΢ÈíÕý×ÅÊÖÊÓ²ìй¶ExchangeÎó²îϸ½ÚµÄÇå¾²³§ÉÌ£»GoogleÔÙ·¢²¹¶¡£¬ÐÞ¸´½ñÄêµÚ3¸ö±»Ê¹ÓõÄchrome 0day

Ðû²¼Ê±¼ä 2021-03-17

1.΢ÈíÕý×ÅÊÖÊÓ²ìй¶ExchangeÎó²îϸ½ÚµÄÇå¾²³§ÉÌ


1.jpg


΢ÈíÏÖÔÚÕý×ÅÊÖÊÓ²ìй¶ÁËMicrosoft ExchangeÎó²îϸ½ÚµÄÇå¾²³§ÉÌ¡£ÔÚ²¹¶¡Ðû²¼Ö®Ç°£¬Î¢ÈíÒÑÓÚ2ÔÂ23ÈÕ½«¸ÃÎó²îµÄPoC´úÂë·¢Ë͸øÁ˼ÓÈëMicrosoft Active ProtectionsÍýÏ루Mapp£©µÄÍøÂçÇå¾²¹«Ë¾£¬Éæ¼°Ô¼80¸ö×éÖ¯¡£Î¢ÈíÌåÏÖ£¬ÏÖÔÚÓÃÓÚ¹¥»÷µÄÎó²îʹÓù¤¾ßÓëÆäÆäʱ¹²ÏíµÄPoC´úÂëÀàËÆ¡£Òò´Ë£¬Î¢ÈíÏÓÒÉ´Ë´ÎÕë¶ÔMicrosoft Exchange·þÎñÆ÷µÄ¹¥»÷À˳±ÓëÇå¾²³§ÉÌй¶Îó²îÐÅÏ¢ÓйØ£¬²¢ÌåÏÖÈôÊÇÊÇMAPP¹«Ë¾Ð¹Â¶ÁËÏà¹ØÐÅÏ¢£¬ËûÃǽ«¿ª³ý¸Ã³ÉÔ±¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/microsoft-investigates-potential-tie-between-partner-firm-and-potential-exchange-bug-leak/


2.GoogleÔÙ·¢²¹¶¡£¬ÐÞ¸´½ñÄêµÚ3¸ö±»Ê¹ÓõÄchrome 0day


2.jpg


GoogleÓÚ±¾Ôµڶþ´ÎÐû²¼²¹¶¡£¬ÐÞ¸´½ñÄêµÚ3¸ö±»Ê¹ÓõÄchrome 0day¡£¸ÃÎó²î±£´æÓÚBlinkÖУ¬ÊÇÒ»¸öÊͷźóʹÓÃÎó²î£¨CVE-2021-21193£©£¬CVSSÆÀ·ÖΪ8.8£¬¹¥»÷Õß¿ÉʹÓøÃÎó²îÖ´ÐÐí§Òâ´úÂë»ò´¥·¢¾Ü¾ø·þÎñ״̬¡£³ý´ËÖ®Í⣬´Ë´Î¸üл¹ÐÞ¸´ÁËWebRTCÖеÄÊͷźóʹÓÃÎó²î£¨CVE-2021-21191£©ºÍChromeÑ¡ÏÖеĶѻº³åÇøÒç³öÎó²î£¨CVE-2021-21192£©µÈÁíÍâ4¸öÎó²î¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/115600/security/google-chrome-0-day.html


3.3DͼÐÎÈí¼þBlenderÔâµ½¹¥»÷£¬¹ÙÍøÔÝʱÎÞ·¨»á¼û


3.jpg


3DÅÌËã»úͼÐÎÈí¼þ¹«Ë¾BlenderÔâµ½¹¥»÷£¬¹ÙÍøÔÝʱÎÞ·¨»á¼û¡£BlenderÓÚ3ÔÂ15ÈÕÔçÉÏÐû²¼ÍÆÎijÆÓÉÓںڿ͹¥»÷£¬http£º//blender.orgÍøÕ¾ÕýÔÚά»¤ÖУ¬²¢ÌåÏÖ½«¾¡¿ì»Ö¸´¸ÃÍøÕ¾¡£Ö®ºó£¬Æä³ÆËùÓпÉÏÂÔØÎļþ¶¼ÒѾ­ÓÉУÑ飬¿ÉÒÔÇå¾²ÏÂÔØ£¬µ«¹ÙÍøºÍÆäËû²©¿Í»¹Ðè¼á³ÖÀëÏß״̬¡£ÏÖÔÚ£¬BlenderÉÐδÐû²¼Óйش˴ι¥»÷µÄ¸ü¶àÐÅÏ¢£¬ÆäÔâµ½µÄ¹¥»÷ÀàÐÍÈÔȻδ֪¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/blender-website-in-maintenance-mode-after-hacking-attempt/


