Ó¡¶ÈÂóµ±ÀÍMcDeliveryÀûÓÃÆØ³öÑϳÁ°²È«·ì϶
°ä²¼¹¦·ò 2024-12-261. Ó¡¶ÈÂóµ±ÀÍMcDeliveryÀûÓÃÆØ³öÑϳÁ°²È«·ì϶
12ÔÂ21ÈÕ£¬Ó¡¶È¶¥¼¶Ê³Æ·±íËÍÀûÓÃÂóµ±ÀÍ McDelivery ±»·¢ÏÖ´æÔÚÑϳÁ°²È«·ì϶¡£Ò»Î»×êÑÐÈËÔ±¾¹ý¾ßÌåµ÷²éºó£¬·¢ÏÖ¸ÃÀûÓõÄAPI´æÔÚ´óÁ¿È±µã£¬ÔÊÐíδ¾ÊÚȨ½Ó¼û¸÷ÀàÖ°ÄÜ¡£ÕâЩ·ì϶Ô̺¬ÒÔ¼«Á®¼ÛÖµ£¨1¬±È£¬¼´0.01ÃÀÔª£©¶©¹ºÉÌÆ·¡¢½Ù³ÔìäËûÓû§µÄ¶©µ¥¡¢ÊµÊ±¸ú×ÙËÍ»õ˾»ú²¢Â¶³öÆäÃô¸ÐÓ×ÎÒÐÅÏ¢¡¢½Ó¼ûËûÈ˵Ķ©µ¥ÏêÇéºÍ·¢Æ±£¬ÒÔ¼°Î´¾ÊÚȨ²é¿´ÖÎÀíÔ±¹Ø¼ü¼¨Ð§Ö¸±ê»ã±¨µÈ¡£Ö»¹ÜÂóµ±ÀÍʹÓÃÁËAngular¿ò¼ÜºÍJWTÁîÅÆµÈ»ù×ÔÉí·ÝÑéÖ¤´ëÊ©£¬µ«ÔÚÏÞ¶Å×û§¶ÔÃô¸ÐÊý¾Ý½Ó¼û·½ÃæÈÔ´æÔÚ²»¼°¡£ÆäÖÐÒ»¸ö͹Æð·ìÏ¶Éæ¼°°Ñ³Ö¹ºÎï³µÉÌÆ·¼ÛÖµ£¬ÁíÒ»¸ö³Á´ó·ì϶ÔÊÐíºÚ¿Í½Ù³ÖÔÚ½øÐеĶ©µ¥¡£ÕâЩ·ì϶²»½ö×é³É¼¼Êõȱµã£¬»¹ÑϳÁÍþвÓû§ÒþÖÔºÍÂóµ±ÀÍÃûÓþ¡£Â·µÂºÚ¿Í±àдÁËÏ꾡»ã±¨²¢Ìá½»¸øMcDelivery·ì϶Éͽð´òË㣬Âóµ±ÀÍÔÚ90ÌìÆÚÏÞÄÚ½¨¸´ÁËËùÓзì϶£¬²¢¼Î½±Á˺ڿ͡£
https://cybersecuritynews.com/mcdonalds-delivery-app-vulnerability/
2. Æ¥×ȱ¤½»Í¨¾ÖÔâÀÕË÷Èí¼þ¹¥»÷£¬¹«¹²½»Í¨·þÎñÖжÏ
12ÔÂ25ÈÕ£¬Æ¥×ȱ¤µØÓò½»Í¨¾Ö£¨PRT£©×î½üÔâ·êÁËÀÕË÷Èí¼þ¹¥»÷£¬µ¼Ö¹«¹²½»Í¨·þÎñÑϳÁÖжϡ£¸Ã»ú¹¹ÖÜÒ»°µÊ¾ÔÚ»ý¼«Ó¦¶ÔÕâÒ»ÔÚ12ÔÂ19ÈÕ³õ´Î·¢ÏֵĹ¥»÷£¬·¨Âɲ¿ÃźÍÍøÂ簲ȫר¼ÒÒÑȾָµ÷²é¡£Ö»¹ÜÌú··þÎñÔÚ19ÈÕÔçÉÏÒ»¶ÈÖжϣ¬µ«Ä¿Ç°½»Í¨·þÎñÒѸ´ÔÕý³£ÔËÐС£È»¶ø£¬Ò»Ð©³Ë¿Í·þÎñÈÔÊܵ½Ó°Ï죬ÀýÈçPRTµÄ¿Í»§·þÎñÖÐÐÄÁÙʱÎÞ·¨½ÓÊÜ»ò´¦ÖÃÀÏÄêÈ˺ͶùͯµÄConnectCards¡£PRTµÄIT¹ÙÔ¹ØýÔÚµ÷²éÊý¾ÝÊÇ·ñ±»µÁ£¬²¢³ÐŵÔÚµ÷²é¹ý³ÌÖÐÌṩ×îÐÂÐÂÎÅ¡£»ú¹¹»Ø¾øÐ¹Â©¹¥»÷±³ºóµÄ×éÖ¯ÒÔ¼°ºÎʱ¸´ÔÈ«Ãæ·þÎñ¡£¾Ý±¨Â·£¬ÓÉÓÚÕâ´Î¹¥»÷£¬»ð³µÎóµãÁË20¶à·ÖÖÓ¡£PRTÿÄê¿ÍÁ÷Á¿¿¿½ü4000ÍòÈ˴Σ¬ÊǸÃÖݵڶþ´ó¹«¹²½»Í¨»ú¹¹£¬Ìṩ700¶àÁ¾¹«½»³µºÍ80Á¾Çá¹ìµÈ·þÎñ¡£¹«¹²½»Í¨µÄÖжϺͿͻ§Êý¾ÝµÄÇÔÈ¡ÒѳÉΪÀÕË÷Èí¼þÍÅ»ï³ÖÐøÕë¶Ô´ËÀ൱¾Ö»ú¹¹µÄÖØÒªÔÒòÖ®Ò»¡£
https://therecord.media/pittsburgh-regional-transit-attributes-disruptions-to-ransomware-attack
3. Apache Á÷Á¿½ÚÔ콨¸´¸ßΣSQL×¢Èë·ì϶CVE-2024-45387
12ÔÂ26ÈÕ£¬Apache Èí¼þ»ù½ð»á (ASF) ½üÈÕ°ä²¼ÁËÕë¶ÔÆäÁ÷Á¿½ÚÔìÈí¼þÖеÄÒ»¸öÑϳÁ°²È«·ì϶µÄ°²È«¸üС£¸Ã·ì϶±»ÏóÕ÷Ϊ CVE-2024-45387£¬CVSS ÆÀ·Ö¸ß´ï 9.9£¬ÊÇÒ»¸ö SQL ×¢Èë·ì϶£¬´æÔÚÓÚ Traffic Control µÄ 8.0.0 ÖÁ 8.0.1 °æ±¾ÖС£Traffic Control ÊÇÒ»ÖÖÓÃÓÚ³ÉÁ¢ÄÚÈÝ·Ö·¢ÍøÂçµÄ½â¾ö¹æ»®£¬Ö¼ÔÚ¸ßЧµØÏòÓû§·Ö·¢ÄÚÈÝ¡£¸Ã·ì϶ÔÊÐíÓµÓÐÌØ¶¨½ÇÉ«µÄÌØÈ¨Óû§£¨Èç admin¡¢federation¡¢operations¡¢portal »ò steering£©Í¨¹ý·¢ËÍÌØÔìµÄ PUT ÒªÇ󣬶ÔÊý¾Ý¿âÖ´ÐÐËÁÒâ SQL ºÅÁî¡£ASF ½¨ÒéÊÜÓ°ÏìµÄÓû§Éý¼¶µ½ Apache Traffic Control 8.0.2 °æ±¾ÒÔ½¨¸´´Ë·ì϶¡£ÖµÍ×ÌùÐĵÄÊÇ£¬Á÷Á¿½ÚÔì 7.0.0 °æ±¾¼°Ö®Ç°µÄ°æ±¾²»ÊÜ´Ë·ì϶ӰÏì¡£´Ë±í£¬±¾Ô³õ ASF »¹°ä²¼ÁËÁíÒ»¸ö°²È«¸üУ¬ÒÔ½â¾ö Struts 2 ÖÐÓë OGNL ¼¼ÊõÓйصÄÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2020-17530£©¡£
