ÐÅÏ¢Çå¾²Öܱ¨-2021ÄêµÚ35ÖÜ

Ðû²¼Ê±¼ä 2021-08-30

>±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö

2021Äê08ÔÂ23ÈÕÖÁ08ÔÂ29ÈÕ¹²ÊÕ¼Çå¾²Îó²î60¸ö£¬£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇFlatCore-CMS upload addon²å¼þ´úÂëÖ´ÐЩ£»£»£»£»£»£»NASCENT RemKon Device Manager assets/index.phpí§Òâ´úÂëÉÏ´«Îó²î£»£»£»£»£»£»Teamviewer TVSÆÊÎöÄÚ´æÆÆËð´úÂëÖ´ÐÐÎó²î£»£»£»£»£»£»RaspAP raspap-webguiÌØÈ¨ÌáÉýÎó²î£»£»£»£»£»£»SolarWinds Web Help Desk referrerαÔì»á¼ûÏÞÖÆÈÆ¹ýÎó²î¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÐÂ¼ÓÆÂ·¿µØ²ú¹«Ë¾OrangeTeeÔâµ½ALTDOSµÄÀÕË÷¹¥»÷£»£»£»£»£»£»HuntressÔÚ1900̨Exchange¼ì²âµ½140¶àÖÖWeb shell£»£»£»£»£»£»Razer SynapseÖеÄÍâµØÌáȨ0dayÓ°ÏìÁè¼Ý1ÒÚÓû§£»£»£»£»£»£»SAM·¢Ã÷MiraiʹÓÃRealtek SDKÖÐÎó²îµÄ¹¥»÷»î¶¯£»£»£»£»£»£»OpenSSLÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´²úÆ·ÖеÄ2¸öÇå¾²Îó²î¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£


>Ö÷ÒªÇå¾²Îó²îÁбí


1.Google chrome V8 CVE-2021-30598ÀàÐÍ»ìÏý´úÂëÖ´ÐÐÎó²î


FlatCore-CMS upload addon²å¼þ±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£


https://github.com/flatCore/flatCore-CMS/issues/52


2.NASCENT RemKon Device Manager assets/index.phpí§Òâ´úÂëÉÏ´«Îó²î


NASCENT RemKon Device Manager assets/index.phpͼÏñÉÏ´«¹¦Ð§±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉÉÏ´«í§ÒâÎļþ²¢ÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£


https://www.blacklanternsecurity.com/2021-08-23-Nascent-RemKon-CVEs/


3.Teamviewer TVSÆÊÎöÄÚ´æÆÆËð´úÂëÖ´ÐÐÎó²î


Teamviewer TVSÆÊÎö±£´æÄÚ´æÆÆËðÎó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇ󣬣¬£¬£¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬£¬£¬£¬¿ÉʹӦÓóÌÐòÍ߽⻣»£»£»£»£»òÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£


https://www.zerodayinitiative.com/advisories/ZDI-21-1003/


4.RaspAP raspap-webguiÌØÈ¨ÌáÉýÎó²î


RaspAP raspap-webgui±£´æ²»Çå¾²µÄsudoersȨÏÞÎó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÍâµØ¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬»ñµÃROOTȨÏÞ¡£¡£


https://github.com/RaspAP/raspap-webgui/blob/fabc48c7daae4013b9888f266332e510b196a062/installers/raspap.sudoers


5.SolarWinds Web Help Desk referrerαÔì»á¼ûÏÞÖÆÈÆ¹ýÎó²î


SolarWinds Web Help Desk referrerαÔì±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉÈÆ¹ýÏÞÖÆÎ´ÊÚȨ»á¼û¡£¡£


https://www.solarwinds.com/trust-center/security-advisories/cve-2021-32076


 >Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢ÐÂ¼ÓÆÂ·¿µØ²ú¹«Ë¾OrangeTeeÔâµ½ALTDOSµÄÀÕË÷¹¥»÷


