Evernote Chrome²å¼þXSS·ì϶£¬²¨¼°Ô¼460ÍòÓû§£»WAGO¹¤Òµ»¥»»»úÓ²±àÂëºóÃÅÕË»§£»ºÚ¿ÍÍÅ»ïOutlaw»Ø¹é
°ä²¼¹¦·ò 2019-06-14
1¡¢Evernote Chrome²å¼þXSS·ì϶£¬²¨¼°Ô¼460ÍòÓû§
°²È«³§ÉÌGuardio·¢ÏÖEvernoteµÄChrome²å¼þ£¨Evernote Web Clipper£©ÖдæÔÚÒ»¸öÑϳÁµÄXSS·ì϶£¬¿ÉÔÊÐí¹¥»÷Õß½Ó¼ûÓû§ÔÚµÚÈý·½·þÎñÖеÄÃô¸ÐÐÅÏ¢¡£ÓÉÓÚEvernote¹ãÊÜÓ½Ó£¬¸Ã·ì϶¿ÉÄܲ¨¼°Ô¼460ÍòÓû§¡£¸Ã·ì϶£¨CVE-2019-12592£©ÊôÓÚ²å¼þÖеıàÂëÂß¼ÃýÎ󣬿ÉÈÆ¹ýä¯ÀÀÆ÷µÄͬԴսÊõ£¬Ê¹µÃ¹¥»÷Õß½Ó¼ûµÚÈý·½·þÎñµÄÃô¸ÐÓû§ÐÅÏ¢£¬Ô̺¬Éí·ÝÑéÖ¤ÐÅÏ¢¡¢²ÆÕþÐÅÏ¢¡¢É罻ýÌå̸ÌìÐÅÏ¢¡¢µç×ÓÓʼþÐÅÏ¢µÈ¡£½¨ÒéÓû§¸üÐÂÖÁ7.11.1¼°¸ü¸ß°æ±¾¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/critical-flaw-in-evernote-add-on-exposed-sensitive-data-of-millions/
2¡¢Ë¼¿Æ°ä²¼IOS XEÈí¼þ¸üУ¬½¨¸´Web UIÖеÄCSRF·ì϶
Cisco IOS XEÈí¼þWeb UIÖеķì϶£¨CVE-2019-1904£©¿ÉÔÊÐíδ¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß½øÐпçÕ¾ÒªÇóαÔ죨CSRF£©¹¥»÷¡£¸Ã·ì϶ԴÓÚÊÜÓ°ÏìÉ豸ÉϵÄWeb UIµÄCSRF±£»¤²»¼°£¬¹¥»÷Õß¿Éͨ¹ýºýŪÓû§½Ó¼û¶ñÒâÁ´½ÓÀ´ÀûÓô˷ì϶£¬³É¹¦ÀûÓô˷ì϶¿ÉÔÊÐí¹¥»÷ÕßÒÔÓû§µÄȨÏÞ¼¶±ðÖ´ÐÐËÁÒâ²Ù×÷¡£ÈôÊÇÓû§ÓµÓÐÖÎÀíȨÏÞ£¬Ôò¹¥»÷ÕßÄܹ»¸ü¸ÄÅäÖá¢Ö´ÐкÅÁî»ò³ÁмÓÔØÊÜÓ°ÏìµÄÉ豸¡£¸Ã·ì϶µÄCVSSÆÀ·ÖΪ8.8·Ö£¬½¨ÒéÓû§¾¡¿ì×°Öý¨¸´²¹¶¡¡£
ÔÎÄÁ´½Ó£ºhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190612-iosxe-csrf
3¡¢WAGO¹¤Òµ»¥»»»ú¶à¸ö·ì϶£¬Ô̺¬Ó²±àÂëµÄºóÃÅÕË»§
SEC Consult×êÑÐÈËÔ±·¢Ïֵ¹úWAGO¹«Ë¾Ôì×÷µÄ¹¤Òµ»¥»»»ú´æÔÚ¶à¸ö·ì϶¡£ÕâЩ·ì϶ӰÏìÁËWAGO 852-303¡¢852-1305ºÍ852-1505ϵÁл¥»»»ú£¬¸Ã¹«Ë¾ÒѱðÀë°ä²¼¹Ì¼þ°æ±¾1.2.2.S0¡¢1.1.6.S0ºÍ1.1.5.S0½øÐÐÁ˽¨¸´¡£ÆäÖÐ×îÑϳÁµÄ·ì϶ÊÇÓ²±àÂëºóÃÅÕË»§·ì϶£¨CVE-2019-12550£©£¬Ò»¸öÓµÓÐrootȨÏÞµÄĬÈÏÕË»§µÄÍ´´¦´æ´¢ÔÚÎļþÖУ¬²¢ÇÒÓµÓÐÈõÃÜÂ룬¹¥»÷Õß¿ÉÀûÓøÃÕË»§Í¨¹ýTelnet»òSSHÏνӵ½ÊÜÓ°ÏìµÄ»¥»»»ú¡£
