ÐÅÏ¢°²È«Öܱ¨-2020ÄêµÚ49ÖÜ

°ä²¼¹¦·ò 2020-12-08

> ±¾Öܰ²È«Ì¬ÊÆ×ÛÊö


2020Äê11ÔÂ30ÈÕÖÁ12ÔÂ06ÈÕ¹²ÊÕ¼°²È«·ì϶50¸ö£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇZeroshell cgi-bin kerbynet StartSessionSubmit×¢Èë·ì϶£»Western Digital My Cloud OS devicesÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶£»SourceCodester Car Rental Management System SQL×¢Èë·ì϶£»Crux Linux Docker images root¿ÕÃÜÂë·ì϶£»HPE Edgeline Infrastructure ManagerÔ¶³Ì´úÂëÖ´Ðзì϶¡£ ¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇоƬ³§ÉÌAdvantechϰȾConti£¬£¬£¬±»ÀÕË÷1300ÍòÃÀÔª£»Carding Action 2020Ðж¯ÆÆ»ñһ·´ó¹æÄ£Ú¿Æ­°¸¼þ£»Cisco TalosÅû¶WebKitÖжà¸öÑÏÖØµÄ·ì϶£»×êÑÐÍŶӷ¢ÏÖ½©Ê¬ÍøÂçXantheÀûÓÃDockerAPIϰȾLinux£»GitHub°ä²¼2020Äê¶ÈOctoverseÌ¬ÊÆµÄ·ÖÎö»ã±¨¡£ ¡£¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬£¬£¬±¾Öܰ²È«ÍþвΪÖС£ ¡£¡£


ÖØÒª°²È«·ì϶Áбí


1.Zeroshell cgi-bin kerbynet StartSessionSubmit×¢Èë·ì϶


Zeroshell cgi-bin kerbynet StartSessionSubmit´æÔÚÊäÈëÑéÖ¤·ì϶£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬£¬¿É×¢ÈëËÁÒâºÅÁî²¢Ö´ÐС£ ¡£¡£

https://blog.quake.so/post/zeroshell_linux_router_rce/


2.Western Digital My Cloud OS devicesÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶


Western Digital My Cloud OS devicesÖÎÀíÆ½Ì¨´æÔÚÑéÖ¤ÈÆ¹ý·ì϶£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬£¬Äܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâºÅÁî¡£ ¡£¡£

https://www.westerndigital.com/support/productsecurity/wdc-20009-os5-firmware-5-06-115


3.SourceCodester Car Rental Management System SQL×¢Èë·ì϶


Sourcecodester SourceCodester Car Rental Management System´æÔÚSQL×¢Èë·ì϶£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄSQLÒªÇ󣬣¬£¬²Ù×÷Êý¾Ý¿â£¬£¬£¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»òÖ´ÐÐËÁÒâ´úÂë¡£ ¡£¡£

https://github.com/BigTiger2020/Car-Rental-Management-System/blob/main/README.md


4.Crux Linux Docker images root¿ÕÃÜÂë·ì϶


Crux Linux Docker images´æÔÚROOT¿ÕÃÜÂë·ì϶£¬£¬£¬ÔÊÐí±¾µØ¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬£¬¿ÉÌáÉýȨÏÞ¡£ ¡£¡£

https://github.com/koharin/koharin2/blob/main/CVE-2020-29389


5.HPE Edgeline Infrastructure ManagerÔ¶³Ì´úÂëÖ´Ðзì϶


HPE Edgeline Infrastructure Manager´æÔÚ°²È«·ì϶£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬£¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐËÁÒâ´úÂë¡£ ¡£¡£

