ÐÅÏ¢Çå¾²Öܱ¨-2018ÄêµÚ36ÖÜ

Ðû²¼Ê±¼ä 2018-09-10

 ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö

 

2018Äê09ÔÂ03ÈÕÖÁ09ÈÕ¹²ÊÕ¼Çå¾²Îó²î57¸ö£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇCisco Cloud Services Platform 2100 ÏÂÁî×¢ÈëÎó²î£»£»£»£»Opto22 PAC Control»º³åÇøÒç³öÎó²î£»£»£»£»ThinkPHP SQL×¢ÈëÎó²î£»£»£»£»Tenda AC9ºÍAC10 OSÏÂÁî×¢ÈëÎó²î£»£»£»£»Foxit Reader PDFÎļþ´¦Öóͷ£ÀàÐÍ»ìÏýÎó²î¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÑо¿Ö°Ô±·¢Ã÷Fiservƽ̨±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬¿Éµ¼ÖÂÊý°Ù¼ÒÒøÐеÄÓû§ÐÅϢй¶£»£»£»£»Ñо¿Ö°Ô±·¢Ã÷Ô¼57ÍòMortal OnlineÓÎÏ·Íæ¼ÒµÄƾ֤ÔÚÂÛ̳³öÊÛ£»£»£»£»Ñо¿ÍŶӷ¢Ã÷ʹÓÃ.tkÓòÃûµÄ´ó¹æÄ£¹ã¸æÕ©Æ­»î¶¯£»£»£»£»½©Ê¬ÍøÂçNecursÔÚ5ÔÂÖÁ7ÔÂʱ´ú·¢³öÁË78Íò·âÀ¬»øÓʼþ£»£»£»£»¿¨°Í˹»ùÐû²¼2018ÄêÉϰëÄ깤ҵ×Ô¶¯»¯ÏµÍ³µÄÍþв¾°¹Û±¨¸æ¡£¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£


Ö÷ÒªÇå¾²Îó²îÁбí

1. Cisco Cloud Services Platform 2100 ÏÂÁî×¢ÈëÎó²î

Cisco Cloud Services Platform 2100 WEB½Ó¿Ú±£´æÊäÈëÑéÖ¤Îó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬ÒÔWEBÉÏÏÂ

ÎÄÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-csp2100-injection


2. Opto22 PAC Control»º³åÇøÒç³öÎó²î

Opto22 PAC Control±£´æ»ùÓÚÕ»µÄ»º³åÇøÒç³öÎó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬¾ÙÐоܾøÐ§À͹¥»÷»òÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£
https://ics-cert.us-cert.gov/advisories/ICSA-18-247-01


3. ThinkPHP SQL×¢ÈëÎó²î

ThinkPHP public/index/index/test/indexÅÌÎÊ×Ö·û´®Öб£´æSQL×¢ÈëÎó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄSQLÇëÇ󣬣¬£¬£¬£¬²Ù×÷Êý¾Ý¿â£¬£¬£¬£¬£¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£
https://github.com/top-think/framework/issues/1375


4. Tenda AC9ºÍAC10 OSÏÂÁî×¢ÈëÎó²î

Tenda AC9ºÍAC10´¦Öóͷ£POSTÇëÇóÖеÄ'mcc'²ÎÊý±£´æÊäÈëÑéÖ¤Îó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬Ö´ÐÐí§ÒâOSÏÂÁî¡£¡£¡£
https://github.com/zsjevilhex/iot/blob/master/route/tenda/tenda-04/tenda.md


5. Foxit Reader PDFÎļþ´¦Öóͷ£ÀàÐÍ»ìÏýÎó²î

Foxit Reader´¦Öóͷ£PDFÎļþ±£´æÀàÐÍ»ìÏýÎó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇ󣬣¬£¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬£¬£¬¿ÉÖ´ÐÐí§Òâ´úÂë¡£¡£¡£
https://www.foxitsoftware.com/support/security-bulletins.php


 Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢Ñо¿Ö°Ô±·¢Ã÷Fiservƽ̨±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬¿Éµ¼ÖÂÊý°Ù¼ÒÒøÐеÄÓû§ÐÅϢй¶


c7c7ÓéÀÖÆ½Ì¨(ÖйúÓÎ)µÇ¼¹ÙÍøÈë¿Ú


Çå¾²Ñо¿Ö°Ô±Kristian Erik Hermansen·¢Ã÷½ðÈÚ»ú¹¹ÊÖÒÕЧÀÍÌṩÉÌFiservµÄÍøÂçÆ½Ì¨±£´æÎó²î£¬£¬£¬£¬£¬¿Éµ¼ÖÂÊý°Ù¼ÒÒøÐеÄÊý¾Ýй¶¡£¡£¡£FiservûÓÐÃ÷ȷ˵Ã÷Óм¸¶à½ðÈÚ»ú¹¹¿ÉÄÜÊܵ½Ó°Ï죬£¬£¬£¬£¬µ«¾Ý±¨µÀÏÖÔÚÓÐ1700¼ÒÒøÐÐÕýÔÚʹÓÃFiservƽ̨¡£¡£¡£Fiserv½²»°È˳Ƹù«Ë¾ÔÚÊÕµ½±¨¸æºó24СʱÄÚ¿ª·¢ÁËÐÞ¸´²¹¶¡²¢¾ÙÐÐÁ˰²ÅÅ¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/hundreds-of-banks-exposed-from/


2¡¢Ñо¿Ö°Ô±·¢Ã÷Ô¼57ÍòMortal OnlineÓÎÏ·Íæ¼ÒµÄƾ֤ÔÚÂÛ̳³öÊÛ


c7c7ÓéÀÖÆ½Ì¨(ÖйúÓÎ)µÇ¼¹ÙÍøÈë¿Ú


Çå¾²Ñо¿Ö°Ô±Adam Davies·¢Ã÷ÊôÓÚÔ¼57ÍòMortal OnlineÓÎÏ·Íæ¼ÒµÄÕË»§ÐÅÏ¢ÔÚÂÛ̳ÉϳöÊÛ¡£¡£¡£2018Äê6ÔÂ17ÈÕδ¾­ÊÚȨµÄµÚÈý·½»á¼ûÁ˸ÃÓÎÏ·µÄÂÛ̳ºÍÊÐËÁÊý¾Ý¿âµÄЧÀÍÆ÷²¢ÇÔÈ¡ÁËÓû§µÄÊý¾Ý¡£¡£¡£¹¥»÷Õß»¹»ñÈ¡ÁËÓû§ÃÜÂëµÄMD5¹þÏ£Öµ£¬£¬£¬£¬£¬ÕâЩ¹þÏ£ÖµËÆºõÒѱ»ÆÆ½â¡£¡£¡£¸ÃÊý¾Ý¿âÏÖÔÚÒѱ»Ìí¼Óµ½Have I Been PwnedÍøÕ¾ÖС£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/cracked-logins-of-570-000-mortal-online-players-sold-on-forums/


3¡¢Ñо¿ÍŶӷ¢Ã÷ʹÓÃ.tkÓòÃûµÄ´ó¹æÄ£¹ã¸æÕ©Æ­»î¶¯


c7c7ÓéÀÖÆ½Ì¨(ÖйúÓÎ)µÇ¼¹ÙÍøÈë¿Ú


ZscalerµÄÑо¿Ö°Ô±·¢Ã÷ʹÓÃ.tkÓòÃûµÄ´ó¹æÄ£¹ã¸æÕ©Æ­»î¶¯¡£¡£¡£×Ô2018Äê5ÔÂÒÔÀ´£¬£¬£¬£¬£¬¸Ã¶ñÒâ»î¶¯Ò»Ö±´¦ÓÚ»îԾ״̬¡£¡£¡£¹¥»÷Õß½«Óû§Öض¨ÏòÖÁÐéαµÄ²©¿ÍÍøÕ¾£¬£¬£¬£¬£¬ÕâÐ©ÍøÕ¾ÉÏµÄ¹ã¸æÊÕÈëÿÔ´ï2ÍòÃÀÔªÒÔÉÏ¡£¡£¡£²¿·Ö.tkÓòÃû»¹±»ÓÃÓÚÊÖÒÕÖ§³ÖÕ©Æ­¡£¡£¡£.tkÓòÃûÊÇÒ»¸ö¹ú¼Ò/µØÇø¼¶µÄ¶¥¼¶ÓòÃû£¬£¬£¬£¬£¬Ëü´ú±íÁËÁ¥ÊôÓÚÐÂÎ÷À¼µÄµº¹úTokelau¡£¡£¡£¸ÃÓòÃûÊÇÃâ·ÑµÄ£¬£¬£¬£¬£¬ÕâÒýÆðÁ˹¥»÷ÕßµÄÐËȤ¡£¡£¡£Ñо¿Ö°Ô±×ܹ²·¢Ã÷ÁËÓë¸Ã¶ñÒâ»î¶¯ÓйصÄ3804¸ö.tkÓòÃû¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.zscaler.com/blogs/research/spam-campaigns-leveraging-tk-domains


