ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ50ÖÜ
Ðû²¼Ê±¼ä 2019-12-23>±¾ÖÜÇ徲̬ÊÆ×ÛÊö
2019Äê12ÔÂ16ÈÕÖÁ22ÈÕ¹²ÊÕ¼Çå¾²Îó²î47¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇApache Log4j·´ÐòÁл¯´úÂëÖ´ÐÐÎó²î; Citrix Application Delivery Controllerí§Òâ´úÂëÖ´ÐÐÎó²î£»TRENDnet TEW-651BR»º³åÇøÒç³ö´úÂëÖ´ÐÐÎó²î£»Google Chrome media pickerÄÚ´æ¹ýʧÒýÓÃÎó²î£»Joomla! configuration SQL×¢ÈëÎó²î¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇ¿¨°Í˹»ùÐû²¼2019ÄêÍøÂçÍþвµÄͳ¼ÆÊý¾Ý±¨¸æ£»ÃÀ¹úÖÚÒéԺͨ¹ý¡¶°ü¹ÜÄÜÔ´»ù´¡ÉèÊ©·¨°¸¡·£»LightInTheBoxй¶1.3TB Web·þÎñÆ÷ÈÕÖ¾£»MacÍþв¼ì²âÊýÄ¿ÔÚ2019Äê³ÊÉÏÉýÇ÷ÊÆ£»Gangnam Industrial StyleÃé×¼Êý°Ù¼Ò¹¤Òµ¹«Ë¾¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬±¾ÖÜÇå¾²ÍþвΪÖС£
>Ö÷ÒªÇå¾²Îó²îÁбí
1. Apache Log4j·´ÐòÁл¯´úÂëÖ´ÐÐÎó²î
Apache Log4j±£´æSocket Server·´ÐòÁл¯Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£
https://vigilance.fr/vulnerability/Apache-Log4j-1-2-code-execution-via-Socket-Server-Deserialization-31193
2. Citrix Application Delivery Controllerí§Òâ´úÂëÖ´ÐÐÎó²î
Citrix Application Delivery Controller±£´æδÃ÷Çå¾²Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉÖ´ÐÐí§Òâ´úÂë¡£
https://www.auscert.org.au/bulletins/ESB-2019.4708/
3. TRENDnet TEW-651BR»º³åÇøÒç³ö´úÂëÖ´ÐÐÎó²î
TRENDnet TEW-651BR 'ccp_act'²ÎÊý´¦Öóͷ£±£´æ»º³åÇøÒç³öÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄ'get_set.ccp' POSTÇëÇ󣬿ÉʹӦÓóÌÐò±ÀÀ£»òÖ´ÐÐí§Òâ´úÂë¡£
https://github.com/pr0v3rbs/CVE/tree/master/CVE-2019-11400
4. Google Chrome media pickerÄÚ´æ¹ýʧÒýÓÃÎó²î
Google Chrome media picker±£´æÊͷźóʹÓÃÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄWEBÇëÇó£¬ÓÕʹÓû§ÆÊÎö£¬¿ÉʹӦÓóÌÐò±ÀÀ£»òÖ´ÐÐí§Òâ´úÂë¡£