https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn04063en_us


> ÖØÒª°²È«ÊÂÎñ×ÛÊö


1¡¢¡¢¡¢Ð¾Æ¬³§ÉÌAdvantechϰȾConti£¬£¬£¬±»ÀÕË÷1300ÍòÃÀÔª


1.jpg


¹¤Òµ×Ô¶¯»¯ºÍ¹¤ÒµÎïÁªÍø£¨IIoT£©Ð¾Æ¬ÖÆ×÷ÉÌAdvantechϰȾÀÕË÷Èí¼þConti£¬£¬£¬±»ÀÕË÷750 BTC£¨Ô¼Îª12600000ÃÀÔª£©¡£ ¡£¡£AdvantechÊÇIT²úÆ·ºÍ½â¾ö¹æ»®µÄÈ«Çòµ±ÏÈÖÆ×÷ÉÌ£¬£¬£¬²úÆ·Ô̺¬Ç¶ÈëʽPC¡¢¡¢¡¢ÍøÂçÉ豸¡¢¡¢¡¢IoT¡¢¡¢¡¢·þÎñÆ÷ºÍÒ½ÁƱ£½¡½â¾ö¹æ»®¡£ ¡£¡£11ÔÂ26ÈÕ£¬£¬£¬ºÚ¿ÍÔÚÆäÐ¹Â¶ÍøÕ¾Éϰ䲼ÁË3.03GB±»µÁÊý¾ÝÖеÄ2£¥£¬£¬£¬ÒÔ¼°Ò»¸öÔ̺¬Á˱»µÁÎļþÁбíµÄÎı¾Îĵµ¡£ ¡£¡£Ä¿Ç°£¬£¬£¬Advantech¹«Ë¾ÉÐδ¶Ô´Ëʰ䷢ÆÀÂÛ¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º£º

https://www.bleepingcomputer.com/news/security/iiot-chip-maker-advantech-hit-by-ransomware-125-million-ransom/


2¡¢¡¢¡¢Carding Action 2020Ðж¯ÆÆ»ñһ·´ó¹æÄ£Ú¿Æ­°¸¼þ


2.jpg


ÍøÂ簲ȫ¹«Ë¾Group-IBÓëÅ·ÖÞµÄÐÙÑÀÀû¡¢¡¢¡¢Ó¢¹úºÍÒâ´óÀûµ±¾ÖºÏ×÷£¬£¬£¬ÌáÒéCarding Action 2020Ðж¯£¬£¬£¬ÆÆ»ñһ·´ó¹æÄ£ÐÅÓþ¿¨ÂòÂôÚ¿Æ­°¸¼þ¡£ ¡£¡£¸Ã»î¶¯Õë¶Ô¶à¸ö°µÍøÊг¡£¬£¬£¬ÔÚÐÅÓþ¿¨ÂòÂôÉ̵êºÍ°µÍøÂòÂôƽ̨ÉϲéÕÒÓëÂòÂô±»µÁ¿¨¾ßÌåÐÅÏ¢ÓйصÄڲƭÕߣ¬£¬£¬Ö¼ÔÚ¼õÇáºÍÔ¤·À½ðÈÚ»ú¹¹ºÍ³Ö¿¨ÈËÔâ·êËðʧ£¬£¬£¬Ä¿Ç°Ô¼×èÖ¹ÁË4000ÍòÅ·ÔªµÄËðʧ¡£ ¡£¡£¹ú¼ÊÐ̾¯×éÖ¯°ä·¢¿ÛÁôÁËÈýÃûÀ´×ÔÄáÈÕÀûÑǵÄÏÓÒÉÈË£¬£¬£¬¾ÝÐÅËûÃÇÊÇÒ»¸ö¹¥»÷ÁË150¸öµ±¾Ö×éÖ¯ºÍ¹«Ë¾µÄÍÅ»ïµÄ³ÉÔ±¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º£º

https://www.hackread.com/authorities-disrupt-dark-web-credit-card-trading-scam/


3¡¢¡¢¡¢Cisco TalosÅû¶WebKitÖжà¸öÑÏÖØµÄ·ì϶


3.jpg


Cisco TalosÅû¶WebKitä¯ÀÀÆ÷ÒýÇæ´æÔÚ¶à¸öÑÏÖØµÄ·ì϶¡£ ¡£¡£ÕâЩ·ì϶ÓëWebKitµÄWebSocket¡¢¡¢¡¢AudioSourceProviderGStreamerºÍImageDecoderGStreamerÖ°ÄÜÓйØ¡£ ¡£¡£±ðÀëΪWebSocket´úÂëÖ´Ðзì϶£¨CVE-2020-13543£©£¬£¬£¬¿Éͨ¹ý´¥·¢¿ªÊͺóʹÓ÷ì϶À´Ô¶³ÌÖ´ÐдúÂ룻ImageDecoderGStreamer¿ªÊͺóʹÓ÷ì϶£¨CVE-2020-13584£©£¬£¬£¬¿Éµ¼ÖÂÔ¶³ÌÖ´ÐдúÂ룬£¬£¬ÒÔ¼°±»×·×ÙΪCVE-2020-13543µÄ·ì϶¡£ ¡£¡£    


