ÃÀ¹úGilletteÒ½ÔºÔâÀÕË÷Èí¼þ¹¥»÷£»£»Magecart¶ñÒâÓòÃûÉúÃüÖÜÆÚµÄÆÊÎö±¨¸æ

Ðû²¼Ê±¼ä 2019-09-23

1.TescoÍ£³µÓ¦Óñ£´æÎó²îµ¼ÖÂÊýÍòÍò³µÅÆÍ¼Ïñй¶


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


ÔÚÍâýThe Register±¨µÀÊýÍòÍòÕÅANPR£¨³µÅÆ×Ô¶¯Ê¶±ð£©Í¼ÏñÔÚMicrosoft AzureÖÐ̻¶֮ºó£¬£¬£¬TescoÒÑ¹Ø±ÕÆäÍ£³µÑéÖ¤WebÓ¦Óᣠ¡£¡£¡£ÕâЩͼÏñÓÉÓ¢¹ú¸÷µØµÄ19¸öTescoÍ£³µ³¡ºÏÅÄÉãµÄ½øÈëºÍÍÑÀëµÄÆû³µÕÕÆ¬×é³É£¬£¬£¬ÕÕÆ¬ÖÐÍ»³öÏÔʾÁËÆû³µµÄ³µÅÆ£¬£¬£¬ËäÈ»ÓÉÓÚÇø·ÖÂʽϵͶø¿´²»µ½¼ÝʻԱ¡£ ¡£¡£¡£ANPRͼÏñÒÔ´øÓÐʱ¼ä´ÁµÄjpegÃûÌÃÉúÑÄÔÚAzure blobÖУ¬£¬£¬²¢ÇÒͼÏñÎļþÃûÒ²°üÀ¨Ê±¼äÐÅÏ¢£¬£¬£¬´Ó¶øÊ¹µÃÈκÎ×¼È·ÍÆ¶Ï³öËùÐèHTTP POSTÇëÇóÃûÌõÄÈË¿ÉÒÔÅúÁ¿»ñÈ¡ÕâЩͼÏñÒÔ¹©²»·¨Ê¹Óᣠ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.theregister.co.uk/2019/09/20/tesco_parking_app_10s_millions_anpr_photos_exposed/


2.ÐÂÎ÷À¼³èÎïÁãÊÛÉÌAnimatesÔâºÚ¿ÍÇÔÈ¡2700Ãû¿Í»§ÐÅÏ¢


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


ÐÂÎ÷À¼³èÎïÁãÊÛÉÌAnimatesÔâÓöÊý¾Ýй¶ÊÂÎñ£¬£¬£¬µ¼ÖÂ2700λ¿Í»§µÄСÎÒ˽¼ÒºÍ²ÆÎñÐÅϢй¶¡£ ¡£¡£¡£¸ÃÊÂÎñ±¬·¢ÔÚ2019Äê6ÔÂ29ÈÕÖÁ9ÔÂ13ÈÕÖ®¼ä£¬£¬£¬ÊÂÎñÔµ¹ÊÔ­ÓÉÊÇδ¾­ÊÚȨµÄµÚÈý·½»á¼û¡£ ¡£¡£¡£AnimatesÌåÏÖ¿Í»§µÄÐÅÓÿ¨/½è¼Ç¿¨Êý¾ÝÊǹ¥»÷ÕßµÄÄ¿µÄ£¬£¬£¬Í¬Ê±¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢Ò²Ôâй¶£¬£¬£¬°üÀ¨µØµã¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµã¡¢Óû§ÃûºÍÃÜÂë¡£ ¡£¡£¡£¹ØÓÚʹÓÃLayby»òPayPalÔÚÏß¹ºÎïµÄ¿Í»§£¬£¬£¬Æä¸¶¿îÐÅÏ¢²»ÊÜÓ°Ïì¡£ ¡£¡£¡£Animates»¹È·ÈϳÆÊµÌåµêµÄÉúÒâδÊÜÓ°Ïì¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.animates.co.nz/data-breach/


