ÐÅÏ¢Çå¾²Öܱ¨-2020ÄêµÚ49ÖÜ

Ðû²¼Ê±¼ä 2020-12-08

> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö


2020Äê11ÔÂ30ÈÕÖÁ12ÔÂ06ÈÕ¹²ÊÕ¼Çå¾²Îó²î50¸ö£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇZeroshell cgi-bin kerbynet StartSessionSubmit×¢ÈëÎó²î£»£»£»£»£»Western Digital My Cloud OS devicesÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£»£»£»£»£»SourceCodester Car Rental Management System SQL×¢ÈëÎó²î£»£»£»£»£»Crux Linux Docker images root¿ÕÃÜÂëÎó²î£»£»£»£»£»HPE Edgeline Infrastructure ManagerÔ¶³Ì´úÂëÖ´ÐÐÎó²î¡£¡£ ¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇоƬ³§ÉÌAdvantechѬȾConti£¬£¬£¬±»ÀÕË÷1300ÍòÃÀÔª£»£»£»£»£»Carding Action 2020Ðж¯ÆÆ»ñÒ»Æð´ó¹æÄ£Õ©Æ­°¸¼þ£»£»£»£»£»Cisco TalosÅû¶WebKitÖжà¸öÑÏÖØµÄÎó²î£»£»£»£»£»Ñо¿ÍŶӷ¢Ã÷½©Ê¬ÍøÂçXantheʹÓÃDockerAPIѬȾLinux£»£»£»£»£»GitHubÐû²¼2020Äê¶ÈOctoverseÌ¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£ ¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£ ¡£¡£


Ö÷ÒªÇå¾²Îó²îÁбí


1.Zeroshell cgi-bin kerbynet StartSessionSubmit×¢ÈëÎó²î


Zeroshell cgi-bin kerbynet StartSessionSubmit±£´æÊäÈëÑéÖ¤Îó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿É×¢Èëí§ÒâÏÂÁî²¢Ö´ÐС£¡£ ¡£¡£

https://blog.quake.so/post/zeroshell_linux_router_rce/


2.Western Digital My Cloud OS devicesÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î


Western Digital My Cloud OS devicesÖÎÀíÆ½Ì¨±£´æÑéÖ¤ÈÆ¹ýÎó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§ÒâÏÂÁî¡£¡£ ¡£¡£

https://www.westerndigital.com/support/productsecurity/wdc-20009-os5-firmware-5-06-115


3.SourceCodester Car Rental Management System SQL×¢ÈëÎó²î


Sourcecodester SourceCodester Car Rental Management System±£´æSQL×¢ÈëÎó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄSQLÇëÇ󣬣¬£¬²Ù×÷Êý¾Ý¿â£¬£¬£¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»òÖ´ÐÐí§Òâ´úÂë¡£¡£ ¡£¡£

https://github.com/BigTiger2020/Car-Rental-Management-System/blob/main/README.md


4.Crux Linux Docker images root¿ÕÃÜÂëÎó²î


Crux Linux Docker images±£´æROOT¿ÕÃÜÂëÎó²î£¬£¬£¬ÔÊÐíÍâµØ¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉÌáÉýȨÏÞ¡£¡£ ¡£¡£

https://github.com/koharin/koharin2/blob/main/CVE-2020-29389


5.HPE Edgeline Infrastructure ManagerÔ¶³Ì´úÂëÖ´ÐÐÎó²î


HPE Edgeline Infrastructure Manager±£´æÇå¾²Îó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉʹӦÓóÌÐòÍ߽⻣»£»£»£»òÖ´ÐÐí§Òâ´úÂë¡£¡£ ¡£¡£

https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn04063en_us


> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢Ð¾Æ¬³§ÉÌAdvantechѬȾConti£¬£¬£¬±»ÀÕË÷1300ÍòÃÀÔª


