸ÃÎó²î±£´æÓÚDiscon×ÀÃæÓ¦ÓóÌÐòʹÓõÄÈí¼þ¿ò¼ÜElectronÖУ¬£¬£¬£¬£¬ÆäcontextIsolation±»ÉèÖÃΪfalse£¬£¬£¬£¬£¬ÕâÔÊÐíÓ¦ÓóÌÐòÍⲿµÄJavaScript´úÂëÓ°ÏìÄÚ²¿´úÂ룬£¬£¬£¬£¬ÀýÈçwebÒ³ÃæÍⲿµÄJavaScript´úÂëʹÓÃnode.js¹¦Ð§¡£ ¡£¡£¡£¸ÃÎó²î±»×·×ÙΪCVE-2020-15174£¬£¬£¬£¬£¬ÓëÆäËûÁ½¸öÎó²îÁ¬ÏµÊ¹ÓÿÉÈÆ¹ýµ¼º½ÏÞÖÆ²¢Ê¹ÓÃiframe XSSÎó²î»á¼û°üÀ¨¶ñÒâ´úÂëµÄÍøÒ³À´Ö´ÐÐRCE¹¥»÷¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/discord-desktop-app-vulnerable-to-remote-code-execution-bug/


2.TalosÅû¶F2FS¹¤¾ß¼¯Öб£´æ´úÂëÖ´ÐкÍÐÅϢй¶Îó²î


2.png


˼¿ÆTalos·¢Ã÷F2FS¹¤¾ß¼¯Öб£´æ¶à¸ö´úÂëÖ´ÐкÍÐÅϢй¶Îó²î¡£ ¡£¡£¡£F2FSÊÇÔÚǶÈëʽװ±¸Öг£¼ûµÄÎļþϵͳ¹¤¾ß¼¯£¬£¬£¬£¬£¬¿É½¨Éè¡¢ÑéÖ¤ºÍÐÞ¸´Flash-Friendly File SystemÎļþ¡£ ¡£¡£¡£´Ë´ÎÅû¶µÄÎó²îΪF2fs-Tools F2fs.FsckÎļþϵͳ¼ì²éÐÅϢй¶Îó²î£¨CVE-2020-6104£©¡¢F2fs-Tools F2fs.Fsck¶à¸ö×°±¸´úÂëÖ´ÐÐÎó²î£¨CVE-2020-6105£©¡¢F2fs-Tools F2fs.Fsck init_node_managerÐÅϢй¶Îó²î£¨CVE-2020-6106£©¡¢F2fs-Tools F2fs.Fsck dev_readÐÅϢй¶Îó²î£¨CVE-2020-6107£©ºÍF2fs-Tools F2fs.Fsck¶à¸ö×°±¸´úÂëÖ´ÐÐÎó²î£¨CVE-2020-6108£©¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://blog.talosintelligence.com/2020/10/vuln-spotlight-f2fs-tools-.html


3.ºÚ¿ÍÉù³ÆÒÑÈëÇÖ5Íǫ̀¼ÒÓÃÉãÏñÍ·²¢ÔÚ°µÍø¹ûÕæ²¿·Ö¼Ïñ


3.png


Ò»¸öºÚ¿Í×éÖ¯Éù³ÆÆäÒÑÈëÇÖ5Íǫ̀¼ÒÓÃÉãÏñÍ·£¬£¬£¬£¬£¬²¢ÔÚ³ÉÈËÍøÕ¾ÉÏÐû²¼²¿·Ö¼Ïñ¡£ ¡£¡£¡£Ð¹Â¶µÄ´ó²¿·ÖÊÓÆµÀ´×ÔÐÂ¼ÓÆÂ£¬£¬£¬£¬£¬±ðµÄ»¹Éæ¼°µ½À´×ÔÌ©¹ú¡¢º«¹úºÍ¼ÓÄÃ´ó¡£ ¡£¡£¡£¾ÝThe New Paper±¨µÀ£¬£¬£¬£¬£¬ÏÖÒÑÓÐ70¶àÃû³ÉÔ±Ö§¸¶ÁË150ÃÀÔªµÄ¶©ÔÄ·Ñ£¬£¬£¬£¬£¬¹²ÏíÁËÁè¼Ý3 TBµÄ¼ô¼­ÊÓÆµ¡£ ¡£¡£¡£ÏÖÔÚÈÔ²»ÇåÎúºÚ¿ÍÔõÑùÆÆËðIPÉãÏñ»ú£¬£¬£¬£¬£¬Æä¿ÉÄÜʹÓÃÁË×°±¸ÖÐÎó²î£¬£¬£¬£¬£¬»òÕßÖ»ÊÇͨ¹ýÍÆ²âÈõÃÜÂë¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/109671/hacking/50000-home-cameras-hacked.html


