Ó¡¶ÈÂóµ±ÀÍMcDeliveryÀûÓÃÆØ³öÑϳÁ°²È«·ì϶

°ä²¼¹¦·ò 2024-12-26

1. Ó¡¶ÈÂóµ±ÀÍMcDeliveryÀûÓÃÆØ³öÑϳÁ°²È«·ì϶


12ÔÂ21ÈÕ £¬Ó¡¶È¶¥¼¶Ê³Æ·±íËÍÀûÓÃÂóµ±ÀÍ McDelivery ±»·¢ÏÖ´æÔÚÑϳÁ°²È«·ì϶¡£Ò»Î»×êÑÐÈËÔ±¾­¹ý¾ßÌåµ÷²éºó £¬·¢ÏÖ¸ÃÀûÓõÄAPI´æÔÚ´óÁ¿È±µã £¬ÔÊÐíδ¾­ÊÚȨ½Ó¼û¸÷ÀàÖ°ÄÜ¡£ÕâЩ·ì϶Ô̺¬ÒÔ¼«Á®¼ÛÖµ£¨1¬±È £¬¼´0.01ÃÀÔª£©¶©¹ºÉÌÆ·¡¢½Ù³ÔìäËûÓû§µÄ¶©µ¥¡¢ÊµÊ±¸ú×ÙËÍ»õ˾»ú²¢Â¶³öÆäÃô¸ÐÓ×ÎÒÐÅÏ¢¡¢½Ó¼ûËûÈ˵Ķ©µ¥ÏêÇéºÍ·¢Æ± £¬ÒÔ¼°Î´¾­ÊÚȨ²é¿´ÖÎÀíÔ±¹Ø¼ü¼¨Ð§Ö¸±ê»ã±¨µÈ¡£Ö»¹ÜÂóµ±ÀÍʹÓÃÁËAngular¿ò¼ÜºÍJWTÁîÅÆµÈ»ù×ÔÉí·ÝÑéÖ¤´ëÊ© £¬µ«ÔÚÏÞ¶Å×û§¶ÔÃô¸ÐÊý¾Ý½Ó¼û·½ÃæÈÔ´æÔÚ²»¼°¡£ÆäÖÐÒ»¸ö͹Æð·ìÏ¶Éæ¼°°Ñ³Ö¹ºÎï³µÉÌÆ·¼ÛÖµ £¬ÁíÒ»¸ö³Á´ó·ì϶ÔÊÐíºÚ¿Í½Ù³ÖÔÚ½øÐеĶ©µ¥¡£ÕâЩ·ì϶²»½ö×é³É¼¼Êõȱµã £¬»¹ÑϳÁÍþвÓû§ÒþÖÔºÍÂóµ±ÀÍÃûÓþ¡£Â·µÂºÚ¿Í±àдÁËÏ꾡»ã±¨²¢Ìá½»¸øMcDelivery·ì϶Éͽð´òËã £¬Âóµ±ÀÍÔÚ90ÌìÆÚÏÞÄÚ½¨¸´ÁËËùÓзì϶ £¬²¢¼Î½±Á˺ڿÍ¡£


