΢Èí10Ô·ݸüÐÂÐÞ¸´3¸ö±»Ê¹ÓÃÎó²îÔÚÄÚµÄ104¸öÎó²î

Ðû²¼Ê±¼ä 2023-10-11

1¡¢Î¢Èí10Ô·ݸüÐÂÐÞ¸´3¸ö±»Ê¹ÓÃÎó²îÔÚÄÚµÄ104¸öÎó²î


΢ÈíÔÚ10ÔÂ10ÈÕÐû²¼Á˱¾ÔµÄÖܶþ²¹¶¡£¬£¬£¬ £¬£¬×ܼÆÐÞ¸´ÁË104¸öÇå¾²Îó²î£¬£¬£¬ £¬£¬°üÀ¨Èý¸öÒѱ»Ê¹ÓõÄÎó²î¡£¡£¡£¡£¡£±»Ê¹ÓÃÎó²î°üÀ¨Skype for BusinessÌáȨÎó²î£¨CVE-2023-41763£©¡¢Microsoft WordPadÐÅϢй¶Îó²î£¨CVE-2023-36563£©ºÍHTTP/2¿ìËÙÖØÖù¥»÷£¨CVE-2023-44487£©¡£¡£¡£¡£¡£¹ØÓÚCVE-2023-44487£¬£¬£¬ £¬£¬Î¢ÈíÐû²¼ÁËÕë¶ÔDDoS¹¥»÷ÊÖÒÕHTTP/2 Rapid ResetµÄ»º½â²½·¥£¬£¬£¬ £¬£¬¸ÃÊÖÒÕ×Ô8Ô·ÝÒÔÀ´Ò»Ö±±»Ê¹Óᣡ£¡£¡£¡£ÓÉÓڸù¦Ð§ÄÚÖÃÓÚHTTP/2±ê×¼ÖУ¬£¬£¬ £¬£¬Òò´Ë³ýÁËÏÞÖÆËÙÂÊ»ò×èֹЭÒéÍ⣬£¬£¬ £¬£¬Ã»ÓÐÆäËüÐÞ¸´ÒªÁì¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-october-2023-patch-tuesday-fixes-3-zero-days-104-flaws/


2¡¢ºÚ¿Í¹ûÕæHelloKittyÔ´Âë²¢³ÆÔÚ¿ª·¢¸üǿʢµÄ¼ÓÃÜÆ÷


¾ÝýÌå10ÔÂ9ÈÕ±¨µÀ£¬£¬£¬ £¬£¬ºÚ¿Íkapuchin0£¨ÓÖÃûGookee£©ÔÚXSSÂÛ̳ÉϹûÕæÁËÀÕË÷Èí¼þHelloKittyµÄÔ´´úÂ룬£¬£¬ £¬£¬²¢Éù³ÆÕýÔÚ¿ª·¢Ò»ÖÖеĸüǿʢµÄ¼ÓÃÜÆ÷¡£¡£¡£¡£¡£Ðû²¼µÄhellokitty.zipѹËõ°ü°üÀ¨Ò»¸öMicrosoft Visual Studio½â¾ö¼Æ»®£¬£¬£¬ £¬£¬¿É¹¹½¨HelloKitty¼ÓÃÜÆ÷Ï¢ÕùÃÜÆ÷ÒÔ¼°NTRUEncrypt¿â¡£¡£¡£¡£¡£Ñо¿Ö°Ô±È·ÈÏ£¬£¬£¬ £¬£¬ÕâÊÇHelloKittyÔÚ2020ÄêÊ×´ÎÆô¶¯Ê±Ê¹ÓõÄÕýµ±Ô´´úÂë¡£¡£¡£¡£¡£ËäÈ»ÀÕË÷Èí¼þÔ´´úÂëµÄ¹ûÕæÓÐÖúÓÚÇå¾²Ñо¿£¬£¬£¬ £¬£¬µ«Ò²ÈÝÒ×±»¹¥»÷ÕßÀÄÓÿª·¢×Ô¼ºµÄ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£


https://securityaffairs.com/152182/malware/hellokitty-ransomware-source-code-leaked.html


