ÐÅÏ¢Çå¾²Öܱ¨-2020ÄêµÚ45ÖÜ
Ðû²¼Ê±¼ä 2020-11-09> ±¾ÖÜÇ徲̬ÊÆ×ÛÊö
2020Äê11ÔÂ02ÈÕÖÁ11ÔÂ08ÈÕ¹²ÊÕ¼Çå¾²Îó²î61¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇAdobe Acrobat Reader CVE-2020-24435¶Ñ»º³åÇøÒç³öÎó²î£»Google Android¸ßͨ¹Ø±ÕÔ´×é¼þÔ¶³Ì´úÂëÖ´ÐÐÎó²î£»Oracle WebLogic Server Oracle Fusion Middleware ConsoleÔ¶³Ì´úÂëÖ´ÐÐÎó²î£»SaltStack Salt APIí§Òâ´úÂëÖ´ÐÐÎó²î£»Apache Shiro CVE-2020-17510ÊÚȨÈƹýÎó²î¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇHackerOneÐû²¼µÚËĽìÄê¶ÈHACKER-POWEREDÇå¾²±¨¸æ£»Pulse SecureÐû²¼ÆóÒµÍƽøÁãÐÅÍÐÍøÂçµÄÆÊÎö±¨¸æ£»GoogleÐû²¼Çå¾²¸üУ¬ÐÞ¸´ChromeÖÐÒѱ»Ê¹ÓõÄ0day£»Ë¼¿ÆÅû¶ÆäAnyConnect¿Í»§¶ËÖÐ0day£¬ÉÐÎÞÏà¹Ø²¹¶¡£»AppleÐû²¼¸üУ¬ÐÞ¸´Òѱ»Æð¾¢Ê¹ÓõÄ3¸ö0day¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬±¾ÖÜÇå¾²ÍþвΪÖС£
> Ö÷ÒªÇå¾²Îó²îÁбí
1.Adobe Acrobat Reader CVE-2020-24435¶Ñ»º³åÇøÒç³öÎó²î
Adobe Acrobat Reader´¦Öóͷ£PDFÎļþ±£´æ»º³åÇøÒç³öÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇó£¬ÓÕʹÓû§ÆÊÎö£¬¿ÉʹӦÓóÌÐò±ÀÀ£»òÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£
https://helpx.adobe.com/security/products/acrobat/apsb20-67.html
2.Google Android¸ßͨ¹Ø±ÕÔ´×é¼þÔ¶³Ì´úÂëÖ´ÐÐÎó²î
Google Android¸ßͨ¹Ø±ÕÔ´×é¼þ±£´æÇå¾²Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉʹӦÓóÌÐò±ÀÀ£»òÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£
https://source.android.com/security/bulletin/2020-11-01
3.Oracle WebLogic Server Oracle Fusion Middleware ConsoleÔ¶³Ì´úÂëÖ´ÐÐÎó²î
Oracle WebLogic Server Oracle Fusion Middleware Console±£´æÇå¾²Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄHTTPÇëÇ󣬿Éʹϵͳ±ÀÀ£»òÕßÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£