https://securityaffairs.com/172307/security/apache-traffic-control-critical-flaw.html
4. ÒÁÀʺڿÍ×éÖ¯Charming Kitten²¿ÊðBellaCiao C++±äÌå¶ñÒâÈí¼þ
12ÔÂ25ÈÕ£¬ÒÁÀÊÃñ×å¹ú¶ÈºÚ¿Í×éÖ¯Charming KittenÔÚ²¿ÊðÒÑÖª¶ñÒâÈí¼þBellaCiaoµÄC++±äÌ壬±»¶íÂÞË¹ÍøÂ簲ȫ¹«Ë¾¿¨°Í˹»ù¶¨ÃûΪBellaCPP¡£BellaCiao³õ´ÎÓÚ2023Äê4Ô±»¼Í¼£¬ÊÇÒ»¸ö¿ÉÄÜ´«µÝ¶î±íÓÐÐ§ÔØºÉµÄ×Ô½ç˵Ͷ·ÅÆ÷£¬ÒÑÔÚÕë¶ÔÃÀ¹ú¡¢Öж«ºÍÓ¡¶ÈµÄÍøÂç¹¥»÷Öв¿Êð¡£Charming Kitten´ÓÊôÓÚÒÁÀÊÒÁ˹À¼¸ïÃüÎÀ¶Ó£¬¶àÄêÀ´¿ª·¢Á˶à¶à¶¨Ôì¶ñÒâÈí¼þ¼Ò×å¡£¹ÌÈ»¸Ã×éÖ¯ÔøÍ¨¹ýÉç»á¹¤³Ì»î¶¯´«²¼¶ñÒâÈí¼þ£¬µ«Éæ¼°BellaCiaoµÄ¹¥»÷»áÀûÓÿɹ«¿ª½Ó¼ûÀûÓ÷¨Ê½Öеݲȫ·ì϶¡£BellaCiaoµÄC++±äÌåÊÇÒ»¸öÃûΪ¡°adhapl.dll¡±µÄDLLÎļþ£¬ÊµÏÖÓëÆä׿ÏÈÀàËÆµÄÖ°ÄÜ£¬µ«¶ÌȱÓÃÓÚÉÏ´«ºÍÏÂÔØËÁÒâÎļþÒÔ¼°ÔËÐкÅÁîµÄWeb shell¡£BellaCPPʹÓÃÁËÏÈǰ¹éÒòÓÚCharming KittenµÄÓòÃû¡£
https://thehackernews.com/2024/12/irans-charming-kitten-deploys-bellacpp.html
5. Picus Labs»ã±¨£ºÉî¿Ì½âÎöOilRigµÄÍøÂç¼äµý»î¶¯ÓëÕ½Êõ
12ÔÂ24ÈÕ£¬OilRig£¨ÓÖ³Æ APT34 »ò Helix Kitten£©ÊÇÒ»¸öÒÁÀʵ±¾ÖÖ§³ÖµÄÍøÂç¼äµýÐÐΪÕߣ¬ÒÔÆäÕë¶ÔÖж«¹Ø¼üÐÐÒµµÄ¾«×¼Ðж¯¶øÎÅÃû¡£Picus Labs ÔÚÆä×îл㱨ÖÐÉî¿Ì×êÑÐÁË OilRig µÄ·¢Õ¹¹ý³Ì¡¢º¹Çà»î¶¯¼°ÆäʹÓõÄÏȽøÕ½Êõ¡£×Ô2016Äê³öÏÖÒÔÀ´£¬OilRig չʾÁ˳־ÃÓÆ¾ÃÐÔºÍÒþÉíÐÔ£¬Í¨¹ýÓã²æÊ½ÍøÂç´¹µö»î¶¯ºÍ²¿Êð Helminth