ÐÅÏ¢Çå¾²Öܱ¨-2018ÄêµÚ36ÖÜ

Ðû²¼Ê±¼ä 2018-09-10

 ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö

 

2018Äê09ÔÂ03ÈÕÖÁ09ÈÕ¹²ÊÕ¼Çå¾²Îó²î57¸ö£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇCisco Cloud Services Platform 2100 ÏÂÁî×¢ÈëÎó²î£»£»£»£»£»Opto22 PAC Control»º³åÇøÒç³öÎó²î£»£»£»£»£»ThinkPHP SQL×¢ÈëÎó²î£»£»£»£»£»Tenda AC9ºÍAC10 OSÏÂÁî×¢ÈëÎó²î£»£»£»£»£»Foxit Reader PDFÎļþ´¦Öóͷ£ÀàÐÍ»ìÏýÎó²î¡£¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÑо¿Ö°Ô±·¢Ã÷Fiservƽ̨±£´æÇå¾²Îó²î£¬£¬£¬£¬¿Éµ¼ÖÂÊý°Ù¼ÒÒøÐеÄÓû§ÐÅϢй¶£»£»£»£»£»Ñо¿Ö°Ô±·¢Ã÷Ô¼57ÍòMortal OnlineÓÎÏ·Íæ¼ÒµÄƾ֤ÔÚÂÛ̳³öÊÛ£»£»£»£»£»Ñо¿ÍŶӷ¢Ã÷ʹÓÃ.tkÓòÃûµÄ´ó¹æÄ£¹ã¸æÕ©Æ­»î¶¯£»£»£»£»£»½©Ê¬ÍøÂçNecursÔÚ5ÔÂÖÁ7ÔÂʱ´ú·¢³öÁË78Íò·âÀ¬»øÓʼþ£»£»£»£»£»¿¨°Í˹»ùÐû²¼2018ÄêÉϰëÄ깤ҵ×Ô¶¯»¯ÏµÍ³µÄÍþв¾°¹Û±¨¸æ¡£¡£¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£


Ö÷ÒªÇå¾²Îó²îÁбí

1. Cisco Cloud Services Platform 2100 ÏÂÁî×¢ÈëÎó²î

Cisco Cloud Services Platform 2100 WEB½Ó¿Ú±£´æÊäÈëÑéÖ¤Îó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬ÒÔWEBÉÏÏÂ

ÎÄÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-csp2100-injection


2. Opto22 PAC Control»º³åÇøÒç³öÎó²î

Opto22 PAC Control±£´æ»ùÓÚÕ»µÄ»º³åÇøÒç³öÎó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬¾ÙÐоܾøÐ§À͹¥»÷»òÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£
https://ics-cert.us-cert.gov/advisories/ICSA-18-247-01


3. ThinkPHP SQL×¢ÈëÎó²î

ThinkPHP public/index/index/test/indexÅÌÎÊ×Ö·û´®Öб£´æSQL×¢ÈëÎó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄSQLÇëÇ󣬣¬£¬£¬²Ù×÷Êý¾Ý¿â£¬£¬£¬£¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£
https://github.com/top-think/framework/issues/1375


4. Tenda AC9ºÍAC10 OSÏÂÁî×¢ÈëÎó²î

Tenda AC9ºÍAC10´¦Öóͷ£POSTÇëÇóÖеÄ'mcc'²ÎÊý±£´æÊäÈëÑéÖ¤Îó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬Ö´ÐÐí§ÒâOSÏÂÁî¡£¡£¡£¡£
https://github.com/zsjevilhex/iot/blob/master/route/tenda/tenda-04/tenda.md


5. Foxit Reader PDFÎļþ´¦Öóͷ£ÀàÐÍ»ìÏýÎó²î

Foxit Reader´¦Öóͷ£PDFÎļþ±£´æÀàÐÍ»ìÏýÎó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇ󣬣¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬£¬¿ÉÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£
https://www.foxitsoftware.com/support/security-bulletins.php


 Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢Ñо¿Ö°Ô±·¢Ã÷Fiservƽ̨±£´æÇå¾²Îó²î£¬£¬£¬£¬¿Éµ¼ÖÂÊý°Ù¼ÒÒøÐеÄÓû§ÐÅϢй¶


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


Çå¾²Ñо¿Ö°Ô±Kristian Erik Hermansen·¢Ã÷½ðÈÚ»ú¹¹ÊÖÒÕЧÀÍÌṩÉÌFiservµÄÍøÂçÆ½Ì¨±£´æÎó²î£¬£¬£¬£¬¿Éµ¼ÖÂÊý°Ù¼ÒÒøÐеÄÊý¾Ýй¶¡£¡£¡£¡£FiservûÓÐÃ÷ȷ˵Ã÷Óм¸¶à½ðÈÚ»ú¹¹¿ÉÄÜÊܵ½Ó°Ï죬£¬£¬£¬µ«¾Ý±¨µÀÏÖÔÚÓÐ1700¼ÒÒøÐÐÕýÔÚʹÓÃFiservƽ̨¡£¡£¡£¡£Fiserv½²»°È˳Ƹù«Ë¾ÔÚÊÕµ½±¨¸æºó24СʱÄÚ¿ª·¢ÁËÐÞ¸´²¹¶¡²¢¾ÙÐÐÁ˰²ÅÅ¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/hundreds-of-banks-exposed-from/


2¡¢Ñо¿Ö°Ô±·¢Ã÷Ô¼57ÍòMortal OnlineÓÎÏ·Íæ¼ÒµÄƾ֤ÔÚÂÛ̳³öÊÛ


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


Çå¾²Ñо¿Ö°Ô±Adam Davies·¢Ã÷ÊôÓÚÔ¼57ÍòMortal OnlineÓÎÏ·Íæ¼ÒµÄÕË»§ÐÅÏ¢ÔÚÂÛ̳ÉϳöÊÛ¡£¡£¡£¡£2018Äê6ÔÂ17ÈÕδ¾­ÊÚȨµÄµÚÈý·½»á¼ûÁ˸ÃÓÎÏ·µÄÂÛ̳ºÍÊÐËÁÊý¾Ý¿âµÄЧÀÍÆ÷²¢ÇÔÈ¡ÁËÓû§µÄÊý¾Ý¡£¡£¡£¡£¹¥»÷Õß»¹»ñÈ¡ÁËÓû§ÃÜÂëµÄMD5¹þÏ£Öµ£¬£¬£¬£¬ÕâЩ¹þÏ£ÖµËÆºõÒѱ»ÆÆ½â¡£¡£¡£¡£¸ÃÊý¾Ý¿âÏÖÔÚÒѱ»Ìí¼Óµ½Have I Been PwnedÍøÕ¾ÖС£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/cracked-logins-of-570-000-mortal-online-players-sold-on-forums/


3¡¢Ñо¿ÍŶӷ¢Ã÷ʹÓÃ.tkÓòÃûµÄ´ó¹æÄ£¹ã¸æÕ©Æ­»î¶¯


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


ZscalerµÄÑо¿Ö°Ô±·¢Ã÷ʹÓÃ.tkÓòÃûµÄ´ó¹æÄ£¹ã¸æÕ©Æ­»î¶¯¡£¡£¡£¡£×Ô2018Äê5ÔÂÒÔÀ´£¬£¬£¬£¬¸Ã¶ñÒâ»î¶¯Ò»Ö±´¦ÓÚ»îԾ״̬¡£¡£¡£¡£¹¥»÷Õß½«Óû§Öض¨ÏòÖÁÐéαµÄ²©¿ÍÍøÕ¾£¬£¬£¬£¬ÕâÐ©ÍøÕ¾ÉÏµÄ¹ã¸æÊÕÈëÿÔ´ï2ÍòÃÀÔªÒÔÉÏ¡£¡£¡£¡£²¿·Ö.tkÓòÃû»¹±»ÓÃÓÚÊÖÒÕÖ§³ÖÕ©Æ­¡£¡£¡£¡£.tkÓòÃûÊÇÒ»¸ö¹ú¼Ò/µØÇø¼¶µÄ¶¥¼¶ÓòÃû£¬£¬£¬£¬Ëü´ú±íÁËÁ¥ÊôÓÚÐÂÎ÷À¼µÄµº¹úTokelau¡£¡£¡£¡£¸ÃÓòÃûÊÇÃâ·ÑµÄ£¬£¬£¬£¬ÕâÒýÆðÁ˹¥»÷ÕßµÄÐËȤ¡£¡£¡£¡£Ñо¿Ö°Ô±×ܹ²·¢Ã÷ÁËÓë¸Ã¶ñÒâ»î¶¯ÓйصÄ3804¸ö.tkÓòÃû¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.zscaler.com/blogs/research/spam-campaigns-leveraging-tk-domains