https://www.oracle.com/security-alerts/alert-cve-2020-14750.html
4.SaltStack Salt APIí§Òâ´úÂëÖ´ÐÐÎó²î
SaltStack Salt API±£´æÊäÈëÑéÖ¤Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉδÊÚȨ»á¼ûí§Òâ´úÂë¡£
https://www.auscert.org.au/bulletins/ESB-2020.3863/
5.Apache Shiro CVE-2020-17510ÊÚȨÈƹýÎó²î
Apache Shiro±£´æÊÚȨÈƹýÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉδÊÚȨ»á¼ûÓ¦Óá£
https://lists.apache.org/thread.html/rc2cff2538b683d480426393eecf1ce8dd80e052fbef49303b4f47171%40%3Cdev.shiro.apache.org%3E
> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢HackerOneÐû²¼µÚËĽìÄê¶ÈHACKER-POWEREDÇå¾²±¨¸æ
HackerOneÐû²¼µÚËĽìÄê¶ÈHACKER-POWEREDÇå¾²±¨¸æ£¬³Æ¿çÕ¾µã¾ç±¾£¨XSS£©ÊÇ×î³£¼ûµÄÎó²îÀàÐÍ£¬±È2019ÄêÔöÌíÁË134%¡£±¨¸æÏÔʾ£¬XSSÎó²îÕ¼Á˱¨¸æµÄËùÓÐÎó²îµÄ18%£¬×ܼƻñµÃÁË420ÍòÃÀÔªµÄ½±½ð(±ÈÈ¥ÄêÔöÌíÁË26%)¡£±ðµÄ£¬²»µ±»á¼û¿ØÖÆÎó²îËù»ñµÃµÄ½±½ð¶î¶È±ÈÈ¥Äêͬ±ÈÔöÌí134£¥£¬¸ßµÖ´ï400ÍòÃÀÔª£¬Æä´ÎÊÇÐÅÏ¢Åû¶Îó²î£¬Í¬±ÈÔöÌí63£¥¡£ÕâÁ½ÖÖ·½·¨¶¼»áй¶DZÔÚµÄÃô¸ÐÊý¾Ý£¬ÀýÈçСÎÒ˽¼ÒÉí·ÝÐÅÏ¢¡£
ÔÎÄÁ´½Ó£º
hackerone.com/hacker-powered-security-report
2¡¢Pulse SecureÐû²¼ÆóÒµÍƽøÁãÐÅÍÐÍøÂçµÄÆÊÎö±¨¸æ
Pulse SecureÐû²¼ÁËÓйØÆóÒµÍƽøÁãÐÅÍÐÍøÂçµÄÆÊÎö±¨¸æ¡£ÄÇЩÍƶ¯ºÍÍýÏëÁãÐÅÍÐÁ÷³ÌºÍÊÖÒÕʵÑéÆ«ÏòµÄ×éÖ¯£¬½«×ßÔÚÊý×ÖתÐÍÇúÏßµÄÇ°Ãæ¡£Ñо¿·¢Ã÷£¬ÁãÐÅÍÐÏîÄ¿ÍùÍùÊÇ¿çѧ¿ÆµÄ£¬ËѼ¯ÁËÇå¾²ºÍÍøÂçÍŶӡ£ËûÃÇͨ³£Ê¹ÓÃÈýÖÖÐ×÷·½·¨£¬»®·ÖÊÇе÷²î±ðϵͳ֮¼äµÄ»á¼ûÇå¾²¿ØÖÆ(48%)¡¢ÆÀ¹À»á¼ûÇå¾²¿ØÖÆÐèÇó(41%)ºÍƾ֤Óû§¡¢½ÇÉ«¡¢Êý¾ÝºÍÓ¦ÓóÌÐò½ç˵»á¼ûÐèÇó(40%)¡£ÆóÒµÖÎÀíлḱ×ÜShamus McGillicuddyÌåÏÖ£¬ÆóÒµÏÔÈ»ÕýÔÚ¼ÓËÙ½ÓÄÉÁãÐÅÍÐÍøÂçµÄ³ÌÐò¡£
ÔÎÄÁ´½Ó£º
https://www.pulsesecure.net/resource/pulse-zero-trust-access-defense-in-depth/
