ÐÅÏ¢Çå¾²Öܱ¨-2020ÄêµÚ49ÖÜ

Ðû²¼Ê±¼ä 2020-12-08

> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö


2020Äê11ÔÂ30ÈÕÖÁ12ÔÂ06ÈÕ¹²ÊÕ¼Çå¾²Îó²î50¸ö£¬£¬ £¬ÖµµÃ¹Ø×¢µÄÊÇZeroshell cgi-bin kerbynet StartSessionSubmit×¢ÈëÎó²î£»£»£»£»£»£»Western Digital My Cloud OS devicesÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£»£»£»£»£»£»SourceCodester Car Rental Management System SQL×¢ÈëÎó²î£»£»£»£»£»£»Crux Linux Docker images root¿ÕÃÜÂëÎó²î£»£»£»£»£»£»HPE Edgeline Infrastructure ManagerÔ¶³Ì´úÂëÖ´ÐÐÎó²î¡£¡£¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇоƬ³§ÉÌAdvantechѬȾConti£¬£¬ £¬±»ÀÕË÷1300ÍòÃÀÔª£»£»£»£»£»£»Carding Action 2020Ðж¯ÆÆ»ñÒ»Æð´ó¹æÄ£Õ©Æ­°¸¼þ£»£»£»£»£»£»Cisco TalosÅû¶WebKitÖжà¸öÑÏÖØµÄÎó²î£»£»£»£»£»£»Ñо¿ÍŶӷ¢Ã÷½©Ê¬ÍøÂçXantheʹÓÃDockerAPIѬȾLinux£»£»£»£»£»£»GitHubÐû²¼2020Äê¶ÈOctoverseÌ¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬ £¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£


Ö÷ÒªÇå¾²Îó²îÁбí


1.Zeroshell cgi-bin kerbynet StartSessionSubmit×¢ÈëÎó²î


Zeroshell cgi-bin kerbynet StartSessionSubmit±£´æÊäÈëÑéÖ¤Îó²î£¬£¬ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬ £¬¿É×¢Èëí§ÒâÏÂÁî²¢Ö´ÐС£¡£¡£¡£¡£

https://blog.quake.so/post/zeroshell_linux_router_rce/


2.Western Digital My Cloud OS devicesÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î


Western Digital My Cloud OS devicesÖÎÀíÆ½Ì¨±£´æÑéÖ¤ÈÆ¹ýÎó²î£¬£¬ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬ £¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£

https://www.westerndigital.com/support/productsecurity/wdc-20009-os5-firmware-5-06-115


3.SourceCodester Car Rental Management System SQL×¢ÈëÎó²î


Sourcecodester SourceCodester Car Rental Management System±£´æSQL×¢ÈëÎó²î£¬£¬ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄSQLÇëÇ󣬣¬ £¬²Ù×÷Êý¾Ý¿â£¬£¬ £¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£

https://github.com/BigTiger2020/Car-Rental-Management-System/blob/main/README.md


4.Crux Linux Docker images root¿ÕÃÜÂëÎó²î


Crux Linux Docker images±£´æROOT¿ÕÃÜÂëÎó²î£¬£¬ £¬ÔÊÐíÍâµØ¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬ £¬¿ÉÌáÉýȨÏÞ¡£¡£¡£¡£¡£

https://github.com/koharin/koharin2/blob/main/CVE-2020-29389


5.HPE Edgeline Infrastructure ManagerÔ¶³Ì´úÂëÖ´ÐÐÎó²î


HPE Edgeline Infrastructure Manager±£´æÇå¾²Îó²î£¬£¬ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬ £¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»£»£»£»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£

https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn04063en_us


> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢Ð¾Æ¬³§ÉÌAdvantechѬȾConti£¬£¬ £¬±»ÀÕË÷1300ÍòÃÀÔª


