΢ÈíÕý×ÅÊÖÊÓ²ìй¶ExchangeÎó²îϸ½ÚµÄÇå¾²³§ÉÌ£»GoogleÔÙ·¢²¹¶¡£¬ÐÞ¸´½ñÄêµÚ3¸ö±»Ê¹ÓõÄchrome 0day
Ðû²¼Ê±¼ä 2021-03-171.΢ÈíÕý×ÅÊÖÊÓ²ìй¶ExchangeÎó²îϸ½ÚµÄÇå¾²³§ÉÌ

΢ÈíÏÖÔÚÕý×ÅÊÖÊÓ²ìй¶ÁËMicrosoft ExchangeÎó²îϸ½ÚµÄÇå¾²³§ÉÌ¡£ÔÚ²¹¶¡Ðû²¼Ö®Ç°£¬Î¢ÈíÒÑÓÚ2ÔÂ23ÈÕ½«¸ÃÎó²îµÄPoC´úÂë·¢Ë͸øÁ˼ÓÈëMicrosoft Active ProtectionsÍýÏ루Mapp£©µÄÍøÂçÇå¾²¹«Ë¾£¬Éæ¼°Ô¼80¸ö×éÖ¯¡£Î¢ÈíÌåÏÖ£¬ÏÖÔÚÓÃÓÚ¹¥»÷µÄÎó²îʹÓù¤¾ßÓëÆäÆäʱ¹²ÏíµÄPoC´úÂëÀàËÆ¡£Òò´Ë£¬Î¢ÈíÏÓÒÉ´Ë´ÎÕë¶ÔMicrosoft Exchange·þÎñÆ÷µÄ¹¥»÷À˳±ÓëÇå¾²³§ÉÌй¶Îó²îÐÅÏ¢Óйأ¬²¢ÌåÏÖÈôÊÇÊÇMAPP¹«Ë¾Ð¹Â¶ÁËÏà¹ØÐÅÏ¢£¬ËûÃǽ«¿ª³ý¸Ã³ÉÔ±¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/microsoft-investigates-potential-tie-between-partner-firm-and-potential-exchange-bug-leak/
2.GoogleÔÙ·¢²¹¶¡£¬ÐÞ¸´½ñÄêµÚ3¸ö±»Ê¹ÓõÄchrome 0day

GoogleÓÚ±¾Ôµڶþ´ÎÐû²¼²¹¶¡£¬ÐÞ¸´½ñÄêµÚ3¸ö±»Ê¹ÓõÄchrome 0day¡£¸ÃÎó²î±£´æÓÚBlinkÖУ¬ÊÇÒ»¸öÊͷźóʹÓÃÎó²î£¨CVE-2021-21193£©£¬CVSSÆÀ·ÖΪ8.8£¬¹¥»÷Õß¿ÉʹÓøÃÎó²îÖ´ÐÐí§Òâ´úÂë»ò´¥·¢¾Ü¾ø·þÎñ״̬¡£³ý´ËÖ®Í⣬´Ë´Î¸üл¹ÐÞ¸´ÁËWebRTCÖеÄÊͷźóʹÓÃÎó²î£¨CVE-2021-21191£©ºÍChromeÑ¡ÏÖеĶѻº³åÇøÒç³öÎó²î£¨CVE-2021-21192£©µÈÁíÍâ4¸öÎó²î¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/115600/security/google-chrome-0-day.html
3.3DͼÐÎÈí¼þBlenderÔâµ½¹¥»÷£¬¹ÙÍøÔÝʱÎÞ·¨»á¼û

3DÅÌËã»úͼÐÎÈí¼þ¹«Ë¾BlenderÔâµ½¹¥»÷£¬¹ÙÍøÔÝʱÎÞ·¨»á¼û¡£BlenderÓÚ3ÔÂ15ÈÕÔçÉÏÐû²¼ÍÆÎijÆÓÉÓںڿ͹¥»÷£¬http£º//blender.orgÍøÕ¾ÕýÔÚά»¤ÖУ¬²¢ÌåÏÖ½«¾¡¿ì»Ö¸´¸ÃÍøÕ¾¡£Ö®ºó£¬Æä³ÆËùÓпÉÏÂÔØÎļþ¶¼ÒѾÓÉУÑ飬¿ÉÒÔÇå¾²ÏÂÔØ£¬µ«¹ÙÍøºÍÆäËû²©¿Í»¹Ðè¼á³ÖÀëÏß״̬¡£ÏÖÔÚ£¬BlenderÉÐδÐû²¼Óйش˴ι¥»÷µÄ¸ü¶àÐÅÏ¢£¬ÆäÔâµ½µÄ¹¥»÷ÀàÐÍÈÔȻδ֪¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/blender-website-in-maintenance-mode-after-hacking-attempt/
4.ºÚ¿ÍÔÚ°µÍø³öÊÛGuns.comµÄÔ´´úÂëºÍÓû§Ïà¹ØÐÅÏ¢

