ÐÅÏ¢°²È«Öܱ¨-2019ÄêµÚ50ÖÜ

°ä²¼¹¦·ò 2019-12-23

>±¾Öܰ²È«Ì¬ÊÆ×ÛÊö


2019Äê12ÔÂ16ÈÕÖÁ22ÈÕ¹²ÊÕ¼°²È«·ì϶47¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇApache Log4j·´ÐòÁл¯´úÂëÖ´Ðзì϶; Citrix Application Delivery ControllerËÁÒâ´úÂëÖ´Ðзì϶£»TRENDnet TEW-651BR»º³åÇøÒç³ö´úÂëÖ´Ðзì϶£»Google Chrome media pickerÄÚ´æÃýÎóÒýÓ÷ì϶£»Joomla! configuration SQL×¢Èë·ì϶¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇ¿¨°Í˹»ù°ä²¼2019ÄêÍøÂçÍþвµÄͳ¼ÆÊý¾Ý»ã±¨£»ÃÀ¹ú¶àÒéԺͨ¹ý¡¶±£ÏÕÄÜÔ´»ù´¡ÉèÊ©·¨°¸¡·£»LightInTheBoxй¶1.3TB Web·þÎñÆ÷ÈÕÖ¾£»MacÍþв¼ì²âÊýÁ¿ÔÚ2019Äê³ÊÉÏÉýÇ÷Ïò£»Gangnam Industrial Style¶Ô×¼Êý°Ù¼Ò¹¤Òµ¹«Ë¾¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖС£



>³ÁÒª°²È«·ì϶Áбí


1. Apache Log4j·´ÐòÁл¯´úÂëÖ´Ðзì϶


Apache Log4j´æÔÚSocket Server·´ÐòÁл¯·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Äܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£

https://vigilance.fr/vulnerability/Apache-Log4j-1-2-code-execution-via-Socket-Server-Deserialization-31193


2. Citrix Application Delivery ControllerËÁÒâ´úÂëÖ´Ðзì϶


Citrix Application Delivery Controller´æÔÚδÃ÷°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉÖ´ÐÐËÁÒâ´úÂë¡£

https://www.auscert.org.au/bulletins/ESB-2019.4708/


3. TRENDnet TEW-651BR»º³åÇøÒç³ö´úÂëÖ´Ðзì϶


TRENDnet TEW-651BR 'ccp_act'²ÎÊý´¦ÖôæÔÚ»º³åÇøÒç¶Âí½Å£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄ'get_set.ccp' POSTÒªÇ󣬿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐËÁÒâ´úÂë¡£

https://github.com/pr0v3rbs/CVE/tree/master/CVE-2019-11400


4. Google Chrome media pickerÄÚ´æÃýÎóÒýÓ÷ì϶


Google Chrome media picker´æÔÚ¿ªÊͺóʹÓ÷ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄWEBÒªÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐËÁÒâ´úÂë¡£

https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop_17.html


5. Joomla! configuration SQL×¢Èë·ì϶


Joomla! configuration²ÎÊý´¦ÖôæÔÚÊäÈëÑéÖ¤·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄSQLÒªÇ󣬲Ù×÷Êý¾Ý¿â£¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»òÖ´ÐÐËÁÒâ´úÂë¡£

