ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ48ÖÜ
Ðû²¼Ê±¼ä 2019-12-09>±¾ÖÜÇ徲̬ÊÆ×ÛÊö
2019Äê12ÔÂ02ÈÕÖÁ08ÈÕ¹²ÊÕ¼Çå¾²Îó²î48¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇGoogle Kubernetes APIÖض¨ÏòÎó²î; D-Link DAP-1860ÏÂÁî×¢Èë´úÂëÖ´ÐÐÎó²î£»OpenBSDÑéÖ¤ÈƹýÎó²î£»Apache Olingo AbstractService ObjectInputStream·´ÐòÁл¯´úÂëÖ´ÐÐÎó²î£»Mozilla Firefox ESR worker destructionÄÚ´æ¹ýʧÒýÓÃÎó²î¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÅ·ÖÞÍøÂçÇå¾²¾ÖÐû²¼º£Ê²¿·ÖÍøÂçÇå¾²Ö¸ÄÏ£»AndroidÎó²îStrandHogg¿Éαװ³Éí§ÒâÓ¦Óã»GoAhead Web·þÎñÆ÷RCEÎó²îÓ°Ïì´ó×ÚIoT×°±¸£»Autodesk¡¢Ç÷ÊƿƼ¼¼°¿¨°Í˹»ùÆØDLLЮÖÆÎó²î£»PCI SSCÐû²¼·Ç½Ó´¥Ê½Ö§¸¶µÄÐÂÊý¾ÝÇå¾²±ê×¼¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬±¾ÖÜÇå¾²ÍþвΪÖС£
>Ö÷ÒªÇå¾²Îó²îÁбí
1. Google Kubernetes APIÖض¨ÏòÎó²î
Google Kubernetes API serverûÓÐ׼ȷÑéÖ¤URLµÄÖض¨Ïò£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬽«API·þÎñÆ÷ÇëÇóÖض¨Ïòµ½í§ÒâÖ÷»ú¡£
https://github.com/kubernetes/kubernetes/issues/85867
2. D-Link DAP-1860ÏÂÁî×¢Èë´úÂëÖ´ÐÐÎó²î
D-Link DAP-1860 HNAP_TIMEºÍSOAPAction±£´æÏÂÁî×¢ÈëÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉÖ´ÐÐí§Òâ´úÂë¡£
https://chung96vn.wordpress.com/2019/11/15/d-link-dap-1860-vulnerabilities/
3. OpenBSDÑéÖ¤ÈƹýÎó²î
OpenBSDÑé֤ϵͳ±£´æÇå¾²Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇóÓû§Ãû£¬Èç"-option"»ò"-schallenge"£¬ÈƹýÇå¾²ÏÞÖÆ£¬Î´ÊÚȨ»á¼ûϵͳ¡£
https://packetstormsecurity.com/files/155572/Qualys-Security-Advisory-OpenBSD-Authentication-Bypass-Privilege-Escalation.html
4. Apache Olingo AbstractService ObjectInputStream·´ÐòÁл¯´úÂëÖ´ÐÐÎó²î
Apache Olingo AbstractService ObjectInputStream±£´æ·´ÐòÁл¯Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉÖ´ÐÐí§Òâ´úÂë¡£