2021Äê3ÔÂ9ÈÕ£¬ºÚ¿ÍÔÚ°µÍø³öÊÛÃÀ¹úÍøÕ¾Guns.comµÄÔ´´úÂëºÍÓû§Ïà¹ØÐÅÏ¢¡£´Ë´Îй¶Êý¾Ý°üÀ¨Óû§ID¡¢ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢ÃÜÂë¡¢ÎïÀíµØµã¡¢ÓʵÝÇøºÅ¡¢¶¼»á¡¢×´Ì¬¡¢Magneto ID¡¢µç»°ºÅÂëºÍÕÊ»§½¨ÉèÈÕÆÚµÈÓû§ÐÅÏ¢£¬ÒÔ¼°ÐÕÃû¡¢ÒøÐÐÃû³Æ¡¢ÕÊ»§ÀàÐͺÍDwolla IDµÈ²ÆÎñÐÅÏ¢¡£±ðµÄ£¬¸ÃÍøÕ¾ÖÎÀíÔ±µÄWordPress¡¢MYSQLºÍCloud£¨Azure£©Æ¾Ö¤Ò²ÒÑй¶£¬°üÀ¨´¿Îı¾ÃûÌõĵç×ÓÓʼþ¡¢ÃÜÂë¡¢µÇ¼Á´½ÓºÍ·þÎñÆ÷µØµã¡£
ÔÎÄÁ´½Ó£º
https://www.hackread.com/hacker-dumps-guns-com-database-customers-admin-data/
5.FBIÐû²¼Õë¶Ô½ÌÓý»ú¹¹µÄÀÕË÷Èí¼þPysa¹¥»÷Ô˶¯µÄÖÒÑÔ

ÖÒÑÔÖгƣ¬×Ô2020Äê3ÔÂÆð£¬ºÚ¿Í×îÏÈʹÓÃPYSAÀÕË÷Èí¼þ¹¥»÷¶à¹úµÄÕþ¸®×éÖ¯¡¢½ÌÓý»ú¹¹¡¢Ë½Óª¹«Ë¾ºÍÒ½ÁÆÐÐÒµ¡£´Ë´ÎÕë¶ÔÓ¢¹úºÍÃÀ¹úµÄ12¸öÖݽÌÓý»ú¹¹µÄPYSAÀÕË÷Èí¼þ¹¥»÷Ô˶¯¼¤Ôö£¬ÀýÈç¸ßµÈ½ÌÓý¡¢K-12ѧУºÍÉñѧԺ¡£Pysa£¨ÓÖ³ÆMespinoza£©ÓÚ2019Äê10ÔÂÊ״α»·¢Ã÷£¬Æä»áÔÚ×°ÖÃÀÕË÷Èí¼þ֮ǰ½ûÓÃÄ¿µÄϵͳÉϵÄɱ¶¾Èí¼þ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/fbi-warns-of-escalating-pysa-ransomware-attacks-on-education-orgs/
6.unit42Ðû²¼ÓйضñÒâÈí¼þMiraiбäÌåµÄÆÊÎö±¨¸æ

unit42Ðû²¼ÁËÓйضñÒâÈí¼þMiraiбäÌåµÄÆÊÎö±¨¸æ¡£2021Äê2ÔÂ16ÈÕµ½3ÔÂ13ÈÕ£¬unit42µÄÑо¿Ö°Ô±·¢Ã÷ÁËʹÓÃSonicWall SSL-VPNÖеÄVisualDoor¡¢D-Link DNS-320·À»ðǽÖеÄCVE-2020-25506ºÍNetgear ProSAFE PlusÖеÄCVE-2020-26919µÈ¶à¸öIoTÎó²îµÄ¹¥»÷Ô˶¯£¬²¢ÌåÏÖÕâЩ¹¥»÷ÓëMiraiµÄбäÖÖÓйء£±ðµÄ£¬¹¥»÷ÕßÔÚ¹¥»÷Àֳɺó»áʹÓÃwgetÏÂÔØShell¾ç±¾£¬¸Ã¾ç±¾½«ÏÂÔØ²¢Ö´ÐÐÕë¶Ô²î±ð¼Ü¹¹¶ø±àÒëµÄ¶à¸öMirai¶þ½øÖÆÎļþ¡£
ÔÎÄÁ´½Ó£º
https://unit42.paloaltonetworks.com/mirai-variant-iot-vulnerabilities/


¾©¹«Íø°²±¸11010802024551ºÅ