4.ÒÁÀÊÔâµ½´ó¹æÄ£ÍøÂç¹¥»÷£¬£¬£¬£¬£¬Á½¸öÖ÷Òª»ú¹¹Êܵ½Ó°Ïì


4.png


ÒÁÀÊÕþ¸®IT²¿·Ö±¨¸æÆäÔâµ½´ó¹æÄ£ÍøÂç¹¥»÷£¬£¬£¬£¬£¬Á½¸öÖ÷Òª»ú¹¹Êܵ½Ó°Ïì¡£ ¡£¡£¡£¾ÝÒ»¼ÒÐÂÎÅÉ籨¸æ£¬£¬£¬£¬£¬¹¥»÷ÊÂÎñÒÑËð»µÒÁÀʿڰ¶µÄµç×Ó»ù´¡ÉèÊ©¡£ ¡£¡£¡£ÃÀ¹úµç̨Radio FardaÌåÏÖ£¬£¬£¬£¬£¬´Ë´Î¹¥»÷µÄÄ¿µÄºÜ¿ÉÄÜÊÇÒÁÀʵĿڰ¶¡¢ÒøÐкͺ£ÊÂ×éÖ¯£¬£¬£¬£¬£¬µ«¸ÃÐÂÎÅÉÐδ»ñµÃ֤ʵ¡£ ¡£¡£¡£ÒÁÀÊÕþ¸®IT²¿·Ö½²»°ÈËAbolghasem SadeghiÌåÏÖ£¬£¬£¬£¬£¬Õâ´Î¹¥»÷µ¼Ö¶à¸öÕþ¸®»ú¹¹ÔÝʱ×èÖ¹»¥ÁªÍøÐ§ÀÍ£¬£¬£¬£¬£¬ÒÔ×èÖ¹½øÒ»²½µÄÆÆËð¡£ ¡£¡£¡£³ý´ËÖ®Í⣬£¬£¬£¬£¬ÒÁÀÊÕþ¸®²¢Î´Ìṩ¹ØÓÚ¸ÃÊÂÎñµÄ¸ü¶àϸ½Ú¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2020/10/iran-suffers-largescale-cyberattacks.html


5.ºÚ¿ÍÒÔCoinbaseΪÓÕ¶üͨ¹ýOAuthÓ¦ÓÃÌᳫ´¹ÂÚ¹¥»÷


5.jpg


ºÚ¿ÍÒÔCoinbaseÖ÷ÌâΪÓÕ¶ü£¬£¬£¬£¬£¬Í¨¹ýOAuthÓ¦ÓÃÌᳫÐÂÒ»ÂÖ´¹ÂÚ¹¥»÷¡£ ¡£¡£¡£¸Ã´¹ÂÚÓʼþαװΪÐÂЧÀÍÌõ¿î£¬£¬£¬£¬£¬CoinbaseÓû§±ØÐèÔĶÁ²¢½ÓÊܲŻª¼ÌÐøÊ¹ÓøÃЧÀÍ¡£ ¡£¡£¡£µ±Óû§µã»÷ÔĶÁ²¢½ÓÊÜÁ´½Óʱ£¬£¬£¬£¬£¬½«±»Öض¨Ïòµ½Õýµ±µÄMicrosoftÍøÕ¾À´µÇ¼ÆäÕÊ»§¡£ ¡£¡£¡£ÀֳɵǼºóϵͳ»áÌáÐÑÊÇ·ñÔÊÐícoinbasetermsµÄÓ¦ÓóÌÐò»á¼ûËûÃǵÄÕË»§¡£ ¡£¡£¡£Ò»µ©Óû§µã»÷ÊÇ£¬£¬£¬£¬£¬ºÚ¿Í½«ÓµÓжÁÈ¡ÕÊ»§ÉèÖÃÎļþ¼°Æäµç×ÓÓʼþµÄÍêÈ«»á¼ûȨÏÞ¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/microsoft/coinbase-phishing-hijacks-microsoft-365-accounts-via-oauth-app/


6.DevolutionsÐû²¼2020ÄêÖÐСÐÍÆóÒµÍøÂçÇ徲״̬±¨¸æ


6.jpg


DevolutionsÐû²¼2020ÄêÖÐСÐÍÆóÒµÍøÂçÇ徲״̬±¨¸æ¡£ ¡£¡£¡£ÎªÁ˸üÉîÈëµØÏàʶÖÐСÐÍÆóÒµ¶ÔÍøÂçÇå¾²µÄ¿´·¨£¬£¬£¬£¬£¬Devolutions¶ÔÀ´×ÔIT¡¢Ò½ÁƱ£½¡¡¢½ÌÓýºÍ½ðÈڵȸ÷¸öÐÐÒµµÄ182ÆäÖÐСÐÍÆóÒµ¾ÙÐÐÁËÊӲ졣 ¡£¡£¡£ÊӲ췢Ã÷£¬£¬£¬£¬£¬62£¥µÄÖÐСÆóҵÿÄêÖÁÉÙ¾ÙÐÐÒ»´ÎÇå¾²ÉóºË£¬£¬£¬£¬£¬14£¥µÄÖÐСÆóÒµ´Ó²»¾ÙÐÐÉóºË£»£»£»£»£»£»57£¥µÄÖÐСÐÍÆóÒµÌåÏÖÔÚÒÑÍùÈýÄêÖÐÔâÊÜÁËÍøÂç´¹ÂÚ¹¥»÷£»£»£»£»£»£»47£¥µÄÆóÒµÔÊÐíÖÕ¶ËÓû§ÔÚСÎÒ˽¼ÒºÍרҵÕÊ»§ÖÐÖØ¸´Ê¹ÓÃÃÜÂë¡£ ¡£¡£¡£    


Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2020/10/15/smbs-size-doesnt-make-them-immune-to-cyberattacks/