https://mail-archives.apache.org/mod_mbox/olingo-user/201912.mbox/%3CCAGSZ4d4vbSYaVh3aUWAvcVHK2qcFxxCZd3WAx3xbwZXskPX8nw%40mail.gmail.com%3E
5. Mozilla Firefox ESR worker destructionÄÚ´æ¹ýʧÒýÓÃÎó²î
Mozilla Firefox ESR worker destruction±£´æÄÚ´æ¹ýʧÒýÓÃÁ½´ÎÊÍ·ÅÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄWEBÇëÇó£¬ÓÕʹÓû§ÆÊÎö£¬¿ÉʹӦÓóÌÐò±ÀÀ£»òÖ´ÐÐí§Òâ´úÂë¡£
https://www.auscert.org.au/bulletins/ESB-2019.4555/
>Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢Å·ÖÞÍøÂçÇå¾²¾ÖÐû²¼º£Ê²¿·ÖÍøÂçÇå¾²Ö¸ÄÏ
Å·ÖÞÍøÂçÇå¾²¾Ö£¨ENISA£©ÒÔ¡¶¿Ú°¶ÍøÂçÇå¾²-º£Ê²¿·ÖÍøÂçÇ徲ʵ¼ù¡·ÎªÌâÐû²¼Á˺£Ê²¿·ÖÍøÂçÇå¾²Ö¸ÄÏ£¬Îª¿Ú°¶Éú̬ϵͳÓÈÆäÊÇ¿Ú°¶Õþ¸®ºÍÂëÍ·ÔËÓªÉÌÖеÄCIOºÍCISOÖƶ©ÍøÂçÇå¾²Õ½ÂÔÌṩָµ¼ºÍ×ÊÖú¡£¸ÃÖ¸ÄÏÁгöÁË¿Ú°¶Éú̬ϵͳÃæÁÙµÄÖ÷ÒªÍþв£¬²¢ÐÎòÁË¿ÉÄܶԿڰ¶Éú̬ϵͳÔì³ÉÓ°ÏìµÄÒªº¦ÍøÂç¹¥»÷³¡¾°¡£¸ÃÖ¸ÄÏΪÖն˱£»¤ºÍÉúÃüÖÜÆÚÖÎÀí¡¢Îó²îÖÎÀí¡¢ÈËÁ¦×ÊÔ´Çå¾²¡¢¹©Ó¦Á´ÖÎÀíµÈÉè¼ÆÁËÇå¾²²½·¥¡£
ÔÎÄÁ´½Ó£º
https://www.enisa.europa.eu/publications/port-cybersecurity-good-practices-for-cybersecurity-in-the-maritime-sector/
2¡¢AndroidÎó²îStrandHogg¿Éαװ³Éí§ÒâÓ¦ÓÃ
PromonÇå¾²Ñо¿Ö°Ô±·¢Ã÷Ò»¸öеÄAndroidÎó²îStrandHogg£¬¸ÃÎó²îÔÊÐí¶ñÒâÓ¦ÓÃαװ³Éí§ÒâÕýµ±Ó¦Ó᣸ÃÎó²îʹÓÃÁËAndroidµÄ¶àʹÃü´¦Öóͷ£¹¦Ð§£¬µ±Óû§µã»÷Ò»¸öÕý³£Ó¦ÓõÄͼ±êʱ£¬¶ñÒâÓ¦ÓÿÉÒÔʹÓøÃÎó²î×èµ²Ö¸Áî²¢ÏòÓû§ÏÔʾһ¸öÐéαµÄ½çÃ棬´Ó¶øÓÕµ¼Óû§ÊÚÓèÖÖÖÖȨÏÞ¡£Ñо¿Ö°Ô±ÒѾ·¢Ã÷ÁË36¸öÕýÔÚÆð¾¢Ê¹ÓôËÎó²îµÄ¶ñÒâÓ¦Ó㬰üÀ¨ÒøÐÐľÂíBankBot¡£Ñо¿Ö°Ô±³Æ¸ÃÎó²îµÄÓ°Ïì¹æÄ£ºÜÊÇ´ó£¬ÓÉÓÚĬÈÏÇéÐÎÏ´ó´ó¶¼Ó¦Óö¼Ò×Êܹ¥»÷£¬²¢ÇÒÏÖÔÚûÓпɿ¿µÄÒªÁìÀ´Ì½²â»ò×èÖ¹ÕâÖÖ¹¥»÷¡£¹È¸èÉÐδÔÚÈκΰ汾µÄAndroidÉÏÐÞ¸´´ËÎÊÌâ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/actively-exploited-strandhogg-vulnerability-affects-android-os/
3¡¢GoAhead Web·þÎñÆ÷RCEÎó²îÓ°Ïì´ó×ÚIoT×°±¸