3¡¢GoogleÐû²¼Çå¾²¸üУ¬ÐÞ¸´ChromeÖÐÒѱ»Ê¹ÓõÄ0day
GoogleÐû²¼Çå¾²¸üУ¬ÐÞ¸´ChromeÖеÄ10¸öÎó²î£¬ÆäÖаüÀ¨Ò»¸öÔÚÒ°ÍâÒѱ»Æð¾¢Ê¹ÓõÄ0day¡£¸Ã0day±»×·×ÙΪCVE-2020-16009£¬ÓÉGoogleµÄÍþвÆÊÎöС×飨TAG£©·¢Ã÷£¬µ«¸ÃС×鲢δ¹ûÕæ¹ØÓÚ¸ÃÎó²îµÄÏêϸÐÅÏ¢ÒÔ¼°Ê¹Ó㬽öÌåÏÖ¸ÃÎó²îλÓÚ´¦Öóͷ£JavaScript´úÂëµÄChrome×é¼þV8ÖС£²»¾Ãºó£¬GoogleÓÖÐû²¼ÁËAndroid°æChromeÖеÄ0dayµÄ²¹¶¡³ÌÐò£¬¸ÃÎó²î±»×·×ÙΪCVE-2020-16010£¬ÎªChrome for AndroidÓû§½çÃ棨UI£©×é¼þÖеĶѻº³åÇøÒç³öÎó²î¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/google-patches-second-chrome-zero-day-in-two-weeks/
4¡¢Ë¼¿ÆÅû¶ÆäAnyConnect¿Í»§¶ËÖÐ0day£¬ÉÐÎÞÏà¹Ø²¹¶¡
˼¿ÆÅû¶ÆäAnyConnect¿Í»§¶ËÈí¼þµÄ0day£¬ÏÖÔÚÒÑÓйûÕæ¿ÉÓõĿ´·¨Ñé֤ʹÓôúÂ룬µ«ÉÐÎÞÕë¶ÔÕâ¸öí§Òâ´úÂëÖ´ÐÐÎó²îµÄÇå¾²¸üС£¸ÃÎó²î±»×·×ÙΪCVE-2020-3556£¬±£´æÓÚCisco AnyConnect ClientµÄÀú³Ì¼äͨѶ£¨IPC£©Í¨µÀÖУ¬¾ÓÉÉí·ÝÑéÖ¤µÄ¹¥»÷ÕߺÍÍâµØ¹¥»÷Õß¿ÉʹÓøÃÎó²îÖ´ÐжñÒâ¾ç±¾¡£¸ÃÎó²îÓ°ÏìÁËWindows¡¢LinuxºÍmacOS°æ±¾µÄAnyConnect¿Í»§¶Ë£¬Ö»¹ÜûÓв¹¶¡³ÌÐò£¬¿ÉÊÇ¿ÉÒÔͨ¹ý½ûÓÃ×Ô¶¯¸üкÍ×èÖ¹ÆôÓþ籾ÉèÖÃÀ´»º½â¸ÃÎÊÌâ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/cisco-discloses-anyconnect-vpn-zero-day-exploit-code-available/
5¡¢AppleÐû²¼¸üУ¬ÐÞ¸´Òѱ»Æð¾¢Ê¹ÓõÄ3¸ö0day
AppleÐÞ¸´ÁËÆäiOS 14.2ÖеÄ3¸ö0day£¬ÕâЩÎó²îÒÑÔÚÒ°Íâ±»Æð¾¢Ê¹Óò¢Ó°ÏìÁËiPhone¡¢iPadºÍiPod¡£´Ë´ÎÐÞ¸´µÄÎó²î»®·ÖΪԶ³ÌÖ´ÐдúÂ루RCE£©Îó²î£¨CVE-2020-27930 £©£¬FontParser¿â´¦Öóͷ£¶ñÒâ×ÖÌåʱÓÉÄÚ´æËð»µÎÊÌâµ¼Ö£»ÄÚºËÄÚ´æ×ß©Îó²î£¨CVE-2020-27950£©£¬¸ÃÎó²îÓÉÄÚ´æ³õʼ»¯ÎÊÌâÒýÆð£¬ÔÊÐí¶ñÒâÓ¦Óûá¼ûÄÚºËÄڴ棻ÄÚºËÌáȨÎó²î(CVE-2020-27932)£¬ÓÉÀàÐÍ»ìÏýµ¼Ö£¬¿É±»Ê¹ÓÃÀ´Ê¹ÓÃÄÚºËȨÏÞÖ´ÐÐí§Òâ´úÂë¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/apple-patches-three-actively-exploited-ios-zero-days/