3¡¢Akamai¼ì²âµ½Ð®ÖƵçÉÌÍøÕ¾404Ò³ÃæÇÔÊØÐÅÓÿ¨µÄ»î¶¯


AkamaiÔÚ10ÔÂ9ÈÕ³ÆÆä¼ì²âµ½ÐÂÒ»ÂÖµÄMagecart¹¥»÷»î¶¯¡£¡£¡£¡£¡£¸Ã»î¶¯Ö÷ÒªÕë¶ÔMagentoºÍWooCommerceÍøÕ¾£¬£¬£¬ £¬£¬Éæ¼°ÓëʳÎïºÍÁãÊÛÐÐÒµÓйصĹ«Ë¾£¬£¬£¬ £¬£¬Ê¹ÓÃĬÈϵġ°404 Not Found¡±Ò³ÃæÀ´Òþ²ØºÍ¼ÓÔØÒøÐп¨ÇÔÈ¡´úÂë¡£¡£¡£¡£¡£¼ÓÔØ³ÌÐòÏòÏà¶Ô·¾¶¡°icons¡±Ìᳫ»ñÈ¡ÇëÇ󣬣¬£¬ £¬£¬µ«ÓÉÓڸ÷¾¶²»±£´æ»áµ¼ÖÂ404¹ýʧ¡£¡£¡£¡£¡£ÔçÏÈ£¬£¬£¬ £¬£¬Ñо¿Ö°Ô±ÒÔΪskimmerÒѲ»»îÔ¾£¬£¬£¬ £¬£¬»ò¹¥»÷ÕßÉèÖùýʧ¡£¡£¡£¡£¡£ØÊºóÆÊÎö·¢Ã÷£¬£¬£¬ £¬£¬¼ÓÔØ³ÌÐò°üÀ¨Ò»¸öÕýÔò±í´ïʽƥÅ䣬£¬£¬ £¬£¬ÔÚ404Ò³Ãæ·µ»ØµÄHTMLÖÐËÑË÷ÌØ¶¨×Ö·û´®¡£¡£¡£¡£¡£AkamaiÔÚÕÒµ½¸Ã×Ö·û´®ºó·¢Ã÷ÁËÒþ²ØÔÚ×¢ÊÍÖеÄbase64±àÂë×Ö·û´®£¬£¬£¬ £¬£¬½âÂëºó·¢Ã÷ÁËÒþ²ØÔÚËùÓÐ404Ò³ÃæÖеÄJavaScript skimmer¡£¡£¡£¡£¡£


https://www.akamai.com/blog/security-research/magecart-new-technique-404-pages-skimmer


4¡¢TagDiv²å¼þÎó²îCVE-2023-3169±»ÓÃÓÚ¹¥»÷ÉÏÍò¸öWPÍøÕ¾


¾Ý10ÔÂ9ÈÕ±¨µÀ£¬£¬£¬ £¬£¬TagDiv Composer²å¼þÎó²îÒѱ»ÓÃÓÚ¹¥»÷Áè¼Ý17000¸öWordPressÍøÕ¾£¬£¬£¬ £¬£¬×÷ΪBalada Injector»î¶¯µÄÒ»²¿·Ö¡£¡£¡£¡£¡£ÕâÊÇÒ»¸öXSSÎó²î£¨CVE-2023-3169£©£¬£¬£¬ £¬£¬ÆäÏêϸÐÅÏ¢ºÍPoCÓÚ9ÔÂÖÐÑ®Åû¶£¬£¬£¬ £¬£¬²»¾ÃÖ®ºóSucuri¾Í×îÏÈ·¢Ã÷ʹÓøÃÎó²îµÄ¹¥»÷¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓøÃÎó²î½«¶ñÒâ´úÂë×¢ÈëWordPressÊý¾Ý¿âÖеÄÌØ¶¨Î»Ö㬣¬£¬ £¬£¬ÒÔÈ·±£´úÂë¿ÉÈö²¥µ½Ä¿µÄÍøÕ¾µÄÿ¸ö¹ûÕæÒ³Ãæ¡£¡£¡£¡£¡£Balada Injector»î¶¯×Ô2017ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬ £¬£¬¾ÝÔ¤¼ÆÒÑÈëÇÖ½ü100Íò¸öWordPressÍøÕ¾¡£¡£¡£¡£¡£


https://www.securityweek.com/recently-patched-tagdiv-plugin-flaw-exploited-to-hack-thousands-of-wordpress-sites/


