¾ÅÓÎÀÏ¸ç¿Æ¼¼ÍþвÇ鱨Öܱ¨-2020ÄêµÚ5ÖÜ£¨2020.1.27-2020.2.02£©
2020-02-02
Ò»¡¢ Íþвͨ¸æ
FusionAuthÔ¶³Ì´úÂëÖ´ÐÐÎó²î
¡¾Ðû²¼Ê±¼ä¡¿2020-02-03 11:00:00 GMT
¡¾¸ÅÊö¡¿
±±¾©Ê±¼ä1ÔÂ28ÈÕ£¬NVDÐû²¼ÁËÒ»¸öFusionAuth±£´æApacheFreemarkerÄ£°åÔ¶³ÌÏÂÁîÖ´ÐУ¨CVE-2020-7799£©µÄÎó²î£»·¢Ã÷ÔÚFusionAuthÖоÓÉÉí·ÝÑéÖ¤µÄÓû§¿ÉÒԱ༵ç×ÓÓʼþÄ£°å(Home->Settings->EmailTemplates)»òÖ÷Ìâ(Home->Settings->Themes)£¬´Ó¶øÍ¨¹ý´¦Öóͷ£×Ô½ç˵ģ°åµÄApache FreeMarkerÒýÇæÖеÄfreemarker.template.utility.ExecuteÔڵײã²Ù×÷ϵͳÉÏÖ´ÐÐí§ÒâÏÂÁî¡£
¡¾Á´½Ó¡¿
http://blog.nsfocus.net/cve-2020-7799/
¶þ¡¢ °µÍøÇ鱨
|
·ÖÀà |
·¢Ã÷ʱ¼ä |
°µÍøÉúÒâÎÊÌâ |
|
½ðÈÚ |
2020/02/02 22:38 |
19Äê8ÔÂÖÁ11ÔÂÄ³Ö¤È¯ÍøÕ¾»áÔ±ÐÅÏ¢ |
|
½ðÈÚ |
2020/02/02 14:20 |
218wÌìϹÉÃñ»ùÃñÊý¾Ý |
|
½ðÈÚ |
2020/02/03 02:30 |
ÑØº£Å¶¼»á¹ÉÃñÊý¾Ý10W |
| ½ðÈÚ | 2020/02/02
23:23 |
19Äê98000ÌõÄ³ÒøÐÐÐÅÓÿ¨Óû§ÏêϸÐÅÏ¢ |
*¸ü¶àÏêϸÄÚÈÝ£¬¿ÉÓë¾ÅÓÎÀÏ¸ç¿Æ¼¼ÉÌÎñÖ°Ô±ÁªÏµ»òͨ¹ýcsc@nsfocus.comÓëÎÒÃÇÁªÏµ
Èý¡¢ ÈÈÃÅ×ÊѶ
1. EmotetľÂíʹÓÃÐÂÐ͹Ú×´²¡¶¾Ö÷ÌâÓʼþÈö²¥
¡¾¸ÅÊö¡¿
×î½üEmotetľÂíµÄÔ˶¯ÓÐËùÔöÌí£¬Ëüͨ¹ýÓÕµ¼Óû§·¿ª¶ñÒâµç×Ó¸½¼þÎĵµÀ´ÊµÏÖÈö²¥£¬¸½¼þÖ÷ÌâÐÎòΪÓйØÐÂÐ͹Ú×´²¡¶¾Ô¤·À²½·¥µÄ֪ͨ£¬¹¥»÷Ô˶¯Õë¶ÔÈÕ±¾Óû§¡£
¡¾²Î¿¼Á´½Ó¡¿
https://exchange.xforce.ibmcloud.com/collection/18f373debc38779065a26f1958dc260b
2. Konni×é֯ʹÓÃCARROTBALLÕë¶ÔÃÀ¹úÕþ¸®»ú¹¹
¡¾¸ÅÊö¡¿
½üÆÚ·¢Ã÷Ò»ÖÖеĶñÒâÈí¼þCARROTBALL±»ÓÃÓÚ¶¨Ïò¹¥»÷Ô˶¯ÖУ¬¶ñÒâÈí¼þͨ¹ýÓã²æÊ½´¹ÂÚÓʼþ¸½¼þ·Ö·¢¸øÃÀ¹úÕþ¸®»ú¹¹ºÍÓ볯ÏÊÎÊÌâÏà¹ØµÄרҵÈËÊ¿£¬Ö÷ÌâÎ§ÈÆ³¯ÏÊÕý¾ÙÐеĵØÔµÕþÖÎÎÊÌâÓÕµ¼Êܺ¦Õß·¿ª¡£´Ë´Î¹¥»÷Ô˶¯ÒÉËÆÓÉKonni×éÖ¯Ìᳫ£¬¸Ã×éÖ¯ÊÇÒ»¸öÓ뺫¹úÓйصÄÍþв×éÖ¯¡£
¡¾²Î¿¼Á´½Ó¡¿
https://unit42.paloaltonetworks.com/the-fractured-statue-campaign-u-s-government-targeted-in-spear-phishing-attacks/