4¡¢½©Ê¬ÍøÂçNecursÔÚ5ÔÂÖÁ7ÔÂʱ´ú·¢³öÁË78Íò·âÀ¬»øÓʼþ


c7c7ÓéÀÖÆ½Ì¨(ÖйúÓÎ)µÇ¼¹ÙÍøÈë¿Ú


IBM X-ForceÑо¿ÍŶӷ¢Ã÷½©Ê¬ÍøÂçNecursÔÚ5ÔÂÖÁ7ÔÂʱ´ú¹²·¢³öÁËÁè¼Ý78Íò·âÀ¬»øÓʼþ¡£¡£¡£ÕâЩÀ¬»øÓʼþ¶¼°üÀ¨¶ñÒâµÄIQYÎļþ£¬£¬£¬£¬£¬ÓÃÓÚ·Ö·¢¶ñÒâÈí¼þFlawedAmmyy RAT¡¢MarapºÍQuant Loader¡£¡£¡£Ñо¿Ö°Ô±¹²ÊӲ쵽5¸ö¹¥»÷À˳±£¬£¬£¬£¬£¬5ÔÂ25ÈÕNecurs·¢ËÍÁËÁè¼Ý30Íò·âÀ¬»øÓʼþ£¬£¬£¬£¬£¬6ÔÂ7ÈÕÓÖ·¢ËÍÁËÔ¼20Íò·â¡£¡£¡£ËæºóµÄ6ÔÂ13ÈÕ·¢ËÍÁËÁè¼Ý15Íò·â£¬£¬£¬£¬£¬7ÔÂ13ÈÕ²»µ½10Íò·âÒÔ¼°7ÔÂ17ÈÕµÄÉÙÓÚ5Íò·â¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/necurs-spews-780-000-emails-with-weaponized-iqy-files/


5¡¢¿¨°Í˹»ùÐû²¼2018ÄêÉϰëÄ깤ҵ×Ô¶¯»¯ÏµÍ³µÄÍþв¾°¹Û±¨¸æ


c7c7ÓéÀÖÆ½Ì¨(ÖйúÓÎ)µÇ¼¹ÙÍøÈë¿Ú


¿¨°Í˹»ùʵÑéÊÒICS CERTÐû²¼¹ØÓÚ2018ÄêÉϰëÄ깤ҵ×Ô¶¯»¯ÏµÍ³µÄÍþв¾°¹ÛµÄÆÊÎö±¨¸æ¡£¡£¡£Óë2017ÄêϰëÄêÏà±È£¬£¬£¬£¬£¬2018ÄêÉϰëÄêÔâµ½¹¥»÷µÄICSÅÌËã»úµÄ±ÈÀýÔöÌíÁË3.5¸ö°Ù·Öµã£¬£¬£¬£¬£¬µÖ´ïÁË41.2%¡£¡£¡£Í¬±ÈÔòÊÇÔöÌíÁË4.6¸ö°Ù·Öµã¡£¡£¡£·ÇÖÞ¡¢ÑÇÖÞºÍÀ­¶¡ÃÀÖÞµÄICSÅÌËã»úÔâµ½¹¥»÷µÄ±ÈÀýÔ¶µÍÓÚÅ·ÖÞ¡¢±±ÃÀºÍ°Ä´óÀûÑÇ¡£¡£¡£¶«Å·µÄÊý×ÖÒ²Ô¶´óÓÚÎ÷Å·µÄÊý×Ö¡£¡£¡£ÄÏÅ·Ôâµ½¹¥»÷µÄICSÅÌËã»úµÄ±ÈÀýÒª¸ßÓÚ±±Å·ºÍÎ÷Å·¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://securelist.com/threat-landscape-for-industrial-automation-systems-in-h1-2018/87913/