¶³öµÄ»·¾³±äÁ¿Îļþµ¼ÖÂÔÆ»·¾³Ôâ·ê´ó¹æÄ£ÀÕË÷

°ä²¼¹¦·ò 2024-08-20
1. ¶³öµÄ»·¾³±äÁ¿Îļþµ¼ÖÂÔÆ»·¾³Ôâ·ê´ó¹æÄ£ÀÕË÷


8ÔÂ16ÈÕ£¬Ò»³¡Õë¶Ô¶à¸ö×éÖ¯µÄ´ó¹æÄ£ÀÕË÷»î¶¯ÀûÓÃÁ˿ɹ«¿ª½Ó¼ûµÄ»·¾³±äÁ¿Îļþ£¨.env£©£¬ÕâЩÎļþÔ̺¬ÔƺÍÉ罻ýÌåÀûÓ÷¨Ê½µÄÃô¸ÐÍ´´¦¡£Palo Alto Networks Unit 42Ôڻ㱨ÖÐÖ¸³ö£¬Õâ´Î¹¥»÷¶³öÁË»·¾³±äÁ¿¡¢³Ö¾Ãƾ֤ʹÓü°×îÓ×ÌØÈ¨¼Ü¹¹È±Ê§µÈ°²È«·ì϶¡£¹¥»÷Õßͨ¹ýÊÜϰȾµÄAmazon Web Services (AWS)»·¾³ÉèÖÃÁË»ù´¡ÉèÊ©£¬É¨Ã賬¹ý2.3ÒÚ¸öÖ¸±êÒÔÍøÂçÃô¸ÐÊý¾Ý¡£ËûÃÇ´Ó110,000¸öÓòÃûµÄ.envÎļþÖÐÌáÈ¡ÁË90,000¶à¸öΨһ±äÁ¿£¬Ô̺¬ÔÆ·þÎñºÍÉ罻ýÌåÕË»§Í´´¦¡£¹¥»÷Õßδ¼ÓÃÜÊý¾Ý¼´ÇÔÈ¡£¬²¢ÔÚÔÆ´æ´¢ÈÝÆ÷ÖиéÖÃÀÕË÷ÐÅ¡£ÀûÓÃAWS IAMȨÏÞ£¬¹¥»÷ÕßÀ©´ó°²Éíµã£¬´´½¨ÐÂLambdaº¯Êý½øÐл¥ÁªÍøÁìÓòɨÃ裬ѰÕÒ¶³öµÄ»·¾³Îļþ¡£³É¹¦»ñȡʹ´¦ºó£¬¹¥»÷Õß½«Æä´æ´¢ÔÚ¹«¹²S3´æ´¢Í°ÖС£³ö¸ñµØ£¬ËûÃǹØ×¢º¬ÓÐMailgunÍ´´¦µÄ.envÎļþ£¬Ì°Í¼·¢ËÍÍøÂç´¹µöÓʼþ¡£Ö»¹Ü³¢ÊÔ·¸·¨¼ÓÃÜÇ®±ÒÍÚ¾òʧ°Ü£¬µ«¾­¼Ã¶¯»úÏÔÖø¡£¹¥»÷ÕßʹÓÃVPNºÍTOR°µ²ØÉí·Ý£¬Unit 42¼ì²âµ½ÎÚ¿ËÀ¼ºÍĦÂå¸çµÄIPµØÖ·Óë»î¶¯ÓйØ¡£Õâ´Î»î¶¯ÏÔʾÁ˹¥»÷ÕßÀûÓÃ×Ô¶¯»¯¼¼ÊõÔÚÔÆ»·¾³ÖÐѸ¿ì·¢Õ¹Ðж¯µÄ¸ßÃ÷¼¼Êõ¡£