ºóÃŵÈÏȽø¶ñÒâÈí¼þ¹¤¾ß£¬¶ÔÉ³ÌØ°¢À²®µÈ¹ú¶ÈµÄ×éÖ¯½øÐй¥»÷¡£Æä¹¥»÷ÁìÓòÒÑÀ©´óµ½Öж«µØÓòµÄµÐÔÖʵÌå¡¢ÄÜÔ´²¿Ãźͼ¼ÊõÌṩÉÌ£¬Ê¹ÓõŤ¾ßÒ²´ÓÔçÆÚµÄ Helminth ¶ñÒâÈí¼þ·¢Õ¹Îª¸ü¸´ÔÓµÄÓÐÐ§ÔØºÉ£¬Èç QUADAGENT ºÍ ISMAgent¡£OilRig »¹ÀûÓÃÁãÈÕ·ì϶ºÍ×î½üÅû¶µÄ·ì϶£¬Èç CVE-2024-30088£¬»ñµÃϵͳ¼¶½Ó¼ûȨÏÞ£¬²¿Êð×Ô½ç˵ STEALHOOK ºóÃŽøÐÐ³Ö¾Ã¼à¿ØºÍÊý¾Ýй¶¡£¸Ã×éÖ¯»¹Õë¶Ô¹©¸øÁ´ÌáÒé¹¥»÷£¬ÀûÓü¼ÊõÌṩÉÌÄÚ±»µÁµÄÕË»§ÌáÒé¸ü¿í·ºµÄ¹¥»÷¡£
https://securityonline.info/cve-2024-30088-under-attack-oilrig-targets-windows-kernel-vulnerability/
6. ÃÀ¹ú³Éñ«Ò½ÖÎÖÐÐÄÔâÍøÂç¹¥»÷£¬³¬40ÍòÃû»¼ÕßÐÅϢй¶
12ÔÂ24ÈÕ£¬ÃÀ¹ú³Éñ«Ò½ÖÎÖÐÐÄ£¨AAC£©ÊÇÒ»¼ÒͶ»úÐÔÁ¬Ëø»ú¹¹£¬×î½üÔâ·êÍøÂ簲ȫÊÂÎñ£¬µ¼ÖÂ422,424È˵ÄÓ×ÎÒ¼Í¼й¶£¬Ô̺¬ÐÕÃû¡¢µØÖ·¡¢µç»°ºÅÂë¡¢µ®ÉúÈÕÆÚ¡¢Ò½ÁƼͼºÅµÈÐÅÏ¢£¬µ«Ò½ÖÎÐÅÏ¢»òÖ§¸¶¿¨Êý¾ÝδÊÜÓ°Ïì¡£¸ÃÊÂÎñ²úÉúÔÚ9ÔÂ23ÈÕÖÁ9ÔÂ26ÈÕÆÚ¼ä£¬AACÒѵ±¼´·¢Õ¹µ÷²é£¬²¢Í¨Öª·¨Âɲ¿ÃźÍÀñƸµÚÈý·½ÍøÂ簲ȫר¼ÒÐÖú¡£Ä¿Ç°ÉÐδ·¢ÏÖÓë¸ÃÊÂÎñÓйصÄÉí·Ý͵ÇÔ»òÚ²ÆÐÐΪ¡£Õâ´ÎйÃÜÊÂÎñ»¹Ó°ÏìÁËAACµÄ´ÓÊô¹©¸øÉ̵Ŀͻ§£¬Ô̺¬ AdCare¡¢Greenhouse¡¢Desert Hope CenterµÈ¡£½üÆÚ£¬¶à¼ÒÒ½ÁÆ·þÎñÌṩÉ̳ÉÎªÍøÂ簲ȫ¹¥»÷µÄÖ¸±ê£¬ÈçRegional Care¡¢¾²Âö½¨¸´ÖÐÐÄ£¨CVR£©ºÍ°²ÄÈÑÅ¿ËÒ½Ôº£¨AJH£©£¬ÕâЩ»ú¹¹Í¨³£±£»¤²»Á¦£¬µ«±£ÁôµÄÊý¾Ý¼«¶ÈÓмÛÖµ£¬¹¥»÷ÕßÄܹ»ÀûÓÃй¶µÄÐÅÏ¢½øÐн¡È«Éí·Ýڲơ£
https://cybernews.com/news/patients-exposed-addiction-treatment-hack/


¾©¹«Íø°²±¸11010802024551ºÅ