¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181220

Ðû²¼Ê±¼ä 2018-12-20
1¡¢Elasticsearch Kibana¿ØÖÆÌ¨Îļþ°üÀ¨Îó²î£¬PoC´úÂëÒÑÐû²¼

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


KibanaÊÇElasticsearchµÄÊý¾Ý¿ÉÊÓ»¯¹¤¾ß£¬ÆäConsole²å¼þ±£´æÍâµØÎļþ°üÀ¨£¨LFI£©Îó²î£¬Ñо¿Ö°Ô±Ðû²¼Á˸ÃÎó²îµÄPoC´úÂë ¡£¸ÃÎó²î£¨CVE-2018-17246£©Ó°ÏìÁË6.4.3ºÍ5.6.13֮ǰµÄKibana°æ±¾£¬ÀÖ³ÉʹÓøÃÎó²î¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐÐ ¡£ElasticÒÑÔÚ×îа汾µÄKibanaÖÐÐÞ¸´Á˸ÃÎó²î£¬ÈôÊÇÓû§ÔÝʱÎÞ·¨¸üУ¬Ò²¿ÉÒÔÔÚÉèÖÃÎļþÖнûÓøÃConsole²å¼þÀ´¹æ±ÜÕâÒ»ÎÊÌâ ¡£

   

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/file-inclusion-bug-in-kibana-console-for-elasticsearch-gets-exploit-code/


2¡¢»ªË¶ºÍ¼¼¼ÎÇý¶¯³ÌÐò±£´æ¶à¸öÎó²î£¬²¿·ÖÈÔδÐÞ¸´

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!



SecureAuthÑо¿Ö°Ô±·¢Ã÷»ªË¶ºÍ¼¼¼ÎµÄËĸöÇý¶¯³ÌÐò±£´æ7¸öÎó²î£¬¹²Ó°ÏìÁË5¸öÈí¼þ²úÆ· ¡£ÆäÖлªË¶µÄAura Sync£¨v1.07.22¼°Ö®Ç°µÄ°æ±¾£©×°ÖõÄÇý¶¯£¨GLCKIoºÍAsusgio£©±£´æÈý¸öÎó²î£¨CVE-2018-18537¡¢CVE-2018-18536ºÍCVE-2018-18535£©£¬ÕâЩÎó²î¿Éµ¼ÖÂÌáȨ¡¢ÏµÍ³Íß½âºÍÍâµØ´úÂëÖ´ÐÐ ¡£¼¼¼ÎµÄGPCIDrvºÍGDrvÇý¶¯³ÌÐò±£´æ4¸öÎó²î£¨CVE-2018-19320~CVE-2018-19323£©£¬Í¬Ñù¿Éµ¼ÖÂÌáȨºÍϵͳÍß½âµÈ ¡£SecureAuthÓÚ2017Äê11ÔÂ×îÏÈͬ»ªË¶Ïàͬ£¬µ«Ö±ÖÁ2018Äê5Ô»ªË¶Ö»ÐÞ¸´ÁËÈý¸öÎó²îÖеÄÒ»¸ö ¡£SecureAuthÓÚ2018Äê4ÔÂ24ÈÕ×îÏÈͬ¼¼¼ÎÏàͬ£¬µ«¼¼¼Î¹¤³Ìʦ»Ø¸´³ÆÆä²úƷûÓÐÊܵ½Ëù±¨¸æµÄÎó²îµÄÓ°Ïì ¡£

 

 Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/asus-gigabyte-drivers-contain-code-execution-vulnerabilities-pocs-galore/


3¡¢ABB PLCÍø¹Ø±£´æÁ½¸öÎó²î£¬¿Éµ¼Ö¾ܾø·þÎñ

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


Applied RiskÑо¿Ö°Ô±·¢Ã÷ABB¹«Ë¾µÄPLCÍø¹Ø£¨GATE-E1ºÍGATE-E2£©±£´æÁ½¸öÇå¾²Îó²î ¡£ÕâÁ½¸öÎó²î»®·ÖÊÇ×°±¸ÖÎÀí½çÃæµÄÉí·ÝÑé֤ȱʧÎó²î£¨CVE-2018-18995£©ºÍXSSÎó²î£¨CVE-2018-18997£© ¡£ABB³ÆÓÉÓÚÊÜÓ°ÏìµÄ²úÆ·ÒѾ­µÖ´ïʹÓÃÊÙÃü£¬Òò´Ë²»»áÕë¶ÔÕâЩÎó²îÐû²¼¹Ì¼þ¸üР¡£Ñо¿Ö°Ô±²¢Ã»Óз¢Ã÷¸ÃÎó²îÔÚÒ°ÍⱻʹÓõÄÖ¤¾Ý ¡£

