¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20190315

Ðû²¼Ê±¼ä 2019-03-15
1¡¢Wordpress CSRFÎó²î  £¬¿Éµ¼ÖÂÖ´ÐÐí§Òâ´úÂë

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


RIPSÑо¿Ö°Ô±Simon Scannell·¢Ã÷Wordpress 5.1Öб£´æÒ»¸öCSRFÎó²î  £¬¿ÉÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÖ´ÐÐí§Òâ´úÂë¡£¹¥»÷Õßͨ¹ýÓÕÆ­ÍøÕ¾ÖÎÀíÔ±»á¼û°üÀ¨Îó²îʹÓôúÂëµÄ¶ñÒâÍøÕ¾  £¬¿ÉÒÔÏòÄ¿µÄWordPressÍøÕ¾×¢Èë´æ´¢ÐÍXSS payload  £¬²¢Ê¹ÓøÃpayloadÍêÈ«¿ØÖƸÃÍøÕ¾¡£±¾ÖÜÈýWordPressÍŶÓÐû²¼ÁËа汾WordPress 5.1.1ÒÔÐÞ¸´¸ÃÎó²î¡£

   

Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2019/03/hack-wordpress-websites.html

2¡¢Ë¼¿ÆÐû²¼Çå¾²¸üР £¬ÐÞ¸´CSPCÈí¼þÖеĺóÃÅÕË»§Îó²î

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


˼¿ÆÐÞ¸´ÁËͨË×·þÎñÆ½Ì¨ÍøÂçÆ÷£¨CSPC£©Èí¼þÖеÄÒ»¸öºóÃÅÕË»§Îó²î  £¬¸ÃÎó²î£¨CVE-2019-1723£©°üÀ¨Ò»¸ö´øÓо²Ì¬ÃÜÂëµÄĬÈÏÕË»§  £¬ËäÈ»¸ÃÕË»§Ã»ÓÐÖÎÀíԱȨÏÞ  £¬µ«Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓøÃÎó²î»ñµÃϵͳµÄ»á¼ûȨÏÞ¡£Æ¾Ö¤Ë¼¿ÆµÄ˵·¨  £¬¸ÃÎó²îÓ°ÏìÁËCSPC°æ±¾2.7.2µ½2.7.4.5ÒÔ¼°ËùÓеÄ2.8.x°æ±¾  £¬²¢ÒÑÔÚ°æ±¾2.7.4.6ºÍ2.8.1.2ÖлñµÃÐÞ¸´¡£

  

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/82391/security/common-services-platform-collector-flaw.html

3¡¢°Í»ùË¹Ì¹ÒÆÃñ¾Ö¹ÙÍøÔâºÚ¿ÍÈëÇÖ  £¬±»Ö²Èë¼üÅ̼ͼľÂí

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!

°Í»ùË¹Ì¹ÒÆÃñÓ뻤ÕվֵĹÙÍøtracking.dgip.gov[.]pkÔâºÚ¿ÍÈëÇÖ  £¬¹¥»÷ÕßÔÚÍøÕ¾ÉÏÖ²ÈëÁ˶ñÒâ´úÂëÒÔ¸ú×ÙÓû§¡£±»Ö²ÈëµÄpayloadÊÇScanBox  £¬¸Ã±äÖÖ¿ÉÒÔÍøÂçÍøÕ¾»á¼ûÕßµÄϵͳÐÅÏ¢²¢¾ÙÐмüÅ̼ͼ¡£±ðµÄ  £¬¸Ã±äÖÖ»¹ÊÔͼ¼ì²â»á¼ûÕßÊÇ·ñ×°ÖÃÁËÌØ¶¨µÄÇå¾²²úÆ·¡¢½âѹËõ¹¤¾ßºÍÐéÄâ»ú¹¤¾ßµÈ  £¬Õâ¸öÁÐ±í³¤´ï77Ïî  £¬¸ÃÐÐΪ¿ÉÄÜÊÇÕë¶ÔÌØ¶¨Ä¿µÄȺÌåµÄË®¿Ó¹¥»÷µÄÒ»²¿·Ö¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/pakistani-government-site-compromised-logs-visitor-keystrokes/