1.jpg


¹¤Òµ×Ô¶¯»¯ºÍ¹¤ÒµÎïÁªÍø£¨IIoT£©Ð¾Æ¬ÖÆÔìÉÌAdvantechѬȾÀÕË÷Èí¼þConti£¬£¬ £¬±»ÀÕË÷750 BTC£¨Ô¼Îª12600000ÃÀÔª£©¡£¡£¡£¡£¡£AdvantechÊÇIT²úÆ·Ï¢Õù¾ö¼Æ»®µÄÈ«ÇòÁìÏÈÖÆÔìÉÌ£¬£¬ £¬²úÆ·°üÀ¨Ç¶ÈëʽPC¡¢ÍøÂç×°±¸¡¢IoT¡¢Ð§ÀÍÆ÷ºÍÒ½ÁƱ£½¡½â¾ö¼Æ»®¡£¡£¡£¡£¡£11ÔÂ26ÈÕ£¬£¬ £¬ºÚ¿ÍÔÚÆäÐ¹Â¶ÍøÕ¾ÉÏÐû²¼ÁË3.03GB±»µÁÊý¾ÝÖеÄ2£¥£¬£¬ £¬ÒÔ¼°Ò»¸ö°üÀ¨Á˱»µÁÎļþÁбíµÄÎı¾Îĵµ¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬ £¬Advantech¹«Ë¾ÉÐδ¶Ô´ËʽÒÏþ̸ÂÛ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/iiot-chip-maker-advantech-hit-by-ransomware-125-million-ransom/


2¡¢Carding Action 2020Ðж¯ÆÆ»ñÒ»Æð´ó¹æÄ£Õ©Æ­°¸¼þ


2.jpg


ÍøÂçÇå¾²¹«Ë¾Group-IBÓëÅ·ÖÞµÄÐÙÑÀÀû¡¢Ó¢¹úºÍÒâ´óÀûÕþ¸®ÏàÖú£¬£¬ £¬ÌᳫCarding Action 2020Ðж¯£¬£¬ £¬ÆÆ»ñÒ»Æð´ó¹æÄ£ÐÅÓÿ¨ÉúÒâÕ©Æ­°¸¼þ¡£¡£¡£¡£¡£¸Ã»î¶¯Õë¶Ô¶à¸ö°µÍøÊг¡£¡£¡£¡£¡£¬£¬ £¬ÔÚÐÅÓÿ¨ÉúÒâÊÐËÁºÍ°µÍøÉúÒâÆ½Ì¨ÉϲéÕÒÓëÉúÒâ±»µÁ¿¨ÏêϸÐÅÏ¢ÓйصÄڲƭÕߣ¬£¬ £¬Ö¼ÔÚ¼õÇáºÍ±ÜÃâ½ðÈÚ»ú¹¹ºÍ³Ö¿¨ÈËÔâÊÜËðʧ£¬£¬ £¬ÏÖÔÚÔ¼×èÖ¹ÁË4000ÍòÅ·ÔªµÄËðʧ¡£¡£¡£¡£¡£¹ú¼ÊÐ̾¯×éÖ¯Ðû²¼¾Ð²¶ÁËÈýÃûÀ´×ÔÄáÈÕÀûÑǵÄÏÓÒÉÈË£¬£¬ £¬¾ÝÐÅËûÃÇÊÇÒ»¸ö¹¥»÷ÁË150¸öÕþ¸®×éÖ¯ºÍ¹«Ë¾µÄÍÅ»ïµÄ³ÉÔ±¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/authorities-disrupt-dark-web-credit-card-trading-scam/


3¡¢Cisco TalosÅû¶WebKitÖжà¸öÑÏÖØµÄÎó²î


3.jpg


Cisco TalosÅû¶WebKitä¯ÀÀÆ÷ÒýÇæ±£´æ¶à¸öÑÏÖØµÄÎó²î¡£¡£¡£¡£¡£ÕâЩÎó²îÓëWebKitµÄWebSocket¡¢AudioSourceProviderGStreamerºÍImageDecoderGStreamer¹¦Ð§Óйء£¡£¡£¡£¡£»®·ÖΪWebSocket´úÂëÖ´ÐÐÎó²î£¨CVE-2020-13543£©£¬£¬ £¬¿Éͨ¹ý´¥·¢ÊͷźóʹÓÃÎó²îÀ´Ô¶³ÌÖ´ÐдúÂ룻£»£»£»£»£»ImageDecoderGStreamerÊͷźóʹÓÃÎó²î£¨CVE-2020-13584£©£¬£¬ £¬¿Éµ¼ÖÂÔ¶³ÌÖ´ÐдúÂ룬£¬ £¬ÒÔ¼°±»×·×ÙΪCVE-2020-13543µÄÎó²î¡£¡£¡£¡£¡£    