https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop_17.html
5. Joomla! configuration SQL×¢ÈëÎó²î
Joomla! configuration²ÎÊý´¦Öóͷ£±£´æÊäÈëÑéÖ¤Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄSQLÇëÇ󣬲Ù×÷Êý¾Ý¿â£¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»òÖ´ÐÐí§Òâ´úÂë¡£
https://www.auscert.org.au/bulletins/ESB-2019.4713/
>Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢¿¨°Í˹»ùÐû²¼2019ÄêÍøÂçÍþвµÄͳ¼ÆÊý¾Ý±¨¸æ
¿¨°Í˹»ùÐû²¼2019ÄêÍøÂçÍþвͳ¼ÆÊý¾Ý±¨¸æ£¬¸Ã±¨¸æÊÇ»ùÓÚ2018Äê11Ôµ½2019Äê10ÔÂʱ´ú´ÓÈ«Çò203¸ö¹ú¼ÒºÍµØÇøµÄKSNÓû§ÍøÂçµÄ¶ñÒâÔ˶¯Êý¾Ý¡£ÔÚ±¨¸æʱ´ú£¬ÓÐ19.8%µÄÓû§ÅÌËã»úÖÁÉÙÔâÊÜÒ»´Î¶ñÒâÈí¼þÀà±ðµÄÍøÂç¹¥»÷¡£¿¨°Í˹»ùÇå¾²½â¾ö¼Æ»®×èÖ¹ÁËÀ´×ÔÈ«ÇòÔÚÏß×ÊÔ´µÄ9.7Òڴι¥»÷¡£Web·´²¡¶¾×é¼þʶ±ð³ö2.7ÒÚ¸ö²î±ðµÄ¶ñÒâURL¡£ÍøÂç·À²¡¶¾Èí¼þ¼ì²âµ½2461Íò¸ö²î±ðµÄ¶ñÒâÑù±¾¡£75.5Íò¸öÓû§ÅÌËã»úÔâµ½ÀÕË÷Èí¼þ¹¥»÷¡£226ÍòÓû§ÅÌËã»úÔâµ½¶ñÒâÍÚ¿ó¹¥»÷¡£¿¨°Í˹»ùÇå¾²½â¾ö¼Æ»®ÔÚ76.6Íǫ̀װ±¸ÉÏ×èÖ¹ÁËÕë¶ÔÔÚÏßÒøÐÐÕË»§µÄ¶ñÒâÈí¼þ¹¥»÷¡£
ÔÎÄÁ´½Ó£º
https://securelist.com/kaspersky-security-bulletin-2019-statistics/95475/
2¡¢ÃÀ¹úÖÚÒéԺͨ¹ý¡¶°ü¹ÜÄÜÔ´»ù´¡ÉèÊ©·¨°¸¡·
Ëæ×Å2020Ä꡶¹ú·ÀÊÚȨ·¨¡·£¨NDAA£©µÄͨ¹ý£¬ÃÀ¹úÖÚÒéԺҲͨ¹ýÁË¡¶°ü¹ÜÄÜÔ´»ù´¡ÉèÊ©·¨°¸¡·¡£¸Ã·¨°¸½«ÔÚÃÀ¹úÄÜÔ´²¿¹ú¼ÒʵÑéÊÒÄÚ½¨ÉèÒ»¸öΪÆÚÁ½ÄêµÄÊÔµãÍýÏ룬ÆäÄ¿µÄÊÇ·¢Ã÷ÄÜÔ´²¿·ÖʵÌå»ú¹¹ÖеÄÇå¾²Îó²îºÍ¸ôÀëÒªº¦µÄµçÍøϵͳ¡£ÆÀ¹ÀµÄÊÖÒպͱê×¼°üÀ¨Ä£ÄâºÍ·ÇÊý×Ö¿ØÖÆϵͳ¡¢×¨ÓÿØÖÆϵͳºÍÎïÀí¿ØÖƼƻ®¡£¸Ã·¨°¸»¹ÒªÇó½¨ÉèÒ»¸öÊÂÇé×飬ÆäʹÃüÊÇÆÊÎö¹ú¼ÒʵÑéÊÒÌá³öµÄ½â¾ö¼Æ»®£¬²¢Öƶ©Ò»Ïî±£»¤ÄÜÔ´ÍøµÄ¹ú¼ÒÕ½ÂÔ¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/bill-protect-us-energy-grid-cyberattacks-passes-ndaa
3¡¢LightInTheBoxй¶1.3TB Web·þÎñÆ÷ÈÕÖ¾