 

 Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/78995/security/abb-plc-gateways-flaws.html


4¡¢NASAÅû¶Êý¾Ýй¶ÊÂÎñ£¬²¿·ÖÔ±¹¤µÄPIIÐÅÏ¢±»µÁ

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


NASA±»ºÚ£¬Æ¾Ö¤¸Ã»ú¹¹µÄ˵·¨£¬NASAÔÚ10ÔÂ23ÈÕ·¢Ã÷ÁËÕâÒ»Êý¾Ýй¶ÊÂÎñ£¬ÆäÒ»¸ö´æ´¢Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©µÄ·þÎñÆ÷Ôâµ½ºÚ¿ÍÈëÇÖ£¬2006Äê7ÔÂÖÁ2018Äê10ÔÂʱ´ú¼ÓÈëNASAµÄÔ±¹¤µÄPIIÐÅϢй¶£¬°üÀ¨È¥Ö°»òµ÷Ö°µÄÔ±¹¤ ¡£NASAÏÖÔÚÓµÓÐÔ¼17300ÃûÔ±¹¤ ¡£¸Ã»ú¹¹ÌåÏÖûÓÐÌ«¿ÕʹÃüÊܵ½Ó°Ïì ¡£

 

 Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2018/12/nasa-hack-data-breach.html


5¡¢McAfeeÐû²¼12ÔÂÍøÂçÍþв±¨¸æ£¬ÆÊÎöÍþвÇ÷ÊÆµÄÑݱä

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ƾ֤McAfeeʵÑéÊÒÐû²¼µÄ2018Äê12ÔÂÍøÂçÍþв±¨¸æ£¬2018ÄêµÚÈý¼¾¶ÈÕë¶ÔÎïÁªÍø×°±¸µÄжñÒâÈí¼þÔöÌíÁË72%£¬°ÕÁËÍùËĸö¼¾¶ÈµÄ×ÜÌåÔöÌíÊÇ203£¥£»ÐµĶñÒâ¿ó¹¤ÔöÌíÁ˽ü55%£¬°ÕÁËÍùËĸö¼¾¶ÈµÄ×ÜÌåÔöÌíÊÇ4467% ¡£¹ØÓÚÎÞÎļþ¶ñÒâÈí¼þÀàÐÍ£¬ÐµÄJavaScript¶ñÒâÈí¼þÔöÌíÁË45%£¬¶øÐµÄPowerShell¶ñÒâÈí¼þÔöÌíÁË24% ¡£ÐµÄÒÆ¶¯¶ñÒâÈí¼þïÔÌ­ÁË24%£¬ÐµÄmacOS¶ñÒâÈí¼þÑù±¾ÔöÌíÁË9% ¡£

 

 Ô­ÎÄÁ´½Ó£º

https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/mcafee-labs-threats-report-examines-cybercriminal-underground-iot-malware-other-threats/


6¡¢APT28½¨ÉèZebrocyľÂíµÄÐÂGoÓïÑÔ±äÌå

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


Palo Alto NetworksµÄUnit42Ñо¿ÍŶӷ¢Ã÷APT×éÖ¯Sofacy£¨ÓÖÃûAPT28£©¿ª·¢ÁËGoÓïÑÔ°æ±¾µÄZebrocyľÂíбäÌå ¡£ÒÑÍù¸Ã×éÖ¯Ò²¿ª·¢ÁËAutoIt¡¢Delphi¡¢VB.NET¡¢C££ºÍVisual C ++°æ±¾µÄZebrocy£¬Ñо¿Ö°Ô±ÒÔΪSofacy½¨Éè¶àÖÖÓïÑԵıäÌåÊÇΪÁ˸üºÃµØÌӱܼì²â ¡£Zebrocy Go±äÌåµÄµÚÒ»´Î¹¥»÷±¬·¢ÔÚ2018Äê10ÔÂ11ÈÕ£¬Í¨¹ý´¹ÂÚÓʼþ¾ÙÐн»¸¶£¬µ«ÆäѬȾÁ´ÖеÄPowerShell¾ç±¾±£´æ±àÂë¹ýʧ£¬Òò´ËÕâÒ»´Î¹¥»÷ÊÇʧ°ÜµÄ ¡£µÚ¶þ´Î¹¥»÷±¬·¢ÔÚ10ÔÂÖÐÑ®µ½11ÔÂÖÐѮ֮¼ä ¡£

  

Ô­ÎÄÁ´½Ó£º

https://unit42.paloaltonetworks.com/sofacy-creates-new-go-variant-of-zebrocy-tool/


ÉùÃ÷£º±¾×ÊѶÓÉ×ðÁú¿­Ê±Î¬ËûÃüÇ徲С×é·­ÒëºÍÕûÀí