ÐÂ¼ÓÆÂ·¿µØ²ú¹«Ë¾OrangeTeeÔâµ½ALTDOSµÄÀÕË÷¹¥»÷.jpg


8ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬ÐÂ¼ÓÆÂ·¿µØ²ú¹«Ë¾OrangeTee GroupÔÚÆä¹ÙÍøÉÏÐû²¼ÉùÃ÷³ÆÆäÔâµ½Á˹¥»÷¡£¡£8ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬ºÚ¿ÍÍÅ»ïALTDOSÉù³ÆËüÃÇ×Ô2021Äê6ÔÂÒÔÀ´£¬£¬£¬£¬£¬£¬Ò»Ö±ÔÚÇÔÈ¡¸Ã¹«Ë¾µÄÊý¾Ý£¬£¬£¬£¬£¬£¬ÏÖÒÑ»ñµÃÁËÀ´×ÔACSystem¡¢NewOrangeTee¡¢OT_Analytics¡¢OT_LeaveºÍProjInfoListingµÄ969¸öÊý¾Ý¿â¡£¡£Í¬ÈÕ£¬£¬£¬£¬£¬£¬OrangeTee¹«Ë¾ÌåÏÖÆä²»»áÖ§¸¶Êê½ð¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.databreaches.net/singapore-real-estate-firm-breached-by-altdos/


2¡¢HuntressÔÚ1900̨Exchange¼ì²âµ½140¶àÖÖWeb shell


HuntressÔÚ1900̨Exchange¼ì²âµ½140¶àÖÖWeb shell.jpg


ÉÏÖÜÎ壬£¬£¬£¬£¬£¬Çå¾²¹«Ë¾Huntress Labs³Æ½ü2000̨Microsoft ExchangeÓʼþЧÀÍÆ÷ÔÚÒÑÍù¼¸ÌìÄÚÔâµ½ºÚ¿Í¹¥»÷¡£¡£ProxyShellÊÇ3¸öÎó²îCVE-2021-34473¡¢CVE-2021-34523ºÍCVE-2021-31207µÄͳ³Æ¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬£¬ÔÚProxyShell¿´·¨ÑéÖ¤´úÂëÐû²¼ºó²»¾Ã·ºÆðÁËÏà¹ØÉ¨Ãè»î¶¯£¬£¬£¬£¬£¬£¬Ö±µ½ÉÏÖÜÄ©Äð³ÉÁËÏÖʵ¹¥»÷¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬Òѱ»ÈëÇÖµÄ1900¶ą̀ExchangeЧÀÍÆ÷Éæ¼°µ½µÄ×éÖ¯°üÀ¨ÐÞ½¨ÖÆÔìÉÌ¡¢º£Ïʼӹ¤³§¡¢¹¤Òµ»úе¹«Ë¾¡¢Æû³µÎ¬ÐÞµêºÍСÐÍ»ú³¡µÈ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://therecord.media/almost-2000-exchange-servers-hacked-using-proxyshell-exploit/


3¡¢Razer SynapseÖеÄÍâµØÌáȨ0dayÓ°ÏìÁè¼Ý1ÒÚÓû§


Razer SynapseÖеÄÍâµØÌáȨ0dayÓ°ÏìÁè¼Ý1ÒÚÓû§.jpg


Ñо¿Ö°Ô±jonhatÓÚ2021Äê8ÔÂ21ÈÕÔÚTwitterÉÏÅû¶ÁËRazer SynapseÖеÄÍâµØÌáȨ0dayµÄϸ½Ú¡£¡£RazerÊÇÒ»¼ÒÅÌËã»úÍâÉèÖÆÔìÉÌ£¬£¬£¬£¬£¬£¬Éù³ÆÆäRazer SynapseÒѱ»È«ÇòÁè¼Ý1ÒÚÓû§Ê¹Óᣡ£ÕâÊÇÒ»¸öÍâµØÌáȨ£¨LPE£©Îó²î£¬£¬£¬£¬£¬£¬½«Razer×°±¸²åÈëWindows 10ʱ£¬£¬£¬£¬£¬£¬ÏµÍ³»á×Ô¶¯ÏÂÔØ²¢×°ÖÃÇý¶¯³ÌÐòºÍRazer Synapse£¬£¬£¬£¬£¬£¬ÓÉÓÚRazerInstaller.exeÊÇͨ¹ýSYSTEMȨÏÞµÄWindowsÀú³ÌÆô¶¯µÄ£¬£¬£¬£¬£¬£¬Òò´ËÆäÒ²»ñµÃÁËSYSTEMȨÏÞ¡£¡£Ö®ºóÔÚÑ¡Ôñ×°ÖÃÎļþ¼Ðʱ£¬£¬£¬£¬£¬£¬°´ÏÂShift²¢ÓÒ¼üµ¥»÷¶Ô»°¿ò£¬£¬£¬£¬£¬£¬¾Í¿ÉÒÔ·­¿ªSYSTEMȨÏÞµÄPowerShell´°¿Ú¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/razer-bug-lets-you-become-a-windows-10-admin-by-plugging-in-a-mouse/