https://thehackernews.com/2024/08/attackers-exploit-public-env-files-to.html


2. WPS Office·ì϶CVE-2024-7262ÔâÀûÓã¬Î£¼°2ÒÚÓû§


8ÔÂ16ÈÕ£¬WPS OfficeÊÇÒ»¿îÕ¼Óг¬¹ý2ÒÚÓû§µÄ°ì¹«Ì×¼þ£¬½üÆÚÆØ³öÁ½¸ö¸ßΣ·ì϶CVE-2024-7262ºÍCVE-2024-7263£¬CVSSÆÀ·Ö¸ß´ï9.3£¬½ÒʾÁ˼«¸ßµÄ°²È«·çÏÕºÍÒ×±»ÀûÓÃÐÔ¡£ÕâÁ½¸ö·ì϶¾ùλÓÚÆäpromecefpluginhost.exe×é¼þÖУ¬Í¨¹ý²»³ä·ÖµÄõè¾¶ÑéÖ¤»úÔ죬ʹ¹¥»÷Õß¿ÉÄÜÓÕµ¼Óû§´ò¿ªÌØÔìµç×Ó±í¸ñÎĵµ£¬½ø¶ø¼ÓÔØ²¢Ö´ÐÐËÁÒâWindows¿â¡£CVE-2024-7262Ó°Ïì12.2.0.13110ÖÁ12.2.0.13489°æ±¾£¬ÔÊÐíÔ¶³Ì´úÂëÖ´ÐУ¬¿ÉÄÜÒý·¢Êý¾Ýй¶¡¢ÀÕË÷Èí¼þ¹¥»÷»òϵͳÉî¶ÈÈëÇÖ¡£Ö»¹Ü½ðɽ¶¾°Ô°ä²¼ÁË12.2.0.16909°æ±¾×÷ΪCVE-2024-7262µÄ²¹¶¡£¬µ«ËæºóÓÖ·¢ÏÖÁËCVE-2024-7263£¬¸Ã·ì϶´æÔÚÓÚ12.2.0.17153ÒÔϰ汾£¬ÓÉÓÚδ³¹µ×ËãÕʶî±í²ÎÊý£¬Ê¹µÃÔ­²¹¶¡Ê§Ð§£¬Ôٴζ³ö°²È«·çÏÕ¡£ÓÈΪÑϳÁµÄÊÇ£¬CVE-2024-7262Òѱ»¶ñÒâÀûÓã¬Í¨¹ý¶È·¢¼Ù×°³ÉºÏ·¨ÎĵµµÄ¶ñÒâÎļþ£¬¹¥»÷ÕßÕý»ý¼«·¢Õ¹¹¥»÷¡£Òò¶ø£¬Ç¿ÁÒ½¨ÒéËùÓÐWPS OfficeÓû§µ±¼´Éý¼¶ÖÁ12.2.0.17153»ò¸ü¸ß°æ±¾£¬ÒÔ·À±¸Ç±ÔڵݲȫÍþв¡£


https://securityonline.info/wps-office-vulnerabilities-expose-200-million-users-cve-2024-7262-exploited-in-the-wild/