vpnMentorÑо¿Ö°Ô±·¢Ã÷ÔÚÏßÁãÊÛÉÌLightInTheBoxµÄElasticsearchÊý¾Ý¿â¿É¹ûÕæ»á¼û£¬ÆäÖаüÀ¨1.3TB Web·þÎñÆ÷ÈÕÖ¾¡£LightInTheBoxרעÓÚСÅä¼þ¡¢´ò°çºÍÅäÊεÄÏúÊÛ£¬Æä´ó²¿·Ö¿Í»§Î»ÓÚ±±ÃÀºÍÅ·ÖÞ¡£Ñо¿Ö°Ô±ÔÚ11ÔÂÏÂÑ®·¢Ã÷Á˸ÃÊý¾Ý¿â£¬Êý¾Ý¿âÖеļͼ×ܼÆÁè¼Ý15ÒÚÌõ£¬»¹°üÀ¨Æä×ÓÍøÕ¾MiniInTheBox.comµÄÊý¾Ý¡£ÈÕÖ¾°üÀ¨8ÔÂ9ÈÕÖÁ10ÔÂ11ÈÕÖ®¼äµÄÍøÕ¾Ô˶¯£¬°üÀ¨µç×ÓÓʼþµØµã¡¢IPµØµã¡¢ÆÜÉí¹ú¼Ò/µØÇøÒÔ¼°Ã¿¸ö·Ã¿Í»á¼ûµÄÒ³ÃæµÈÐÅÏ¢¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/95231/data-breach/lightinthebox-data-leak.html
4¡¢MacÍþв¼ì²âÊýÄ¿ÔÚ2019Äê³ÊÉÏÉýÇ÷ÊÆ
ƾ֤MalwarebytesµÄ×îб¨¸æ£¬MacÍþв¼ì²âÊýÄ¿ÔÚ2019Äê³ÊÉÏÉýÇ÷ÊÆ¡£Ö»¹Ü¹Å°å¿´·¨ÒÔΪMacÊܵ½µÄѬȾҪ±ÈWindows PCÉٵö࣬µ«2019ÄêMalwarebytesµÄÒ£²âÊý¾ÝÅú×¢MacÍþв¼ì²âÊýÄ¿·ºÆðÁ˾ªÈ˵ÄÉÏÉýÇ÷ÊÆ¡£ÔÚËùÓÐƽ̨£¨Windows PC¡¢MacºÍAndroid£©ÉϵÄÍþв¼ì²âÅÅÐаñ£¨Top25£©ÖУ¬ÓÐ6¸öÊÇMacÍþв£¬×ÜÌå¶øÑÔ£¬MacÍþвռ×ܼìÕÉÁ¿µÄ16£¥ÒÔÉÏ¡£Ë¼Á¿µ½MalwarebytesµÄMacÓû§ÈºÔ¼ÄªÊÇWindowsÓû§ÈºµÄ1/12£¬ÕâÒ»Êý×ÖÔ½·¢ÏÔ×Å¡£ÔÚ2019Äêµ¥¸öÅÌËã»úÉϵÄÍþв¼ì²âÊýÄ¿ÖУ¬Windows PCΪƽ¾ù4.2´Î£¬¶øMacÓû§ÎªÆ½¾ù9.8´Î£¬ÊÇWindowsÓû§µÄÁ½±¶¡£
ÔÎÄÁ´½Ó£º
https://blog.malwarebytes.com/mac/2019/12/mac-threat-detections-on-the-rise-in-2019/
5¡¢Gangnam Industrial StyleÃé×¼Êý°Ù¼Ò¹¤Òµ¹«Ë¾
CyberXÍþвÑо¿Ð¡×éSection 52Åû¶Ö÷ÒªÕë¶Ô¹¤Òµ¡¢¹¤³ÌºÍÖÆÔìÆóÒµµÄAPT¹¥»÷Ô˶¯£¬¸Ã¹¥»÷ÍŻﱻ³ÆΪGangnam Industrial Style£¬ÏÖÔÚÒÑÓÐÖÁÉÙ200¼Ò¹«Ë¾³ÉΪÊܺ¦Õß¡£Ö»¹Ü´ó´ó¶¼Êܺ¦ÕßλÓÚº«¹ú£¬µ«°üÀ¨ÈÕ±¾¡¢Ó¡¶ÈÄáÎ÷ÑÇ¡¢ÍÁ¶úÆä¡¢µÂ¹ú¡¢¶ò¹Ï¶à¶ûºÍÓ¢¹úÔÚÄÚµÄÐí¶à¹ú¼ÒµÄ¹«Ë¾¶¼Êܵ½Ó°Ïì¡£¹¥»÷ÕßÖ÷Ҫͨ¹ý´¹ÂÚÓʼþÌᳫ¹¥»÷£¬ÕâЩÓʼþµÄÖ÷Ìâ/¸½¼þÓ빤ҵÓйأ¬°üÀ¨°×ƤÊé¡¢µç³§Ê¾ÒâͼÒÔ¼°¶ÔÉè¼ÆÉèÊ©£¨Èç×ÔÈ»Æø´¦Öóͷ£ºÍÉú²ú×°Ö㩵ı¨¼ÛÇëÇóµÈ¡£¹¥»÷ÕßʹÓõĶñÒâÈí¼þÖ÷ҪΪSeparµÄ±äÖÖ£¬Separ¿ÉÇÔÈ¡Firefox¡¢ChromeºÍSafari´æ´¢µÄÃÜÂëÒÔ¼°´ÓGmail¡¢Yahoo¡¢Windows LiveºÍHotmailÖÐÇÔÈ¡ÓʼþÕË»§µÄƾ֤¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/south-korean-industrial-giants-slammed-in-new-info-stealing-hacker-campaign/