https://www.auscert.org.au/bulletins/ESB-2019.4713/


>³ÁÒª°²È«ÊÂÎñ×ÛÊö


1¡¢¿¨°Í˹»ù°ä²¼2019ÄêÍøÂçÍþвµÄͳ¼ÆÊý¾Ý»ã±¨


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¿¨°Í˹»ù°ä²¼2019ÄêÍøÂçÍþвͳ¼ÆÊý¾Ý»ã±¨£¬¸Ã»ã±¨ÊÇ»ùÓÚ2018Äê11Ôµ½2019Äê10ÔÂÆÚ¼ä´ÓÈ«Çò203¸ö¹ú¶ÈºÍµØÓòµÄKSNÓû§ÍøÂçµÄ¶ñÒâ»î¶¯Êý¾Ý¡£Ôڻ㱨ÆÚ¼ä£¬ÓÐ19.8%µÄÓû§ÍÆËã»úÖÁÉÙÔâ·êÒ»´Î¶ñÒâÈí¼þÀà´ËÍâÍøÂç¹¥»÷¡£¿¨°Í˹»ù°²È«½â¾ö¹æ»®×èÖ¹ÁËÀ´×ÔÈ«ÇòÔÚÏß×ÊÔ´µÄ9.7Òڴι¥»÷¡£Web·´²¡¶¾×é¼þ¼ø±ð³ö2.7ÒÚ¸ö·ÖÆçµÄ¶ñÒâURL¡£ÍøÂç·À²¡¶¾Èí¼þ¼ì²âµ½2461Íò¸ö·ÖÆçµÄ¶ñÒâÑù±¾¡£75.5Íò¸öÓû§ÍÆËã»úÔâµ½ÀÕË÷Èí¼þ¹¥»÷¡£226ÍòÓû§ÍÆËã»úÔâµ½¶ñÒâÍÚ¿ó¹¥»÷¡£¿¨°Í˹»ù°²È«½â¾ö¹æ»®ÔÚ76.6Íǫ̀É豸ÉÏ×èÖ¹ÁËÕë¶ÔÔÚÏßÒøÐÐÕË»§µÄ¶ñÒâÈí¼þ¹¥»÷¡£


Ô­ÎÄÁ´½Ó£º

https://securelist.com/kaspersky-security-bulletin-2019-statistics/95475/


2¡¢ÃÀ¹ú¶àÒéԺͨ¹ý¡¶±£ÏÕÄÜÔ´»ù´¡ÉèÊ©·¨°¸¡·


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ëæ×Å2020Äê¡¶¹ú·ÀÊÚȨ·¨¡·£¨NDAA£©µÄͨ¹ý£¬ÃÀ¹ú¶àÒéԺҲͨ¹ýÁË¡¶±£ÏÕÄÜÔ´»ù´¡ÉèÊ©·¨°¸¡·¡£¸Ã·¨°¸½«ÔÚÃÀ¹úÄÜÔ´²¿¹ú¶È³¢ÊÔÊÒÄÚ³ÉÁ¢Ò»¸öΪÆÚÁ½ÄêµÄÊÔµã´òË㣬ÆäÖ¸±êÊÇ·¢ÏÖÄÜÔ´²¿ÃÅʵÌå»ú¹¹Öеݲȫ·ì϶ºÍ¸ôÀë¹Ø¼üµÄµçÍøÏµÍ³¡£ÆÀ¹ÀµÄ¼¼ÊõºÍ³ß¶ÈÔ̺¬·ÂÕպͷÇÊý×Ö½ÚÔìϵͳ¡¢×¨ÓýÚÔìϵͳºÍÎïÀí½ÚÔì¹æ»®¡£¸Ã·¨°¸»¹ÒªÇó³ÉÁ¢Ò»¸ö¹¤×÷×飬Æä¹¤×÷ÊÇ·ÖÎö¹ú¶È³¢ÊÔÊÒÌá³öµÄ½â¾ö¹æ»®£¬²¢Ôì¶©Ò»Ïî±£»¤ÄÜÔ´ÍøµÄ¹ú¶ÈÕ½Êõ¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/bill-protect-us-energy-grid-cyberattacks-passes-ndaa


3¡¢LightInTheBoxй¶1.3TB Web·þÎñÆ÷ÈÕÖ¾


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


vpnMentor×êÑÐÈËÔ±·¢´Ë¿ÌÏßÁãÊÛÉÌLightInTheBoxµÄElasticsearchÊý¾Ý¿â¿É¹«¿ª½Ó¼û£¬ÆäÖÐÔ̺¬1.3TB Web·þÎñÆ÷ÈÕÖ¾¡£LightInTheBoxרһÓÚÓ×Åä¼þ¡¢·þ×°ºÍÅäÊεÄÏúÊÛ£¬Æä´ó²¿Ãſͻ§Î»ÓÚ±±ÃÀºÍÅ·ÖÞ¡£×êÑÐÈËÔ±ÔÚ11ÔÂÏÂÑ®·¢ÏÖÁ˸ÃÊý¾Ý¿â£¬Êý¾Ý¿âÖеļͼ×ܼƳ¬¹ý15ÒÚÌõ£¬»¹Ô̺¬Æä×ÓÍøÕ¾MiniInTheBox.comµÄÊý¾Ý¡£ÈÕÖ¾Ô̺¬8ÔÂ9ÈÕÖÁ10ÔÂ11ÈÕÖ®¼äµÄÍøÕ¾»î¶¯£¬Ô̺¬µç×ÓÓʼþµØÖ·¡¢IPµØÖ·¡¢¾Óס¹ú¶È/µØÓòÒÔ¼°Ã¿¸ö·Ã¿Í½Ó¼ûµÄÒ³ÃæµÈÐÅÏ¢¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/95231/data-breach/lightinthebox-data-leak.html