˼¿ÆTalosµÄÇ徲ר¼ÒÔÚGoAheadǶÈëʽWeb·þÎñÆ÷Öз¢Ã÷ÁËÁ½¸öÎó²î£¬ÆäÖаüÀ¨Ò»¸öÒªº¦µÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2019-5096£©¡£¸ÃÎó²îÓëGoAhead´¦Öóͷ£multi-part/form-dataÇëÇóµÄ·½·¨Óйأ¬Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉʹÓøÃÎó²î´¥·¢use-after-free£¬²¢Í¨¹ý·¢ËͶñÒâHTTPÇëÇóÔÚ·þÎñÆ÷ÉÏÖ´ÐÐí§Òâ´úÂë¡£µÚ¶þ¸öÎó²î£¨CVE-2019-5097£©±£´æÓÚͳһ×é¼þÖУ¬¿Éµ¼Ö¾ܾø·þÎñ¹¥»÷¡£ÊÜÓ°ÏìµÄ°æ±¾°üÀ¨v5.0.1¡¢v.4.1.1ºÍv3.6.5¡£Æ¾Ö¤ShodanµÄËÑË÷Ч¹û£¬Ì»Â¶ÔÚ¹«ÍøÉϵÄGoAhead·þÎñÆ÷ÊýÄ¿ÒÑÁè¼Ý130Íò¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2019/12/goahead-web-server-hacking.html
4¡¢Autodesk¡¢Ç÷ÊƿƼ¼¼°¿¨°Í˹»ùÆØDLLЮÖÆÎó²î
SafeBreach LabsÑо¿Ö°Ô±Åû¶Autodesk¡¢Ç÷ÊƿƼ¼ºÍ¿¨°Í˹»ùÈí¼þÖеÄDLLЮÖÆÎó²î¡£Ç÷ÊƿƼ¼Çå¾²Èí¼þ16.0.1221¼°ÒÔÏ°汾Êܵ½CVE-2019-15628Ó°Ï죬¸ÃÎó²î±£´æÓÚcoreServiceShell.exe×é¼þÖС£ÓÉÓÚδ¶Ô¼ÓÔصÄDLLÊðÃû¾ÙÐÐÑéÖ¤£¬Òò´Ë¹¥»÷Õ߿ɼÓÔغÍÖ´ÐÐí§ÒâDLL£¬µ¼Ö°×Ãûµ¥Èƹý¡¢»ñµÃ³¤ÆÚÐÔ¡¢Ìӱܼì²âÒÔ¼°Ç±ÔÚµÄÌØȨÉý¼¶µÈ¡£Kaspersky Secure ConnectionºÍAutodesk×ÀÃæÓ¦ÓÃÒ²»®·ÖÊܵ½ÀàËƵÄÎó²îCVE-2019-15689ºÍCVE-2019-7365µÄÓ°Ïì¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/researchers-disclose-bugs-in-autodesk-trend-micro-kaspersky-software/
5¡¢PCI SSCÐû²¼·Ç½Ó´¥Ê½Ö§¸¶µÄÐÂÊý¾ÝÇå¾²±ê×¼
PCIÇå¾²±ê׼ίԱ»á£¨PCI SSC£©Ðû²¼ÁËÓÃÓڷǽӴ¥Ê½Ö§¸¶µÄÐÂÊý¾ÝÇå¾²±ê×¼¡£¸Ã±ê×¼ÔÊÐí´øÓÐNFCµÄCOTSÒƶ¯×°±¸½ÓÊܷǽӴ¥Ê½Ö§¸¶¡£PCI CPoC±ê×¼ÊǸÃίԱ»áΪ½â¾öÒƶ¯·Ç½Ó´¥Ê½Ö§¸¶Ðû²¼µÄµÚ¶þ¸ö±ê×¼¡£ÏêϸÀ´Ëµ£¬PCI CPoC±ê×¼»®¶¨Á˹©Ó¦ÉÌÔÚ±£»¤Êý¾Ý¡¢²âÊÔÒªÇóºÍÆÀ¹À½â¾ö¼Æ»®·½ÃæµÄһЩÇå¾²ÉϵÄÒªÇó¡£±ê×¼µÄCPoC½â¾ö¼Æ»®°üÀ¨¾ßÓÐǶÈëʽNFC½Ó¿ÚµÄCOTS×°±¸¡¢ÂÄÀúÖ¤µÄ¸¶¿îÈí¼þÒÔ¼°×ÔÁ¦ÓÚCOTS×°±¸µÄºó¶Ëϵͳ¡£
ÔÎÄÁ´½Ó£º
https://cyware.com/news/new-data-security-standards-published-for-contactless-payments-12566cb1