1.jpg


¹¤Òµ×Ô¶¯»¯ºÍ¹¤ÒµÎïÁªÍø£¨IIoT£©Ð¾Æ¬ÖÆÔìÉÌAdvantechѬȾÀÕË÷Èí¼þConti£¬£¬£¬±»ÀÕË÷750 BTC£¨Ô¼Îª12600000ÃÀÔª£©¡£¡£ ¡£¡£AdvantechÊÇIT²úÆ·Ï¢Õù¾ö¼Æ»®µÄÈ«ÇòÁìÏÈÖÆÔìÉÌ£¬£¬£¬²úÆ·°üÀ¨Ç¶ÈëʽPC¡¢ÍøÂç×°±¸¡¢IoT¡¢Ð§ÀÍÆ÷ºÍÒ½ÁƱ£½¡½â¾ö¼Æ»®¡£¡£ ¡£¡£11ÔÂ26ÈÕ£¬£¬£¬ºÚ¿ÍÔÚÆäÐ¹Â¶ÍøÕ¾ÉÏÐû²¼ÁË3.03GB±»µÁÊý¾ÝÖеÄ2£¥£¬£¬£¬ÒÔ¼°Ò»¸ö°üÀ¨Á˱»µÁÎļþÁбíµÄÎı¾Îĵµ¡£¡£ ¡£¡£ÏÖÔÚ£¬£¬£¬Advantech¹«Ë¾ÉÐδ¶Ô´ËʽÒÏþ̸ÂÛ¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/iiot-chip-maker-advantech-hit-by-ransomware-125-million-ransom/


2¡¢Carding Action 2020Ðж¯ÆÆ»ñÒ»Æð´ó¹æÄ£Õ©Æ­°¸¼þ


2.jpg


ÍøÂçÇå¾²¹«Ë¾Group-IBÓëÅ·ÖÞµÄÐÙÑÀÀû¡¢Ó¢¹úºÍÒâ´óÀûÕþ¸®ÏàÖú£¬£¬£¬ÌᳫCarding Action 2020Ðж¯£¬£¬£¬ÆÆ»ñÒ»Æð´ó¹æÄ£ÐÅÓÿ¨ÉúÒâÕ©Æ­°¸¼þ¡£¡£ ¡£¡£¸Ã»î¶¯Õë¶Ô¶à¸ö°µÍøÊг¡£¬£¬£¬ÔÚÐÅÓÿ¨ÉúÒâÊÐËÁºÍ°µÍøÉúÒâÆ½Ì¨ÉϲéÕÒÓëÉúÒâ±»µÁ¿¨ÏêϸÐÅÏ¢ÓйصÄڲƭÕߣ¬£¬£¬Ö¼ÔÚ¼õÇáºÍ±ÜÃâ½ðÈÚ»ú¹¹ºÍ³Ö¿¨ÈËÔâÊÜËðʧ£¬£¬£¬ÏÖÔÚÔ¼×èÖ¹ÁË4000ÍòÅ·ÔªµÄËðʧ¡£¡£ ¡£¡£¹ú¼ÊÐ̾¯×éÖ¯Ðû²¼¾Ð²¶ÁËÈýÃûÀ´×ÔÄáÈÕÀûÑǵÄÏÓÒÉÈË£¬£¬£¬¾ÝÐÅËûÃÇÊÇÒ»¸ö¹¥»÷ÁË150¸öÕþ¸®×éÖ¯ºÍ¹«Ë¾µÄÍÅ»ïµÄ³ÉÔ±¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/authorities-disrupt-dark-web-credit-card-trading-scam/


3¡¢Cisco TalosÅû¶WebKitÖжà¸öÑÏÖØµÄÎó²î


3.jpg


Cisco TalosÅû¶WebKitä¯ÀÀÆ÷ÒýÇæ±£´æ¶à¸öÑÏÖØµÄÎó²î¡£¡£ ¡£¡£ÕâЩÎó²îÓëWebKitµÄWebSocket¡¢AudioSourceProviderGStreamerºÍImageDecoderGStreamer¹¦Ð§Óйء£¡£ ¡£¡£»®·ÖΪWebSocket´úÂëÖ´ÐÐÎó²î£¨CVE-2020-13543£©£¬£¬£¬¿Éͨ¹ý´¥·¢ÊͷźóʹÓÃÎó²îÀ´Ô¶³ÌÖ´ÐдúÂ룻£»£»£»£»ImageDecoderGStreamerÊͷźóʹÓÃÎó²î£¨CVE-2020-13584£©£¬£¬£¬¿Éµ¼ÖÂÔ¶³ÌÖ´ÐдúÂ룬£¬£¬ÒÔ¼°±»×·×ÙΪCVE-2020-13543µÄÎó²î¡£¡£ ¡£¡£    