4¡¢MacÍþв¼ì²âÊýÁ¿ÔÚ2019Äê³ÊÉÏÉýÇ÷Ïò


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾ÝMalwarebytesµÄ×îл㱨£¬MacÍþв¼ì²âÊýÁ¿ÔÚ2019Äê³ÊÉÏÉýÇ÷Ïò¡£Ö»¹Ü´«Í³¸ÅÏëÒÔΪMacÊܵ½µÄϰȾҪ±ÈWindows PCÉٵö࣬µ«2019ÄêMalwarebytesµÄÒ£²âÊý¾ÝÅú×¢MacÍþв¼ì²âÊýÁ¿³öÏÖÁ˾ªÈ˵ÄÉÏÉýÇ÷Ïò¡£ÔÚËùÓÐÆ½Ì¨£¨Windows PC¡¢MacºÍAndroid£©ÉϵÄÍþв¼ì²âÅÅÐаñ£¨Top25£©ÖУ¬ÓÐ6¸öÊÇMacÍþв£¬×ÜÌå¶øÑÔ£¬MacÍþвռ×ܼìÕÉÁ¿µÄ16£¥ÒÔÉÏ¡£Ë¼¿¼µ½MalwarebytesµÄMacÓû§ÈºÔ¼ÄªÊÇWindowsÓû§ÈºµÄ1/12£¬ÕâÒ»Êý×ÖÔ½·¢ÏÔÖø¡£ÔÚ2019Äêµ¥¸öÍÆËã»úÉϵÄÍþв¼ì²âÊýÁ¿ÖУ¬Windows PCΪ¾ùÔÈ4.2´Î£¬¶øMacÓû§Îª¾ùÔÈ9.8´Î£¬ÊÇWindowsÓû§µÄÁ½±¶¡£


Ô­ÎÄÁ´½Ó£º

https://blog.malwarebytes.com/mac/2019/12/mac-threat-detections-on-the-rise-in-2019/


5¡¢Gangnam Industrial Style¶Ô×¼Êý°Ù¼Ò¹¤Òµ¹«Ë¾


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


CyberXÍþв×êÑÐÓ××éSection 52ÅûÂ¶ÖØÒªÕë¶Ô¹¤Òµ¡¢¹¤³ÌºÍÔì×÷ÆóÒµµÄAPT¹¥»÷»î¶¯£¬¸Ã¹¥»÷ÍŻﱻ³ÆÎªGangnam Industrial Style£¬Ä¿Ç°ÒÑÓÐÖÁÉÙ200¼Ò¹«Ë¾³ÉΪÊܺ¦Õß¡£Ö»¹Ü´óÎÞÊýÊܺ¦ÕßλÓÚº«¹ú£¬µ«Ô̺¬ÈÕ±¾¡¢Ó¡¶ÈÄáÎ÷ÑÇ¡¢ÍÁ¶úÆä¡¢µÂ¹ú¡¢¶ò¹Ï¶à¶ûºÍÓ¢¹úÔÚÄڵĺܶà¹ú¶ÈµÄ¹«Ë¾¶¼Êܵ½Ó°Ïì¡£¹¥»÷ÕßÖØÒªÍ¨¹ý´¹µöÓʼþÌáÒé¹¥»÷£¬ÕâЩÓʼþµÄÖ÷Ìâ/¸½¼þÓ빤ҵÓйØ£¬Ô̺¬°×ƤÊé¡¢µç³§Ê¾ÒâͼÒÔ¼°¶ÔÉè¼ÆÉèÊ©£¨ÈçÌìÈ»Æø´¦Öúͳö²ú×°Ö㩵ı¨¼ÛÒªÇóµÈ¡£¹¥»÷ÕßʹÓõĶñÒâÈí¼þÖØÒªÎªSeparµÄ±äÖÖ£¬Separ¿ÉÇÔÈ¡Firefox¡¢ChromeºÍSafari´æ´¢µÄÃÜÂëÒÔ¼°´ÓGmail¡¢Yahoo¡¢Windows LiveºÍHotmailÖÐÇÔÈ¡ÓʼþÕË»§µÄÍ´´¦¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/south-korean-industrial-giants-slammed-in-new-info-stealing-hacker-campaign/