3. Ailurophile£ºÔ´×ÔÔ½Äϵ͍Ô컯ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ½ÒÃØ


8ÔÂ19ÈÕ£¬G DATAÍøÂ簲ȫÍŶӸ淢ÁËÒ»¿îÃûΪ¡°Ailurophile¡±µÄÐÂÐÍPHP»ùÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ£¬ÒÉËÆÔ´×ÔÔ½Äϲ¢ÒÔ¶©ÔÄģʽÏúÊÛ¡£Ailurophile½¨ÉèÁËÒ»¸öÖ°ÄÜ·á˶µÄÍøÂçÃæ°å£¬ÔÊÐíÂò¼Ò¸ß¶È×Ô½ç˵¶ñÒâÈí¼þ£¬Ô̺¬¶¨Ãû¡¢Í¼±êÉèÖá¢Telegram֪ͨÅäÖã¬ÉõÖÁʹÈí¼þ¸üÄѱ»¼ì²â¡¢ÈƹýWindows Defender·ÀÓù£¬²¢´ÓÔ¶³ÌURL²¿Êð¶î±í¶ñÒâ¸ºÔØ¡£Æä׳´óµÄÊý¾ÝÇÔÈ¡ÄÜÁ¦¾Û½¹ÓÚChrome¡¢EdgeµÈÖ÷Á÷ä¯ÀÀÆ÷£¬ÄÜÇÔÈ¡Ô̺¬×Ô¶¯Ìî³äÊý¾Ý¡¢cookies¡¢ÃÜÂë¡¢ä¯ÀÀº¹Çà¡¢ÐÅÓþ¿¨ÐÅÏ¢¼°¼ÓÃÜÇ®±ÒÇ®°üÊý¾ÝÔÚÄÚµÄÃô¸ÐÐÅÏ¢¡£Ailurophileͨ¹ý¡°ExeOutput¡±ºÍ¡°BoxedApp¡±¼¼Êõ·â×°ºÍÐé¹¹»¯£¬Ê¹ÆäÔÚÄÚ´æÖÐÔËÐУ¬Ôö³¤ÁËÒñ±ÎÐÔºÍÌӱܼì²âµÄÄÜÁ¦¡£¶ñÒâÈí¼þÓɶà¸öPHP¾ç±¾×é³É£¬¸÷˾ÆäÖ°£¬´ÓÍøÂçϵͳÐÅÏ¢¡¢ÖÕÖ¹¾ºÕù¹ý³Ì£¬µ½¾«×¼ÌáÈ¡²¢ÉÏ´«Óû§Êý¾Ý£¬Ã¿¸ö¾ç±¾¶¼±íÑÝ׏ؼü½ÇÉ«¡£³ö¸ñÊÇÆäÕë¶ÔÌØ¶¨ÎļþºÍ¹Ø¼ü×ÖµÄÊý¾ÝËÑË÷Ö°ÄÜ£¬½øÒ»²½ÍØ¿íÁËÐÅÏ¢ÇÔÈ¡ÁìÓò¡£G DATAÖ¸³ö£¬AilurophileÕý´¦ÓÚ»îÔ¾¿ª·¢½×¶Î£¬²»ÐÝÒýÈëÐÂÖ°ÄÜÓë¸Ä½ø£¬Í¨¹ý¶ñÒâÈí¼þÆÆ½âµÈ·½Ê½´«²¼£¬¶ÔÍøÂ簲ȫ×é³É³ÖÐøÍþв¡£


https://securityonline.info/new-infostealer-ailurophile-discovered-poses-significant-risk-to-user-privacy/


4. ·áÌïÔâºÚ¿ÍÈëÇÖ£¬240GBÊý¾Ýµµ°¸Ð¹Â¶


8ÔÂ19ÈÕ£¬Ò»ÃûºÚ¿ÍÔÚÂÛ̳ÉϹ«¿ªÁË´Ó·áÌïϵͳ·¸·¨»ñÈ¡µÄ240GBÊý¾Ýµµ°¸£¬È·ÈÏ·áÌïÔâ·êÁËÍøÂ簲ȫÈëÇÖ¡£·áÌï¹Ù·½»ØÓ¦³ÆÒÑͨ´ï´ËÊ£¬²¢Ç¿µ÷ÎÊÌâÁìÓòÓÐÏÞ£¬·ÇϵͳÐÔÎÊÌâ¡£¹«Ë¾Õý»ý¼«ÓëÊÜÓ°ÏìÓû§¹µÍ¨£¬Ìṩ±ØÒªÔöÔ®£¬µ«¾ßÌåϸ½ÚÈç·ì϶·¢ÏÖ¹¦·ò¡¢¹¥»÷õè¾¶¼°ÊÜÓ°ÏìµÄÓû§ÊýÁ¿µÈÐÅÏ¢ÉÐδ¶Ô±í°ä²¼¡£Ð¹Â¶±»µÁÊý¾ÝµÄÍþвÕßZeroSevenGroup×Ô³ÆÈëÇÖÁË·áÌïλÓÚÃÀ¹úµÄ·ÖÖ§»ú¹¹£¬ÇÔÈ¡ÁËÔ̺¬Ô±¹¤ÐÅÏ¢¡¢¿Í»§ÐÅÏ¢¡¢ºÏͬ¼°²ÆÕþ¼Í¼ÔÚÄڵĺ£Á¿Êý¾Ý¡£ËûÃÇ»¹Ðû³ÆÊ¹ÓÃÁË¿ªÔ´¹¤¾ßADReconÍøÂçÍøÂç»ù´¡ÉèÊ©µý±¨¼°Æ¾Ö¤£¬½øÒ»²½Õ¹Ê¾ÁË´ÓActive DirectoryÖÐÌáÊØÐÅÏ¢µÄÄÜÁ¦¡£¸Ã×éÖ¯²»½ö·ÖÏíÁËÊý¾ÝÄÚÈݸÅÀÀ£¬ÈçÁªÏµÈË¡¢´òËã¡¢Ô±¹¤ÕÕÆ¬µÈ£¬»¹ÌṩÁË´øÃÜÂëµÄAD-ReconÁ˾Ö£¬¹©ÈËÇáÒײéÔÄ¡£ÖµÍ×ÌùÐĵÄÊÇ£¬Ö»¹Ü·áÌïδÃ÷ȷйÃÜÊÂÎñµÄ¾ßÌåÈÕÆÚ£¬µ«¼¼Êõ·ÖÎöÖ¸³öÓйØÎļþÖÁÉÙÔÚ2022Äê12ÔÂ25ÈÕÒѱ»´´½¨»ò»ñÈ¡£¬°µÊ¾¹¥»÷Õß¿ÉÄÜÒÑÉøÈëÖÁ´æ´¢Êý¾ÝµÄ±¸·Ý·þÎñÆ÷ϵͳ¡£