3.ÃÀ¹úGilletteÒ½ÔºÔâÀÕË÷Èí¼þ¹¥»÷µ¼ÖÂЧÀÍÖÐÖ¹


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


ƾ֤ÃÀ¹úÎÀÉú²¿·¢³öµÄ¾¯±¨£¬£¬£¬GilletteÒ½ÔºÔÚÉÏÖÜÎåÔâµ½ÀÕË÷Èí¼þ¹¥»÷¡£ ¡£¡£¡£¸Ã¹¥»÷Ô¼±¬·¢ÔÚÖÜÎ寯Ïþ3µã£¬£¬£¬µ¼ÖÂÒ½ÔºÔâÓöÁËÑÏÖØµÄÅÌËã»úÎÊÌâÒÔ¼°Ð§ÀÍÖÐÖ¹¡£ ¡£¡£¡£ÔÚÖÜÎåϰàʱ¼ä£¬£¬£¬¸ÃÒ½ÔºµÄµç»°ÏµÍ³ÒÑÖØÐÂÉÏÏߣ¬£¬£¬µ«ÈÔ²»¿É½ÓÄÉÈκÎл¼Õߣ¬£¬£¬²¢ÇÒ×ÅʵÑéÊÒ¡¢ºôÎüÖÎÁƼ°·ÅÉä¿ÆÒ²²»¿ÉÌṩ¼ì²éºÍÖÎÁÆÐ§ÀÍ¡£ ¡£¡£¡£¸ÃÒ½ÔºÕý½«ÃÅÕïЧÀÍ»ò¼±ÕïЧÀ͵ϼÕß·ÖÁ÷ÖÁÆäËüÒ½Ôº¡£ ¡£¡£¡£ÎÀÉú²¿ÖÒÑÔÆäËüÒ½Ôº¼ì²âÆäITЧÀÍ£¬£¬£¬²¢ÔÚ·¢Ã÷ÈκοÉÒÉÄÚÈÝʱÌáÐÑÕþ¸®¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.databreaches.net/wy-gillette-hospital-targeted-in-ransomware-attack/


4.AtlassianÐÞ¸´Jira ServerºÍService DeskÖеÄÁ½¸öÎó²î


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


AtlassianÐû²¼Jira ServerºÍService DeskµÄÇå¾²¸üУ¬£¬£¬ÐÞ¸´Á½¸öÇå¾²Îó²î¡£ ¡£¡£¡£µÚÒ»¸öÎó²îÊÇURL·¾¶±éÀúÎó²î£¨CVE-2019-14994£©£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓôËÎó²îÉó²éÄ¿µÄʵÀýÖеÄËùÓÐJiraÏîÄ¿£¬£¬£¬°üÀ¨Service DeskÏîÄ¿¡¢Jira CoreÏîÄ¿ºÍJira SoftwareÏîÄ¿¡£ ¡£¡£¡£TenableÑо¿Ö°Ô±Satnam Narang±¨¸æ³Æ2.5Íò¶à¸öÒ×Êܹ¥»÷µÄʵÀýÔÚÍøÉÏ̻¶£¬£¬£¬ËüÃÇÊôÓÚÒ½ÁÆ¡¢Õþ¸®¡¢½ÌÓýºÍÖÆÔìÐÐÒµµÈ¡£ ¡£¡£¡£µÚ¶þ¸öÎó²îÊÇJira Importers²å¼þÖеÄÄ£°å×¢ÈëÎó²î£¨CVE-2019-15001£©£¬£¬£¬¸ÃÎó²îÓ°ÏìÁËJira ServerºÍJira Data CenterµÄ7.0.10°æ±¾£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓøÃÎó²îÔ¶³ÌÖ´ÐдúÂë¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/jira-server-and-service-desk-fix-critical-security-bugs/