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/webkit-vulnerabilities-allow-remote-code-execution-malicious-websites


4¡¢Ñо¿ÍŶӷ¢Ã÷½©Ê¬ÍøÂçXantheʹÓÃDockerAPIѬȾLinux


4.jpg


Ñо¿ÍŶӷ¢Ã÷ÁËÒ»¸öÃûΪXantheµÄÃÅÂÞ±Ò¼ÓÃܽ©Ê¬ÍøÂ磬£¬ £¬¿ÉʹÓÃÉèÖùýʧµÄDocker APIÀ´Ñ¬È¾Linuxϵͳ¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ¿ÉʹÓöàÖÖÒªÁì¾ÙÐÐÈö²¥£¬£¬ £¬ÈçÍøÂç¿Í»§¶ËÖ¤ÊéÒÔͨ¹ýSSHÈö²¥µ½Ä¿µÄÖ÷»ú¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬Xanthe¾ßÓÐËĸöÓÃÀ´Èƹý¼ì²â²¢ÔöÌí³¤ÆÚÐԵĸ½¼ÓÄ£¿£¿£¿£¿é£¬£¬ £¬»®·ÖΪÀú³ÌÒþ²ØÄ£¿£¿£¿£¿é£¨libprocesshider.so£©£»£»£»£»£»£»½ûÓÃÆäËû¿ó¹¤ºÍÇ徲ЧÀ͵Äshell¾ç±¾£¨xesa.txt£©£»£»£»£»£»£»ÓÃÓÚɾ³ýDockerÈÝÆ÷ÖеľºÕùÐÔDockerÄ¿µÄ¼ÓÃÜľÂíµÄshell¾ç±¾(fczyo)ºÍXMRig¶þ½øÖÆÎļþ£¨ÒÔ¼°JSONÉèÖÃÎļþconfig.json£©¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/misconfigured-docker-servers-xanthe-malware/161732/


5¡¢GitHubÐû²¼2020Äê¶ÈOctoverseÌ¬ÊÆµÄÆÊÎö±¨¸æ


5.jpg


GitHubÐû²¼ÁË2020Äê¶ÈOctoverseÌ¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¸Ã±¨¸æÖ÷Ҫͳ¼ÆÁËÁè¼Ý5600ÍòÃû¿ª·¢Ö°Ô±ÔÚ2020Ä꽨ÉèµÄÁè¼Ý6000Íò¸öд洢¿â¡£¡£¡£¡£¡£Ñо¿·¢Ã÷£¬£¬ £¬Óë2019ÄêÏà±È£¬£¬ £¬ÏÖÔÚ94£¥µÄÏîÄ¿ÒÀÀµ¿ªÔ´×é¼þ£¬£¬ £¬Æ½¾ùÓп¿½ü700¸öÒÀÀµÏ£¬ £¬JavaScriptÖÐÓÐ94£¥µÄ¿ªÔ´ÒÀÀµ¹ØÏµ£¬£¬ £¬¶øRubyºÍ.NETÖÐÓÐ90£¥µÄ¿ªÔ´ÒÀÀµ¹ØÏµ¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬¿ªÔ´Èí¼þÖеĴó´ó¶¼Îó²î²¢²»ÊǶñÒâµÄ£¬£¬ £¬Ïà·´£¬£¬ £¬GitHub·¢³öµÄCVE¾¯±¨ÖÐÓÐ83£¥µÄÎó²îÊÇÓÉÈËΪ¹ýʧÒýÆðµÄ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://octoverse.github.com/