4.ºÚ¿ÍÔÚ°µÍø³öÊÛGuns.comµÄÔ´´úÂëºÍÓû§Ïà¹ØÐÅÏ¢


4.jpg


2021Äê3ÔÂ9ÈÕ£¬ºÚ¿ÍÔÚ°µÍø³öÊÛÃÀ¹úÍøÕ¾Guns.comµÄÔ´´úÂëºÍÓû§Ïà¹ØÐÅÏ¢¡£´Ë´Îй¶Êý¾Ý°üÀ¨Óû§ID¡¢ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢ÃÜÂë¡¢ÎïÀíµØµã¡¢ÓʵÝÇøºÅ¡¢¶¼»á¡¢×´Ì¬¡¢Magneto ID¡¢µç»°ºÅÂëºÍÕÊ»§½¨ÉèÈÕÆÚµÈÓû§ÐÅÏ¢£¬ÒÔ¼°ÐÕÃû¡¢ÒøÐÐÃû³Æ¡¢ÕÊ»§ÀàÐͺÍDwolla IDµÈ²ÆÎñÐÅÏ¢¡£±ðµÄ£¬¸ÃÍøÕ¾ÖÎÀíÔ±µÄWordPress¡¢MYSQLºÍCloud£¨Azure£©Æ¾Ö¤Ò²ÒÑй¶£¬°üÀ¨´¿Îı¾ÃûÌõĵç×ÓÓʼþ¡¢ÃÜÂë¡¢µÇ¼Á´½ÓºÍ·þÎñÆ÷µØµã¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/hacker-dumps-guns-com-database-customers-admin-data/


5.FBIÐû²¼Õë¶Ô½ÌÓý»ú¹¹µÄÀÕË÷Èí¼þPysa¹¥»÷Ô˶¯µÄÖÒÑÔ


5.jpg


ÖÒÑÔÖгÆ£¬×Ô2020Äê3ÔÂÆð£¬ºÚ¿Í×îÏÈʹÓÃPYSAÀÕË÷Èí¼þ¹¥»÷¶à¹úµÄÕþ¸®×éÖ¯¡¢½ÌÓý»ú¹¹¡¢Ë½Óª¹«Ë¾ºÍÒ½ÁÆÐÐÒµ¡£´Ë´ÎÕë¶ÔÓ¢¹úºÍÃÀ¹úµÄ12¸öÖݽÌÓý»ú¹¹µÄPYSAÀÕË÷Èí¼þ¹¥»÷Ô˶¯¼¤Ôö£¬ÀýÈç¸ßµÈ½ÌÓý¡¢K-12ѧУºÍÉñѧԺ¡£Pysa£¨ÓÖ³ÆMespinoza£©ÓÚ2019Äê10ÔÂÊ״α»·¢Ã÷£¬Æä»áÔÚ×°ÖÃÀÕË÷Èí¼þ֮ǰ½ûÓÃÄ¿µÄϵͳÉϵÄɱ¶¾Èí¼þ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/fbi-warns-of-escalating-pysa-ransomware-attacks-on-education-orgs/


6.unit42Ðû²¼ÓйضñÒâÈí¼þMiraiбäÌåµÄÆÊÎö±¨¸æ


6.jpg


unit42Ðû²¼ÁËÓйضñÒâÈí¼þMiraiбäÌåµÄÆÊÎö±¨¸æ¡£2021Äê2ÔÂ16ÈÕµ½3ÔÂ13ÈÕ£¬unit42µÄÑо¿Ö°Ô±·¢Ã÷ÁËʹÓÃSonicWall SSL-VPNÖеÄVisualDoor¡¢D-Link DNS-320·À»ðǽÖеÄCVE-2020-25506ºÍNetgear ProSAFE PlusÖеÄCVE-2020-26919µÈ¶à¸öIoTÎó²îµÄ¹¥»÷Ô˶¯£¬²¢ÌåÏÖÕâЩ¹¥»÷ÓëMiraiµÄбäÖÖÓйØ¡£±ðµÄ£¬¹¥»÷ÕßÔÚ¹¥»÷Àֳɺó»áʹÓÃwgetÏÂÔØShell¾ç±¾£¬¸Ã¾ç±¾½«ÏÂÔØ²¢Ö´ÐÐÕë¶Ô²î±ð¼Ü¹¹¶ø±àÒëµÄ¶à¸öMirai¶þ½øÖÆÎļþ¡£


Ô­ÎÄÁ´½Ó£º

https://unit42.paloaltonetworks.com/mirai-variant-iot-vulnerabilities/