4¡¢SAM·¢Ã÷MiraiʹÓÃRealtek SDKÖÐÎó²îµÄ¹¥»÷»î¶¯


SAM·¢Ã÷MiraiʹÓÃRealtek SDKÖÐÎó²îµÄ¹¥»÷»î¶¯.jpg


Çå¾²¹«Ë¾SAM SeamlessÓÚ8ÔÂ19ÈÕ³ÆÆä·¢Ã÷Á˽©Ê¬ÍøÂçMiraiʹÓÃRealtek SDKÖÐÎó²îµÄ¹¥»÷»î¶¯¡£¡£¸ÃÎó²îΪÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¬£¬£¬£¬£¬£¬×·×ÙΪCVE-2021-20090£¬£¬£¬£¬£¬£¬ÆÀ·ÖΪ9.8·Ö£¬£¬£¬£¬£¬£¬RealtekÒÑÓÚ8ÔÂ13ÈÕÐû²¼¸ÃÎó²îµÄ²¹¶¡³ÌÐò¡£¡£SAMÌåÏÖ£¬£¬£¬£¬£¬£¬ËûÃÇÓÚ8ÔÂ18ÈÕÔÚÒ°·¢Ã÷ÁË´Ë´ÎÎó²îʹÓû£¬£¬£¬£¬£¬£¬¹¥»÷Ô´ÓÚ31.210.20[.]100£¬£¬£¬£¬£¬£¬µ«¹¥»÷ÕßµÄIPµØµã¿ÉÄÜ»áËæ×Åʱ¼ä¶ø¸Ä±ä¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securingsam.com/realtek-vulnerabilities-weaponized/


5¡¢OpenSSLÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´²úÆ·ÖеÄ2¸öÇå¾²Îó²î


OpenSSL.png


OpenSSLÓÚ8ÔÂ24ÈÕÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´Æä²úÆ·ÖеÄ2¸öÇå¾²Îó²î¡£¡£ÆäÖÐ×îΪÑÏÖØµÄÊÇ»º³åÇøÒç³öÎó²î£¬£¬£¬£¬£¬£¬×·×ÙΪCVE-2021-3711£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÆä¿Éµ¼ÖÂÓ¦ÓóÌÐòÍ߽⡣¡£¸ÃÎó²îÓëSM2¼ÓÃÜÊý¾ÝµÄ½âÃÜÀú³ÌÏà¹Ø£¬£¬£¬£¬£¬£¬¿ÉÓÃÀ´¸ü¸Ä¶ÑÖеÄÊý¾Ý£¨¼´Æ¾Ö¤£©¡£¡£´Ë´ÎÐÞ¸´µÄÁíÒ»¸öÎó²î×·×ÙΪCVE-2021-3712£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓøÃÎó²î´¥·¢¾Ü¾øÐ§ÀÍ(DoS)£¬£¬£¬£¬£¬£¬»¹¿ÉÄܵ¼ÖÂÉñÃØÐÅϢй¶£¬£¬£¬£¬£¬£¬ÀýÈç˽Կ»òÃô¸ÐÃ÷ÎÄ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/121426/hacking/cve-2021-3711-openssl-flaws.html