3. Winnti×éÖ¯Õë¶ÔÏã¸Û¸ßУ
¡¾¸ÅÊö¡¿
2019Äê11Ô·¢Ã÷WinntiÕë¶ÔÁ½ËùÏã¸Û´óѧÌᳫÐµĹ¥»÷Ô˶¯£¬¹¥»÷Ô˶¯Öз¢Ã÷ShadowPadºóÃŵÄбäÖÖ£¬ËüʹÓÃÐÂµÄÆô¶¯Æ÷°²ÅŲ¢Ç¶ÈëÐí¶àÄ£¿é¡£WinntiÊÇÒ»¸öÓëÖйúÓйصÄÍþв×éÖ¯£¬ÖÁÉÙ×Ô2010ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬¸Ã×éÖ¯Ö÷ÒªÕë¶ÔÓÎÏ·ÐÐÒµ£¬µ«Ò²Ò»Ö±À©´óÆä¶¨Î»¹æÄ£¡£
¡¾²Î¿¼Á´½Ó¡¿
https://www.welivesecurity.com/2020/01/31/winnti-group-targeting-universities-hong-kong/
4. xHuntÔ˶¯£º¼ÌÐøÕë¶Ô¿ÆÍþÌØµÄË®¿Ó¹¥»÷Ô˶¯
¡¾¸ÅÊö¡¿
×î½ü·¢Ã÷µ½Ò»¸ö¿ÆÍþÌØÕþ¸®×éÖ¯µÄÍøÕ¾±»Ö²ÈëÁ˶ñÒâ´úÂ룬ÒÔÊÔÍ¼ÍøÂçÍøÕ¾»á¼ûÕߵĵǼƾ֤£¬¸ÃÍøÕ¾×Ô2019Äê5ÔÂÖÁ2020Äê1ÔÂʱ´ú£¬ÒýÓÃÁËHisokaÔ˶¯Ïà¹ØC2·þÎñÆ÷ÉÏÍйܵÄͼÏñ£¬¹¥»÷ÕßÒÔÊÔͼ´ÓÍøÒ³µÄ»á¼ûÕßÄÇÀïÒÔNTLMÉ¢ÁеÄÐÎʽ±»¶¯µØ»ñÈ¡ÕÊ»§Æ¾Ö¤¡£
¡¾²Î¿¼Á´½Ó¡¿
https://unit42.paloaltonetworks.com/xhunt-campaign-new-watering-hole-identified-for-credential-harvesting/
5. AggahÔ˶¯£ºÕë¶ÔÒâ´óÀûÁãÊÛÐÐÒµ
¡¾¸ÅÊö¡¿
Õë¶ÔÒâ´óÀûÁãÊÛÐÐÒµµÄ¹¥»÷Ô˶¯½üÆÚ±»·¢Ã÷£¬¹¥»÷»ùÓÚÕýµ±µÄµÚÈý·½·þÎñ¹¹½¨ÁË×Ô½ç˵µÄstagerÖ²Èë³ÌÐò£¬Ô˶¯Öзַ¢µÄ¶ñÒâÈí¼þ°üÀ¨AZOrultºÍLokibotľÂí±äÖÖ£¬ÆäÖÐAZOrult¶ñÒâÈí¼þÖ÷ÒªÕë¶ÔÃÀ¹ú¡¢°¢À²®ÍŽáÇõ³¤¹úÒÔ¼°°Í»ù˹̹¡¢µÂ¹úºÍÒÔÉ«ÁеÄÉÙÁ¿Êܺ¦Õߣ¬¶øLokibotÊÇÖÚËùÖÜÖªµÄÐÅÏ¢ÇÔÈ¡Æ÷¡£
¡¾²Î¿¼Á´½Ó¡¿
https://blog.yoroi.company/research/aggah-how-to-run-a-botnet-without-renting-a-server-for-more-than-a-year/
6. Áè¼Ý20Íò¸öWordpressÍøÕ¾ÔâÊܺڿ͹¥»÷
¡¾¸ÅÊö¡¿
ÓÉÓÚCode Snippets²å¼þÖб£´æÑÏÖØµÄ¿çÕ¾µãÇëÇóαÔ죨CSRF£©Îó²îCVE-2020-8417£¬Áè¼Ý20Íò¸öWordPressÍøÕ¾Êܵ½¹¥»÷¡£Code Snippets²å¼þÔÊÐíÓû§Ö´ÐдúÂ룬¶øÎÞÐèÔÚÆäÖ÷ÌâµÄfunctions.phpÎļþÖÐÌí¼Ó×Ô½ç˵Ƭ¶Ï¡£
¡¾²Î¿¼Á´½Ó¡¿
https://securityaffairs.co/wordpress/97037/hacking/code-snippets-plugin-csrf-flaw.html

¾ÅÓÎÀϸçÔÆ