Ô­ÎÄÁ´½Ó£º£º

https://www.securityweek.com/webkit-vulnerabilities-allow-remote-code-execution-malicious-websites


4¡¢¡¢¡¢×êÑÐÍŶӷ¢ÏÖ½©Ê¬ÍøÂçXantheÀûÓÃDockerAPIϰȾLinux


4.jpg


×êÑÐÍŶӷ¢ÏÖÁËÒ»¸öÃûΪXantheµÄÃÅÂÞ±Ò¼ÓÃܽ©Ê¬ÍøÂ磬£¬£¬¿ÉÀûÓÃÅäÖÃÃýÎóµÄDocker APIÀ´Ï°È¾Linuxϵͳ¡£ ¡£¡£¸Ã¶ñÒâÈí¼þ¿ÉÀûÓöàÖÖ²½Öè½øÐд«²¼£¬£¬£¬ÈçÍøÂç¿Í»§¶ËÖ¤ÊéÒÔͨ¹ýSSH´«²¼µ½Ö¸±êÖ÷»ú¡£ ¡£¡£´ËÍ⣬£¬£¬XantheÓµÓÐËĸöÓÃÀ´Èƹý¼ì²â²¢Ôö³¤ÓƾÃÐԵĸ½¼ÓÄ£¿é£¬£¬£¬±ðÀëΪ¹ý³Ì°µ²ØÄ£¿é£¨libprocesshider.so£©£»½ûÓÃÆäËû¿ó¹¤ºÍ°²È«·þÎñµÄshell¾ç±¾£¨xesa.txt£©£»ÓÃÓÚɾ³ýDockerÈÝÆ÷ÖеľºÕùÐÔDockerÖ¸±ê¼ÓÃÜľÂíµÄshell¾ç±¾(fczyo)ºÍXMRig¶þ½øÖÆÎļþ£¨ÒÔ¼°JSONÅäÖÃÎļþconfig.json£©¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º£º

https://threatpost.com/misconfigured-docker-servers-xanthe-malware/161732/


5¡¢¡¢¡¢GitHub°ä²¼2020Äê¶ÈOctoverseÌ¬ÊÆµÄ·ÖÎö»ã±¨


5.jpg


GitHub°ä²¼ÁË2020Äê¶ÈOctoverseÌ¬ÊÆµÄ·ÖÎö»ã±¨¡£ ¡£¡£¸Ã»ã±¨ÖØÒªÍ³¼ÆÁ˳¬¹ý5600ÍòÃû¿ª·¢ÈËÔ±ÔÚ2020Äê´´½¨µÄ³¬¹ý6000Íò¸öд洢¿â¡£ ¡£¡£×êÑз¢ÏÖ£¬£¬£¬Óë2019ÄêÏà±È£¬£¬£¬´Ë¿Ì94£¥µÄÏîÄ¿ÒÀÀµ¿ªÔ´×é¼þ£¬£¬£¬¾ùÔÈÓп¿½ü700¸öÒÀÀµÏ£¬£¬JavaScriptÖÐÓÐ94£¥µÄ¿ªÔ´ÒÀÀµ¹ØÏµ£¬£¬£¬¶øRubyºÍ.NETÖÐÓÐ90£¥µÄ¿ªÔ´ÒÀÀµ¹ØÏµ¡£ ¡£¡£´ËÍ⣬£¬£¬¿ªÔ´Èí¼þÖеĴóÎÞÊý·ì϶²¢²»ÊǶñÒâµÄ£¬£¬£¬Ïà·´£¬£¬£¬GitHub·¢³öµÄCVE¾¯±¨ÖÐÓÐ83£¥µÄ·ì϶ÊÇÓɱ¨´ðÃýÎóÒýÆðµÄ¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º£º

https://octoverse.github.com/