ÐÅÏ¢Çå¾²Öܱ¨-2018ÄêµÚ51ÖÜ

Ðû²¼Ê±¼ä 2018-12-24
±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö


2018Äê12ÔÂ17ÈÕ23ÈÕ¹²ÊÕ¼Çå¾²Îó²î49¸ö£¬ £¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇWordPress two-factor-authentication²å¼þ¿çÕ¾ÇëÇóαÔìÎó²î£»£»£»£»£»£»ABB GATE-E1ºÍGATE-E2ÑéÖ¤ÈÆ¹ýÎó²î£»£»£»£»£»£»Advantech WebAccess/SCADA CVE-2018-18999»º³åÇøÒç³öÎó²î£»£»£»£»£»£»DedeCMS uploads/include/dialog/select_images_post.phpí§Òâ´úÂëÖ´ÐÐÎó²î£»£»£»£»£»£»TRENDnet TEW-632BRPºÍTEW-673GRU apply.cgi»º³åÇøÒç³öÎó²î¡£ ¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÃÀDoD³ÆÆäµ¯µÀµ¼µ¯·ÀÓùϵͳδͨ¹ýÍøÂçÇå¾²É󼯣»£»£»£»£»£»Å·ÖÞÒé»áºÍÀíÊ»áÐû²¼¡¶Å·Ã˵ç×ÓͨѶ¹æ·¶£¨EECC£©¡·£»£»£»£»£»£»Elasticsearch Kibana¿ØÖÆÌ¨Îļþ°üÀ¨Îó²î£¬ £¬£¬£¬£¬£¬PoC´úÂëÒÑÐû²¼£»£»£»£»£»£»NASAÅû¶Êý¾Ýй¶ÊÂÎñ£¬ £¬£¬£¬£¬£¬²¿·ÖÔ±¹¤µÄPIIÐÅÏ¢±»µÁ£»£»£»£»£»£»SandboxEscaperµÚÈý´ÎÔÚTwitterÉÏÅû¶δÐÞ¸´µÄWindows 0day¡£ ¡£¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬ £¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£ ¡£¡£¡£


Ö÷ÒªÇå¾²Îó²îÁбí


1. WordPress two-factor-authentication²å¼þ¿çÕ¾ÇëÇóαÔìÎó²î


WordPress two-factor-authentication²å¼þ±£´æ¿çÕ¾ÇëÇóαÔìÎó²î£¬ £¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²î¹¹½¨¶ñÒâURI£¬ £¬£¬£¬£¬£¬ÓÕʹÇëÇó£¬ £¬£¬£¬£¬£¬¿ÉÒÔÄ¿µÄÓû§ÉÏÏÂÎÄÖ´ÐжñÒâ²Ù×÷¡£ ¡£¡£¡£

https://wordpress.org/plugins/two-factor-authentication/#developers

2. ABB GATE-E1ºÍGATE-E2ÑéÖ¤ÈÆ¹ýÎó²î


ABB GATE-E1ºÍGATE-E2ÔÚÖÎÀítelnet»òweb½Ó¿ÚÖб£´æÑéÖ¤ÉèÖÃÎó²î£¬ £¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó£¬ £¬£¬£¬£¬£¬¿ÉÖØÖÃ×°±¸¡¢¶ÁÈ¡»òÐÞ¸Ä×¢²á±í¡¢ÐÞ¸ÄIPµØµãµÈ¡£ ¡£¡£¡£

https://ics-cert.us-cert.gov/advisories/ICSA-18-352-01

3. Advantech WebAccess/SCADA CVE-2018-18999»º³åÇøÒç³öÎó²î


Advantech WebAccess/SCADA±£´æ»º³åÇøÒç³öÎó²î£¬ £¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó£¬ £¬£¬£¬£¬£¬¿ÉʹӦÓóÌÐòÍ߽⻣»£»£»£»£»òÖ´ÐÐí§Òâ´úÂë¡£ ¡£¡£¡£

https://ics-cert.us-cert.gov/advisories/ICSA-18-352-02

4. DedeCMS uploads/include/dialog/select_images_post.phpí§Òâ´úÂëÖ´ÐÐÎó²î


DedeCMS uploads/include/dialog/select_images_post.php±£´æÊäÈëÑéÖ¤ Îó²î£¬ £¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄË«ÖØÀ©Õ¹¼°Ð޸ĵÄ.php×Ó×Ö·û´®ÇëÇó£¬ £¬£¬£¬£¬£¬¿ÉÉÏ´«í§ÒâÎļþ²¢Ö´ÐС£ ¡£¡£¡£

http://www.iwantacve.cn/index.php/archives/88/

5. TRENDnet TEW-632BRPºÍTEW-673GRU apply.cgi»º³åÇøÒç³öÎó²î


TRENDnet TEW-632BRPºÍTEW-673GRU apply.cgi±£´æ»º³åÇøÒç³öÎó²î£¬ £¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó£¬ £¬£¬£¬£¬£¬¿ÉʹӦÓóÌÐòÍ߽⻣»£»£»£»£»òÖ´ÐÐí§Òâ´úÂë¡£ ¡£¡£¡£

http://packetstormsecurity.com/files/150693/TRENDnet-Command-Injection-Buffer-Overflow-Cross-Site-Scripting.html


 Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢ÃÀDoD³ÆÆäµ¯µÀµ¼µ¯·ÀÓùϵͳδͨ¹ýÍøÂçÇå¾²Éó¼Æ


c7c7ÓéÀÖÆ½Ì¨(ÖйúÓÎ)µÇ¼¹ÙÍøÈë¿Ú


ƾ֤ÃÀ¹ú¹ú·À²¿¼à²ì³¤µÄÒ»·Ý±¨¸æ£¬ £¬£¬£¬£¬£¬ÃÀ¹úµÄµ¯µÀµ¼µ¯·ÀÓùϵͳ£¨BMDS£©Î´ÄÜͨ¹ýÍøÂçÇå¾²É󼯡£ ¡£¡£¡£¸Ã±¨¸æÖ¸³öBMDSÉèʩδÄÜʵÑéÓ¦ÓеÄÇå¾²¿ØÖƲ½·¥£¬ £¬£¬£¬£¬£¬°üÀ¨¶àÒòËØÉí·ÝÈÏÖ¤¡¢Îó²îÆÀ¹À»ººÍ½â¡¢Ð§ÀÍÆ÷»ú¼ÜÇå¾²¡¢¿ÉÒÆ¶¯Ã½ÌåÉϵÄÉñÃØÊý¾Ý±£»£»£»£»£»£»¤ºÍÊÖÒÕÐÅÏ¢¼ÓÃÜ´«ÊäµÈ¡£ ¡£¡£¡£±ðµÄ£¬ £¬£¬£¬£¬£¬Ò»Ð©ÎïÀíÇå¾²²½·¥Ò²Ã»Óе½Î»£¬ £¬£¬£¬£¬£¬ÀýÈçÉãÏñÍ·ºÍ´«¸ÐÆ÷²¢Ã»ÓÐ×°ÖÃÔÚÐèҪװÖõÄλÖᣠ¡£¡£¡£¼à²ì³¤°ì¹«ÊÒÕýÔÚÒªÇóÊ×ϯÐÅÏ¢¹Ù¡¢Ö¸»Ó¹ÙµÈÔÚ2019Äê1ÔÂ8ÈÕǰ»ØÓ¦¸Ã·Ý±¨¸æ¡£ ¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://media.defense.gov/2018/Dec/14/2002072642/-1/-1/1/DODIG-2019-034.PDF

2¡¢Å·ÖÞÒé»áºÍÀíÊ»áÐû²¼¡¶Å·Ã˵ç×ÓͨѶ¹æ·¶£¨EECC£©¡·

c7c7ÓéÀÖÆ½Ì¨(ÖйúÓÎ)µÇ¼¹ÙÍøÈë¿Ú



Å·ÖÞÒé»áºÍÀíÊ»áÐû²¼¡¶Å·Ã˵ç×ÓͨѶ¹æ·¶£¨EECC£©¡·£¬ £¬£¬£¬£¬£¬¸Ã¹æ·¶ÊǶÔ2009ÄêÐû²¼µÄÏÖÓеç×ÓͨѶÁ¢·¨¿ò¼ÜµÄÖØÐÂÐÞ¶©¡£ ¡£¡£¡£Å·Ã˳ÉÔ±¹ú½«ÓÐÁ½ÄêµÄʱ¼ä½«¸Ã¹æ·¶µÄÏà¹ØÌõ¿îת»»Îª±¾¹úµÄÖ´·¨¡¢¹æÔòºÍÐÐÕþ»®¶¨£¬ £¬£¬£¬£¬£¬ÕâÒ»×îºóÏÞÆÚÊÇ2020Äê12Ô¡£ ¡£¡£¡£¸Ã¹æ·¶µÄÕûÌåÄ¿µÄÊÇ¡°Ê¹Å·ÃËÔÚ2025ÄêÕ¾ÔÚ»¥ÁªÍøÅþÁ¬µÄ×îÇ°ÑØ-½¨ÉèÒ»¸öǧÕ×Éç»á¡±¡£ ¡£¡£¡£¸Ã¹æ·¶»¹°üÀ¨¶ÔÇå¾²µÄ»®¶¨Ìõ¿î£ºµç×ÓÍ¨Ñ¶ÍøÂçЧÀÍÉÌÐèÒª½ÓÄÉÏìÓ¦µÄÊÖÒպͻúÖÆ£¬ £¬£¬£¬£¬£¬ÒÔ×î´óÏ޶ȵØïÔÌ­Çå¾²ÊÂÎñ¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º
https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32018L1972