ÔÎÄÁ´½Ó£ºhttps://www.securityweek.com/critical-vulnerabilities-found-wago-industrial-switches
4¡¢EviteÈ·ÈϽü1000Íò¿Í»§Êý¾Ý±»µÁ£¬ÒÑÔÚ°µÍøÏúÊÛ
µç×ÓÔ¼Ç뺯ƽ̨EviteÈ·ÈÏÔÚ2019Äê2ÔÂ22ÈÕÔâºÚ¿ÍÈëÇÖ£¬½ü1000ÍòÓû§Êý¾Ýй¶²¢ÔÚ°µÍøÊг¡ÉÏÏúÊÛ¡£Evite°µÊ¾Î´¾ÊÚȨµÄµÚÈý·½»ñµÃÁËÒ»¸ö·Ç»î¶¯Êý¾Ý´æ´¢ÎļþµÄ½Ó¼ûȨÏÞ£¬¸Ã´æ´¢ÎļþÔ̺¬2013Äê֮ǰµÄEviteÓû§ÕË»§ÐÅÏ¢£¬ÀýÈçÐÕÃû¡¢Óû§Ãû¡¢µç×ÓÓʼþµØÖ·¡¢ÃÜÂë¡¢µ®ÉúÈÕÆÚºÍµç»°ºÅÂ룬µ«²»Ô̺¬²ÆÕþÐÅÏ¢ºÍÉç»á°²È«ºÅÂë¡£ÕâЩÊý¾Ý±»³ôÃûÔ¶ÑïµÄºÚ¿ÍGnosticplayersÔÚ°µÍøÊг¡Dream MarketÉÏÏúÊÛ¡£
ÔÎÄÁ´½Ó£ºhttps://cyware.com/news/evite-confirms-that-its-customer-data-was-stolen-and-put-up-for-sale-in-the-dark-web-998a1462
5¡¢ºÚ¿ÍÍÅ»ïOutlaw»Ø¹é£¬ÀûÓý©Ê¬ÍøÂç·Ö·¢PerlºóÃźÍMonero¿ó¹¤
Ç÷Ïò¿Æ¼¼·¢ÏÖºÚ¿Í×éÖ¯Outlaw¾íÍÁ³ÁÀ´£¬ÀûÓý©Ê¬ÍøÂç·Ö·¢ÃÅÂޱҿ󹤡£¸Ã¹¥»÷»î¶¯ÖØÒªÕë¶ÔÖйú£¬Æä·Ö·¢µÄ¶ñÒâ¿ó¹¤°ó¸¿ÁËÒ»¸ö»ùÓÚPerlµÄºóÃÅ×é¼þºÍÒ»¸öSSHºóÃÅ£¬ÕâÁ½¸ö×é¼þ¶¼ÓëÒÔǰµÄOutlaw¹¥»÷Óйء£Í¨¹ý¶ÈÎöshell¾ç±¾×é¼þºÍ´¦ÓÚδִÐÐ״̬µÄÐÝÃß¶ñÒâÎļþ£¬×êÑÐÈËÔ±ÒÔΪOutlaw¹¥»÷ÈÔ´¦ÓÚ²âÊԽ׶Σ¬ÆäÖ÷ÕÅÊǽøÒ»²½¿ª·¢´óÐͶñÒâÈí¼þºÍ½©Ê¬ÍøÂç¡£
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/outlaw-hackers-return-with-cryptocurrency-mining-bot/
6¡¢FormBookÐÂÑù±¾¼ÓÇ¿»ìºÏ¼°ÓƾÃÐÔ»úÔ죬ͨ¹ýdropper·Ö·¢
Cyberbit×êÑÐÈËÔ±·¢ÏÖFormBook¶ñÒâÈí¼þµÄÐÂÑù±¾Ô̺¬ÐµÄdropper¡£FormBookÊÇÒ»¸öä¯ÀÀÆ÷±íµ¥ÇÔÈ¡¼°¼üÅ̼ͼľÂí£¬×Ô2016ÄêÔÚºÚ¿ÍÂÛ̳ÉϳöÏÖÒÔÀ´Ò»ÏòÔÚ»ý¼«¿ª·¢ÖС£×êÑÐÈËÔ±³Æ¸ÃÐÂÑù±¾¼ÓÇ¿ÁËÏµÍ³ÓÆ¾ÃÐԺͻìºÏ»úÔìÒÔÌӱܼì²â£¬ÐµÄdropper²»½ö»á½âѹËõ¶ñÒâÈí¼þ£¬»¹»á´´½¨Á½¸ö¶ñÒâ¹ý³Ì£ºmshta.exeºÍÁíÒ»¸ödropper £¨Rhododendrons8.exe£©¡£×êÑÐÈËÔ±ÉÐ佫¸ÃÐÂÑù±¾ÓëÈκι¥»÷»î¶¯¹ØÁªÆðÀ´¡£
ÔÎÄÁ´½Ó£ºhttps://threatpost.com/new-formbook-dropper-harbors-persistence/145614/


¾©¹«Íø°²±¸11010802024551ºÅ