5.VMwareÐÞ¸´ESXi¡¢WorkstationµÈ²úÆ·ÖеÄÁ½¸öÎó²î


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


VMwareÐû²¼Çå¾²¸üУ¬£¬£¬ÐÞ¸´¶à¸ö²úÆ·ÖеÄÁ½¸öÎó²î¡£ ¡£¡£¡£µÚÒ»¸öÎó²îÊÇESXi¡¢Workstation¡¢Fusion¡¢VMRCºÍHorizon ClientÖеÄuse-after-freeÎó²î£¬£¬£¬¸ÃÎó²î£¨CVE-2019-5527£©µÄCVSS v3ÆÀ·ÖΪ8.5·Ö£¬£¬£¬ÊÇÒ»¸öÐéÄâ»úÌÓÒÝÎó²î£¬£¬£¬¿Í»§»úÉϾßÓзÇÖÎÀíԱȨÏÞµÄÍâµØ¹¥»÷Õß¿ÉʹÓøÃÎó²îÔÚËÞÖ÷»úÉÏÖ´ÐдúÂë¡£ ¡£¡£¡£µÚ¶þ¸öÎó²îÊÇWorkstationºÍFusionÖеÄDoSÎó²î£¨CVE-2019-5535£©£¬£¬£¬¸ÃÎó²îµÄCVSS v3ÆÀ·ÖΪ4.7·Ö¡£ ¡£¡£¡£¸ÃÎó²îÓëVMNATµÄIPv6ģʽÓйØ£¬£¬£¬¹¥»÷Õß¿ÉÒÔͨ¹ý·¢ËͶñÒâIPv6Êý¾Ý°üÀ´Õ¥È¡NATģʽÏ¿ͻ§»úÉϵÄÍøÂç»á¼û¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.vmware.com/security/advisories/VMSA-2019-0014.html


6.Ñо¿ÍŶÓÐû²¼Magecart¶ñÒâÓòÃûÉúÃüÖÜÆÚµÄÆÊÎö±¨¸æ


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


ƾ֤RiskIQµÄÒ»·ÝÐÂÑо¿£¬£¬£¬·¸·¨·Ö×ÓÕýÔÚ¶þ´ÎʹÓÃMagecart¶ñÒâÓòÃû¾ÙÐÐÆäËü¶ñÒâ»î¶¯¡£ ¡£¡£¡£ÔÚMagecartÁ÷Á¿±»sinkhole»òÆäËü·½·¨×èÖ¹»î¶¯ºó£¬£¬£¬·¸·¨·Ö×ӻṺÖÃÕâЩÓòÃû£¬£¬£¬´Ó¶øÊ¹Óñ»MagecartÉøÍ¸µÄÍøÕ¾·Ö·¢¶ñÒâ¹ã¸æ»ò¾ÙÐÐÆäËü¶ñÒâ»î¶¯¡£ ¡£¡£¡£ÕâÊÇÓÉÓÚÍøÕ¾ËùÓÐÕßÍùÍùûÓйØ×¢ÆäÍøÕ¾ÉÏÔËÐеÄJavaScript¾ç±¾£¬£¬£¬Êý¾ÝÏÔʾMagecartƲÔüÆ÷ÔÚÍøÕ¾ÉÏµÄÆ½¾ùÍ£Áôʱ¼äÁè¼ÝÁ½¸öÔ£¬£¬£¬²¢ÇÒÓÐÐí¶àÏÕЩÊÇÎÞÏÞÆÚµØÍ£ÁôÔÚÄÇÀï¡£ ¡£¡£¡£ÕâÖÖ²»¿É¼ûÐÔÒâζ×ÅÒ»µ©¶ñÒâÓòÃû±»Ôٴ줻£¬£¬¹¥»÷Õß¿ÉÒÔ¾ÙÐÐÆäËü¶ñÒâ»î¶¯À´Í¶Æõ¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.riskiq.com/blog/labs/magecart-reused-domains/