https://www.bleepingcomputer.com/news/security/toyota-confirms-breach-after-stolen-data-leaks-on-hacking-forum/


5. Jenkins CLI·ì϶CVE-2024-23897±»CISAÁÐΪÒÑÖªÀûÓ÷çÏÕ


8ÔÂ19ÈÕ£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©Òѽ«JenkinsºÅÁîÐнçÃæ£¨CLI£©µÄÒ»ÏîÑϳÁõè¾¶±éÀú·ì϶£¨CVE-2024-23897£¬CVSSÆÀ·Ö¸ß´ï9.8£©ÄÉÈëÆäÒÑÖªÀûÓ÷ì϶£¨KEV£©Ä¿Â¼£¬Í¹ÏÔÁ˸÷ì϶µÄ´¹Î£ÐÔÓëÑϳÁÐÔ¡£Jenkins£¬×÷Ϊ¹ãÊÜÓ­½ÓµÄ¿ªÔ´×Ô¶¯»¯·þÎñÆ÷£¬ÊØ»¤×ÅÈ«ÇòÊýÊ®Íò×°ÖÃÊ·ý£¬Óû§³¬°ÙÍò¡£½üÆÚÅû¶µÄCVE-2024-23897·ì϶ÔÊÐí¹¥»÷Õßͨ¹ýCLIÀûÓÃĬÈÏÆôÓõÄÎļþÄÚÈÝÀ©´óÖ°ÄÜ£¬¶ÁÈ¡Jenkins½ÚÔìÆ÷ÉϵÄËÁÒâÎļþ£¬ÉõÖÁ¿ÉÄÜÖ´ÐÐÔ¶³Ì´úÂ룬¶Ôϵͳ°²È«×é³É³Á´óÍþв¡£¸Ã·ì϶ԴÓÚJenkins¶ÔCLIºÅÁî²ÎÊýµÄ´¦Ö÷½Ê½£¬³ö¸ñÊÇargs4j¿âÖеġ°expandAtFiles¡±Ö°ÄÜ£¬Î´ÄÜÔÚ½Ïа汾Öб»ÓÐЧ½ûÓá£Õ¼ÓÓ×°Overall/Read¡±È¨Ï޵Ĺ¥»÷ÕßÄÜÎÞÏ޶ȵضÁÈ¡Îļþ£¬¶øÎÞ´ËȨÏÞÕßÒ²ÄܶÁȡǰÈýÐÐÄÚÈÝ£¬Ô̺¬¿ÉÄÜ´æ´¢Ãô¸ÐÐÅÏ¢µÄ¼ÓÃÜÃÜÔ¿Îļþ¡£¶à¸ö×êÑÐÔ±ÒѰ䲼¸ÅÏëÑéÖ¤£¨PoC£©·ì϶£¬¾¯Ê¾¸Ã·ì϶¿ÉÄÜÔâµ½´ó¹æÄ£ÀûÓã¬ShodanÉϵIJéÎÊÁ˾ÖÏÔʾ³¬75,000¸öJenkinsÊ·ýÖ±½Ó¶³öÓÚ»¥ÁªÍø£¬·çÏÕ¼«¸ß¡£ÎªÓ¦¶Ô´ËÍþв£¬CISAÒÑÏòÁª¹ú»ú¹¹·¢³öÖ¸ÁҪÇóÔÚ2024Äê9ÔÂ9ÈÕǰ½¨¸´´Ë·ì϶¡£


https://securityaffairs.com/167267/hacking/cisa-adds-jenkins-command-line-interface-cli-bug-to-its-known-exploited-vulnerabilities-catalog.html