5¡¢D-Link DAP-X1860 WiFi 6±£´æÎó²îCVE-2023-45208


ýÌå10ÔÂ9Èճƣ¬£¬£¬ £¬£¬D-Link DAP-X1860 WiFi 6¹æÄ£À©Õ¹Æ÷±£´æÎó²î£¨CVE-2023-45208£©£¬£¬£¬ £¬£¬ÈÝÒ×µ¼ÖÂDoSºÍÔ¶³ÌÏÂÁî×¢Èë¡£¡£¡£¡£¡£ÎÊÌâÔÚÓÚ×°±¸µÄÍøÂçɨÃ蹦Ч£¬£¬£¬ £¬£¬ÎÞ·¨ÆÊÎöÃû³ÆÖаüÀ¨ÌØÊâ·ûºÅ(')µÄSSID£¬£¬£¬ £¬£¬½«ÆäÎó½âΪÏÂÁîÖÕÖ¹·û¡£¡£¡£¡£¡£´ÓÊÖÒÕÉϽ²£¬£¬£¬ £¬£¬ËüÔ´ÓÚlibcgifunc.so¿âÖеÄparsing_xml_stasurveyº¯Êý¡£¡£¡£¡£¡£ÓÉÓڸòúƷȱ·¦SSIDÕûÀí¹¦Ð§£¬£¬£¬ £¬£¬¹¥»÷Õß¿ÉÒÔʹÓô˹¦Ð§µÖ´ï¶ñÒâÄ¿µÄ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÓÚ5Ô·¢Ã÷²¢ÏòD-Link±¨¸æ¸ÃÎó²î£¬£¬£¬ £¬£¬Ö»¹ÜÒѶà´Î¸ú½ø£¬£¬£¬ £¬£¬µ«ÈÔδÊÕµ½»Ø¸´¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/d-link-wifi-range-extender-vulnerable-to-command-injection-attacks/


6¡¢Check PointÅû¶Õë¶ÔÑÇÖÞʵÌåµÄ»î¶¯Stayin' Alive


10ÔÂ9ÈÕ£¬£¬£¬ £¬£¬Check PointÅû¶ÔÚÑÇÖÞ¾ÙÐеÄÌØ¹¤»î¶¯Stayin' Alive£¬£¬£¬ £¬£¬Ö÷ÒªÕë¶ÔµçÐÅÐÐÒµµÄÆóÒµºÍÕþ¸®»ú¹¹¡£¡£¡£¡£¡£¸Ã»î¶¯ÖÁÉÙ×Ô2021ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬ £¬£¬Ê¹Óô¹ÂÚÓʼþºÍDLL²à¼ÓÔØÊÖÒÕ·Ö·¢¶ñÒâÈí¼þ¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬ £¬£¬Ëüͨ¹ýÐ®ÖÆdal_keepalives.dllʹÓÃÁËAudinate¡¯s Dante DiscoveryÈí¼þÖеÄÎó²î(CVE-2022-23748)¡£¡£¡£¡£¡£¸Ã»î¶¯µÄ×Ô½ç˵¹¤¾ßÓëÒÑÖª¹¤¾ß¼¯Ã»ÓÐÏÔ×ŵÄÖØµþ£¬£¬£¬ £¬£¬µ«ËüÃǶ¼ÓëToddyCatÏà¹ØµÄ»ù´¡ÉèÊ©ÓйØÁª£¬£¬£¬ £¬£¬Òò´ËÍÆ²â¸Ã»î¶¯ÓëToddyCatÓйØ¡£¡£¡£¡£¡£


https://blog.checkpoint.com/security/unveiling-stayin-alive-a-closer-look-at-an-ongoing-campaign-in-asia-targeting-telecom-and-governmental-entities/