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/webkit-vulnerabilities-allow-remote-code-execution-malicious-websites


4¡¢Ñо¿ÍŶӷ¢Ã÷½©Ê¬ÍøÂçXantheʹÓÃDockerAPIѬȾLinux


4.jpg


Ñо¿ÍŶӷ¢Ã÷ÁËÒ»¸öÃûΪXantheµÄÃÅÂÞ±Ò¼ÓÃܽ©Ê¬ÍøÂ磬£¬£¬¿ÉʹÓÃÉèÖùýʧµÄDocker APIÀ´Ñ¬È¾Linuxϵͳ¡£¡£ ¡£¡£¸Ã¶ñÒâÈí¼þ¿ÉʹÓöàÖÖÒªÁì¾ÙÐÐÈö²¥£¬£¬£¬ÈçÍøÂç¿Í»§¶ËÖ¤ÊéÒÔͨ¹ýSSHÈö²¥µ½Ä¿µÄÖ÷»ú¡£¡£ ¡£¡£±ðµÄ£¬£¬£¬Xanthe¾ßÓÐËĸöÓÃÀ´Èƹý¼ì²â²¢ÔöÌí³¤ÆÚÐԵĸ½¼ÓÄ£¿£¿£¿£¿£¿£¿é£¬£¬£¬»®·ÖΪÀú³ÌÒþ²ØÄ£¿£¿£¿£¿£¿£¿é£¨libprocesshider.so£©£»£»£»£»£»½ûÓÃÆäËû¿ó¹¤ºÍÇ徲ЧÀ͵Äshell¾ç±¾£¨xesa.txt£©£»£»£»£»£»ÓÃÓÚɾ³ýDockerÈÝÆ÷ÖеľºÕùÐÔDockerÄ¿µÄ¼ÓÃÜľÂíµÄshell¾ç±¾(fczyo)ºÍXMRig¶þ½øÖÆÎļþ£¨ÒÔ¼°JSONÉèÖÃÎļþconfig.json£©¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/misconfigured-docker-servers-xanthe-malware/161732/


5¡¢GitHubÐû²¼2020Äê¶ÈOctoverseÌ¬ÊÆµÄÆÊÎö±¨¸æ


5.jpg


GitHubÐû²¼ÁË2020Äê¶ÈOctoverseÌ¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£ ¡£¡£¸Ã±¨¸æÖ÷Ҫͳ¼ÆÁËÁè¼Ý5600ÍòÃû¿ª·¢Ö°Ô±ÔÚ2020Ä꽨ÉèµÄÁè¼Ý6000Íò¸öд洢¿â¡£¡£ ¡£¡£Ñо¿·¢Ã÷£¬£¬£¬Óë2019ÄêÏà±È£¬£¬£¬ÏÖÔÚ94£¥µÄÏîÄ¿ÒÀÀµ¿ªÔ´×é¼þ£¬£¬£¬Æ½¾ùÓп¿½ü700¸öÒÀÀµÏ£¬£¬JavaScriptÖÐÓÐ94£¥µÄ¿ªÔ´ÒÀÀµ¹ØÏµ£¬£¬£¬¶øRubyºÍ.NETÖÐÓÐ90£¥µÄ¿ªÔ´ÒÀÀµ¹ØÏµ¡£¡£ ¡£¡£±ðµÄ£¬£¬£¬¿ªÔ´Èí¼þÖеĴó´ó¶¼Îó²î²¢²»ÊǶñÒâµÄ£¬£¬£¬Ïà·´£¬£¬£¬GitHub·¢³öµÄCVE¾¯±¨ÖÐÓÐ83£¥µÄÎó²îÊÇÓÉÈËΪ¹ýʧÒýÆðµÄ¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://octoverse.github.com/