6. FlightAwareÅäÖÃÃýÎóÖ¿ͻ§ÐÅϢй¶


8ÔÂ19ÈÕ£¬º½°à¸ú×Ù·þÎñ¾ÞÍ·FlightAwareÔâ·êÁËһ·ÑϳÁµÄÓ×ÎÒÊý¾Ýй¶ÊÂÎñ£¬¾Ý³ÆÕâÊÇÓÉÓÚ¹«Ë¾ÄÚ²¿µÄÅäÖÃÃýÎóËùµ¼Ö¡£¸Ã¹«Ë¾ÔÚÆä¹Ù·½Í¨ÖªÖÐÈϿɣ¬×Ô2021Äê1ÔÂÆð£¬Æäϵͳ´æÔÚ°²È«Òþ»¼£¬¿ÉÄÜй¶ÁËÔ̺¬¿Í»§ÐÕÃû¡¢µç×ÓÓʼþ¡¢Õ˵¥ÓëËÍ»õµØÖ·¡¢IPµØÖ·¡¢É罻ýÌåÐÅÏ¢¡¢µç»°ºÅÂë¡¢µ®ÉúÄê·Ý¡¢ÐÅÓþ¿¨Î²ºÅ¡¢·É»úËùÓÐȨÏêÇé¡¢Ö°ÒµÐÅÏ¢¼°ÕË»§»î¶¯¼Í¼µÈÃô¸ÐÊý¾Ý¡£¸üÁîÈËÓÇÓôµÄÊÇ£¬²¿Ãſͻ§µÄÉç»á°²È«ºÅÂëºÍÃÜÂëÒ²¿ÉÄÜÊܵ½Ó°Ïì¡£FlightAwareѸ¿ìÏìÓ¦£¬ÒªÇóËùÓÐDZÔÚÊÜÓ°ÏìµÄÓû§³ÁÖÃÕË»§ÃÜÂ룬µ«¹ØÓÚÃÜÂëµÄ¼ÓÃÜÇé¿ö¼°ÊÇ·ñ´æÔÚ½øÒ»²½µÄÀÄÓÃÐÐΪ£¬¹«Ë¾²¢Î´ÔÚ֪ͨÖоßÌå×¢Ã÷¡£Õâ´Îй¶ÊÂÎñµÄ¹¦·ò¿ç¶È³¤´ïÈýÄê¶à£¬ÏÔʾ³ö¹«Ë¾ÔÚÊý¾Ý°²È«ÖÎÀíºÍ¼à¿ØÉϵijÁ´óÊè©¡£Ö»¹ÜFlightAware¼á³ÆÕâÊÇÄÚ²¿Ê§Îó¶ø·Ç±í²¿¶ñÒâ¹¥»÷£¬µ«Êý¾ÝµÄÏÖʵÀûÓÃÇé¿öÈÔ²»Ë¬ÀÊ£¬¹«Ë¾Ò²Î´ÄÜÈ·ÈÏÊÇ·ñÓеÚÈý·½·¸·¨½Ó¼û»òÏÂÔØÁËÕâЩÊý¾Ý¡£Ãæ¶Ô¹«¼ÒµÄÖÊÒɺ͹ØÇУ¬FlightAware½²»°ÈËά³Ö¹ÑÑÔ£¬Î´¾Í¾ßÌåÊÜÓ°Ïì¿Í»§ÊýÁ¿»ò½øÒ»²½µÄ²¹¾È´ëÊ©ÌṩÈκÎÐÅÏ¢¡£


https://techcrunch.com/2024/08/19/flightaware-warns-that-some-customers-info-has-been-exposed-including-social-security-numbers/