4¡¢SteamÉÏ39£¥µÄCS 1.6·þÎñÆ÷ÏòÍæ¼Ò·Ö·¢BelonardľÂí

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ÔÚDr.WebµÄÒ»·Ýб¨¸æÖÐ  £¬Ñо¿Ö°Ô±·¢Ã÷Steam¹Ù·½¿Í»§¶ËÉϵÄÔ¼5000¸öCS 1.6·þÎñÆ÷ÖÐÓÐ1951¸ö·þÎñÆ÷£¨39%£©ÏòÍæ¼Ò·Ö·¢BelonardľÂí¡£¹¥»÷ÕßʹÓÃÕâÖÖ·½·¨½¨ÉèÁËBelonard½©Ê¬ÍøÂç  £¬µ±Íæ¼ÒÅþÁ¬µ½¶ñÒâ·þÎñÆ÷ʱ  £¬Belonard½©Ê¬ÍøÂçʹÓÃCS 1.6¿Í»§¶ËÖеÄRCEÎó²î¾ÙÐÐѬȾ¡£ÓÉÓÚCS 1.6ÊÇValveÐû²¼µÄ¸ÃÓÎÏ·×îºóÒ»¸ö°æ±¾  £¬Òò´Ë¿Í»§¶ËÖеÄRCEÎó²î²»»á»ñµÃÐÞ¸´  £¬ËùÓÐÍæ¼Ò¶¼¿ÉÄܳÉΪDZÔÚµÄÊܺ¦Õß¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/39-percent-of-all-counter-strike-16-servers-used-to-infect-players/

5¡¢ÐÂCryptoSinkÍÚ¿ó¹¥»÷  £¬Ö÷ÒªÕë¶ÔElasticsearch·þÎñÆ÷

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


F5 NetworksÑо¿ÍŶӷ¢Ã÷Ò»¸öÕë¶ÔElasticsearch·þÎñÆ÷µÄжñÒâÔ˶¯CryptoSink  £¬¹¥»÷ÕßʹÓÃ2014ÄêµÄÎó²î£¨CVE-2014-3120£©À´Èö²¥ÃÅÂޱҿ󹤡£ÔÚLinuxÉÏ  £¬¹¥»÷ÕßʹÓÃÁËһЩÒÔǰδ֪µÄ¶ñÒâÈí¼þ£¨°üÀ¨ÏÂÔØ³ÌÐòºÍľÂí£©  £¬·À²¡¶¾½â¾ö¼Æ»®ÎÞ·¨¼ì²âµ½ËüÃÇ¡£¹¥»÷Õß»¹»á½«ÆäËüÁ÷Á¿µ¼Èë127.1.1.1À´É±ËÀÆäËüµÄ¾ºÕù¿ó¹¤¡£Æä¾ßÓжà¸öC&C·þÎñÆ÷  £¬Ä¿½ñ»îÔ¾µÄC&C·þÎñÆ÷λÓÚÖйú¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.f5.com/labs/articles/threat-intelligence/-cryptosink--campaign-deploys-a-new-miner-malware

6¡¢PoS¶ñÒâÈí¼þDMSniff  £¬×Ô2016ÄêÀ´Ò»Ö±Õë¶ÔÖÐСÐÍÆóÒµ

×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


FlashpointÑо¿ÍŶӷ¢Ã÷PoS¶ñÒâÈí¼þDMSniff×Ô2016Äê×îÏÈÒ»Ö±»îÔ¾  £¬ËüÖ÷ÒªÕë¶ÔÖÐСÐÍÆóÒµ  £¬°üÀ¨²Í¹Ý¡¢¾çÔºÒÔ¼°ÆäËüÓéÀÖ³¡ºÏµÈ¡£DMSniffÖ÷ÒªÇÔÊØÐÅÓÿ¨Êý¾Ý  £¬Ëü»áÒ»Ö±ä¯ÀÀÀú³ÌÁбí  £¬²¢´ÓÄÚ´æÖÐÆÊÎöÐÅÓÿ¨ºÅ  £¬È»ºó½«ÕâЩÐÅÏ¢·¢ËÍÖÁC&C·þÎñÆ÷¡£DMSniff×Ô2016ÄêÒÔÀ´ÖÁÉÙʹÓùý11ÖÖDGAËã·¨±äÌå  £¬ÕâÒâζ×ÅÆäÖÁÉÙ°²ÅŹý11¸ö°æ±¾¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/dmsniff-point-of-sale-malware-silently-attacked-smbs-for-years/

ÉùÃ÷£º±¾×ÊѶÓÉ×ðÁú¿­Ê±Î¬ËûÃüÇ徲С×é·­ÒëºÍÕûÀí