3¡¢Elasticsearch Kibana¿ØÖÆÌ¨Îļþ°üÀ¨Îó²î£¬ £¬£¬£¬£¬£¬PoC´úÂëÒÑÐû²¼

c7c7ÓéÀÖÆ½Ì¨(ÖйúÓÎ)µÇ¼¹ÙÍøÈë¿Ú



KibanaÊÇElasticsearchµÄÊý¾Ý¿ÉÊÓ»¯¹¤¾ß£¬ £¬£¬£¬£¬£¬ÆäConsole²å¼þ±£´æÍâµØÎļþ°üÀ¨£¨LFI£©Îó²î£¬ £¬£¬£¬£¬£¬Ñо¿Ö°Ô±Ðû²¼Á˸ÃÎó²îµÄPoC´úÂë¡£ ¡£¡£¡£¸ÃÎó²î£¨CVE-2018-17246£©Ó°ÏìÁË6.4.3ºÍ5.6.13֮ǰµÄKibana°æ±¾£¬ £¬£¬£¬£¬£¬ÀÖ³ÉʹÓøÃÎó²î¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС£ ¡£¡£¡£ElasticÒÑÔÚ×îа汾µÄKibanaÖÐÐÞ¸´Á˸ÃÎó²î£¬ £¬£¬£¬£¬£¬ÈôÊÇÓû§ÔÝʱÎÞ·¨¸üУ¬ £¬£¬£¬£¬£¬Ò²¿ÉÒÔÔÚÉèÖÃÎļþÖнûÓøÃConsole²å¼þÀ´¹æ±ÜÕâÒ»ÎÊÌâ¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/file-inclusion-bug-in-kibana-console-for-elasticsearch-gets-exploit-code/

4¡¢NASAÅû¶Êý¾Ýй¶ÊÂÎñ£¬ £¬£¬£¬£¬£¬²¿·ÖÔ±¹¤µÄPIIÐÅÏ¢±»µÁ

c7c7ÓéÀÖÆ½Ì¨(ÖйúÓÎ)µÇ¼¹ÙÍøÈë¿Ú



NASA±»ºÚ£¬ £¬£¬£¬£¬£¬Æ¾Ö¤¸Ã»ú¹¹µÄ˵·¨£¬ £¬£¬£¬£¬£¬NASAÔÚ10ÔÂ23ÈÕ·¢Ã÷ÁËÕâÒ»Êý¾Ýй¶ÊÂÎñ£¬ £¬£¬£¬£¬£¬ÆäÒ»¸ö´æ´¢Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©µÄЧÀÍÆ÷Ôâµ½ºÚ¿ÍÈëÇÖ£¬ £¬£¬£¬£¬£¬2006Äê7ÔÂÖÁ2018Äê10ÔÂʱ´ú¼ÓÈëNASAµÄÔ±¹¤µÄPIIÐÅϢй¶£¬ £¬£¬£¬£¬£¬°üÀ¨È¥Ö°»òµ÷Ö°µÄÔ±¹¤¡£ ¡£¡£¡£NASAÏÖÔÚÓµÓÐÔ¼17300ÃûÔ±¹¤¡£ ¡£¡£¡£¸Ã»ú¹¹ÌåÏÖûÓÐÌ«¿ÕʹÃüÊܵ½Ó°Ïì¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º
https://thehackernews.com/2018/12/nasa-hack-data-breach.html

5¡¢SandboxEscaperµÚÈý´ÎÔÚTwitterÉÏÅû¶δÐÞ¸´µÄWindows 0day

c7c7ÓéÀÖÆ½Ì¨(ÖйúÓÎ)µÇ¼¹ÙÍøÈë¿Ú



Ñо¿Ö°Ô±SandboxEscaperµÚÈý´ÎÔÚTwitterÉÏÅû¶δÐÞ¸´µÄWindows 0day£¬ £¬£¬£¬£¬£¬²¢ÇÒÐû²¼ÁËÏà¹ØPoC¡£ ¡£¡£¡£Õâ¸öеÄÎó²î±£´æÓÚWindowsµÄMsiAdvertiseProduct¹¦Ð§ÖУ¬ £¬£¬£¬£¬£¬Æ¾Ö¤¸ÃÑо¿Ö°Ô±µÄ˵·¨£¬ £¬£¬£¬£¬£¬ÓÉÓÚûÓÐ׼ȷÑéÖ¤£¬ £¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓøù¦Ð§Ç¿ÆÈ×°ÖÃЧÀÍÒÔSYSTEMȨÏÞ¸´ÖÆí§ÒâÎļþ²¢¶ÁÈ¡ÆäÄÚÈÝ£¬ £¬£¬£¬£¬£¬´Ó¶øµ¼ÖÂí§ÒâÎļþ¶ÁÈ¡Îó²î¡£ ¡£¡£¡£SandboxEscaper»¹ÔÚGithubÉÏÐû²¼Á˸ÃÎó²îµÄPoC£¬ £¬£¬£¬£¬£¬µ«¸ÃGithubÕË»§ÏÖÔÚÒѱ»É¾³ý¡£ ¡£¡£¡£SandboxEscaperÔøÔÚ2018Äê8Ô·ݺÍ10Ô·ݻ®·ÖÔÚTwitterÉÏÅû¶ÁËÁ½¸öWindows 0day¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º
https://thehackernews.com/2018/12/windows-zero-day-exploit.html


ÉùÃ÷£º±¾×ÊѶÓÉc7c7ÓéÀÖÆ½Ì¨Î¬ËûÃüÇ徲С×é·­ÒëºÍÕûÀí