4¡¢½©Ê¬ÍøÂçNecursÔÚ5ÔÂÖÁ7ÔÂʱ´ú·¢³öÁË78Íò·âÀ¬»øÓʼþ


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


IBM X-ForceÑо¿ÍŶӷ¢Ã÷½©Ê¬ÍøÂçNecursÔÚ5ÔÂÖÁ7ÔÂʱ´ú¹²·¢³öÁËÁè¼Ý78Íò·âÀ¬»øÓʼþ¡£¡£¡£¡£ÕâЩÀ¬»øÓʼþ¶¼°üÀ¨¶ñÒâµÄIQYÎļþ£¬£¬£¬£¬ÓÃÓÚ·Ö·¢¶ñÒâÈí¼þFlawedAmmyy RAT¡¢MarapºÍQuant Loader¡£¡£¡£¡£Ñо¿Ö°Ô±¹²ÊӲ쵽5¸ö¹¥»÷À˳±£¬£¬£¬£¬5ÔÂ25ÈÕNecurs·¢ËÍÁËÁè¼Ý30Íò·âÀ¬»øÓʼþ£¬£¬£¬£¬6ÔÂ7ÈÕÓÖ·¢ËÍÁËÔ¼20Íò·â¡£¡£¡£¡£ËæºóµÄ6ÔÂ13ÈÕ·¢ËÍÁËÁè¼Ý15Íò·â£¬£¬£¬£¬7ÔÂ13ÈÕ²»µ½10Íò·âÒÔ¼°7ÔÂ17ÈÕµÄÉÙÓÚ5Íò·â¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/necurs-spews-780-000-emails-with-weaponized-iqy-files/


5¡¢¿¨°Í˹»ùÐû²¼2018ÄêÉϰëÄ깤ҵ×Ô¶¯»¯ÏµÍ³µÄÍþв¾°¹Û±¨¸æ


ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


¿¨°Í˹»ùʵÑéÊÒICS CERTÐû²¼¹ØÓÚ2018ÄêÉϰëÄ깤ҵ×Ô¶¯»¯ÏµÍ³µÄÍþв¾°¹ÛµÄÆÊÎö±¨¸æ¡£¡£¡£¡£Óë2017ÄêϰëÄêÏà±È£¬£¬£¬£¬2018ÄêÉϰëÄêÔâµ½¹¥»÷µÄICSÅÌËã»úµÄ±ÈÀýÔöÌíÁË3.5¸ö°Ù·Öµã£¬£¬£¬£¬µÖ´ïÁË41.2%¡£¡£¡£¡£Í¬±ÈÔòÊÇÔöÌíÁË4.6¸ö°Ù·Öµã¡£¡£¡£¡£·ÇÖÞ¡¢ÑÇÖÞºÍÀ­¶¡ÃÀÖÞµÄICSÅÌËã»úÔâµ½¹¥»÷µÄ±ÈÀýÔ¶µÍÓÚÅ·ÖÞ¡¢±±ÃÀºÍ°Ä´óÀûÑÇ¡£¡£¡£¡£¶«Å·µÄÊý×ÖÒ²Ô¶´óÓÚÎ÷Å·µÄÊý×Ö¡£¡£¡£¡£ÄÏÅ·Ôâµ½¹¥»÷µÄICSÅÌËã»úµÄ±ÈÀýÒª¸ßÓÚ±±Å·ºÍÎ÷Å·¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://securelist.com/threat-landscape-for-industrial-automation-systems-in-h1-2018/87913/