https://cybersecuritynews.com/mcdonalds-delivery-app-vulnerability/


2. Æ¥×ȱ¤½»Í¨¾ÖÔâÀÕË÷Èí¼þ¹¥»÷ £¬¹«¹²½»Í¨·þÎñÖжÏ


12ÔÂ25ÈÕ £¬Æ¥×ȱ¤µØÓò½»Í¨¾Ö£¨PRT£©×î½üÔâ·êÁËÀÕË÷Èí¼þ¹¥»÷ £¬µ¼Ö¹«¹²½»Í¨·þÎñÑϳÁÖжÏ¡£¸Ã»ú¹¹ÖÜÒ»°µÊ¾ÔÚ»ý¼«Ó¦¶ÔÕâÒ»ÔÚ12ÔÂ19ÈÕ³õ´Î·¢ÏֵĹ¥»÷ £¬·¨Âɲ¿ÃźÍÍøÂ簲ȫר¼ÒÒÑȾָµ÷²é¡£Ö»¹ÜÌú··þÎñÔÚ19ÈÕÔçÉÏÒ»¶ÈÖжÏ £¬µ«Ä¿Ç°½»Í¨·þÎñÒѸ´Ô­Õý³£ÔËÐС£È»¶ø £¬Ò»Ð©³Ë¿Í·þÎñÈÔÊܵ½Ó°Ïì £¬ÀýÈçPRTµÄ¿Í»§·þÎñÖÐÐÄÁÙʱÎÞ·¨½ÓÊÜ»ò´¦ÖÃÀÏÄêÈ˺ͶùͯµÄConnectCards¡£PRTµÄIT¹ÙÔ¹ØýÔÚµ÷²éÊý¾ÝÊÇ·ñ±»µÁ £¬²¢³ÐŵÔÚµ÷²é¹ý³ÌÖÐÌṩ×îÐÂÐÂÎÅ¡£»ú¹¹»Ø¾øÐ¹Â©¹¥»÷±³ºóµÄ×éÖ¯ÒÔ¼°ºÎʱ¸´Ô­È«Ãæ·þÎñ¡£¾Ý±¨Â· £¬ÓÉÓÚÕâ´Î¹¥»÷ £¬»ð³µÎóµãÁË20¶à·ÖÖÓ¡£PRTÿÄê¿ÍÁ÷Á¿¿¿½ü4000ÍòÈË´Î £¬ÊǸÃÖݵڶþ´ó¹«¹²½»Í¨»ú¹¹ £¬Ìṩ700¶àÁ¾¹«½»³µºÍ80Á¾Çá¹ìµÈ·þÎñ¡£¹«¹²½»Í¨µÄÖжϺͿͻ§Êý¾ÝµÄÇÔÈ¡ÒѳÉΪÀÕË÷Èí¼þÍÅ»ï³ÖÐøÕë¶Ô´ËÀ൱¾Ö»ú¹¹µÄÖØÒªÔ­ÒòÖ®Ò»¡£


https://therecord.media/pittsburgh-regional-transit-attributes-disruptions-to-ransomware-attack


3. Apache Á÷Á¿½ÚÔ콨¸´¸ßΣSQL×¢Èë·ì϶CVE-2024-45387


12ÔÂ26ÈÕ £¬Apache Èí¼þ»ù½ð»á (ASF) ½üÈÕ°ä²¼ÁËÕë¶ÔÆäÁ÷Á¿½ÚÔìÈí¼þÖеÄÒ»¸öÑϳÁ°²È«·ì϶µÄ°²È«¸üС£¸Ã·ì϶±»ÏóÕ÷Ϊ CVE-2024-45387 £¬CVSS ÆÀ·Ö¸ß´ï 9.9 £¬ÊÇÒ»¸ö SQL ×¢Èë·ì϶ £¬´æÔÚÓÚ Traffic Control µÄ 8.0.0 ÖÁ 8.0.1 °æ±¾ÖС£Traffic Control ÊÇÒ»ÖÖÓÃÓÚ³ÉÁ¢ÄÚÈÝ·Ö·¢ÍøÂçµÄ½â¾ö¹æ»® £¬Ö¼ÔÚ¸ßЧµØÏòÓû§·Ö·¢ÄÚÈÝ¡£¸Ã·ì϶ÔÊÐíÓµÓÐÌØ¶¨½ÇÉ«µÄÌØÈ¨Óû§£¨Èç admin¡¢federation¡¢operations¡¢portal »ò steering£©Í¨¹ý·¢ËÍÌØÔìµÄ PUT ÒªÇó £¬¶ÔÊý¾Ý¿âÖ´ÐÐËÁÒâ SQL ºÅÁî¡£ASF ½¨ÒéÊÜÓ°ÏìµÄÓû§Éý¼¶µ½ Apache Traffic Control 8.0.2 °æ±¾ÒÔ½¨¸´´Ë·ì϶¡£ÖµÍ×ÌùÐĵÄÊÇ £¬Á÷Á¿½ÚÔì 7.0.0 °æ±¾¼°Ö®Ç°µÄ°æ±¾²»ÊÜ´Ë·ì϶ӰÏì¡£´Ë±í £¬±¾Ô³õ ASF »¹°ä²¼ÁËÁíÒ»¸ö°²È«¸üР£¬ÒÔ½â¾ö Struts 2 ÖÐÓë OGNL ¼¼ÊõÓйصÄÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2020-17530£©¡£


https://securityaffairs.com/172307/security/apache-traffic-control-critical-flaw.html


4. ÒÁÀʺڿÍ×éÖ¯Charming Kitten²¿ÊðBellaCiao C++±äÌå¶ñÒâÈí¼þ


12ÔÂ25ÈÕ £¬ÒÁÀÊÃñ×å¹ú¶ÈºÚ¿Í×éÖ¯Charming KittenÔÚ²¿ÊðÒÑÖª¶ñÒâÈí¼þBellaCiaoµÄC++±äÌå £¬±»¶íÂÞË¹ÍøÂ簲ȫ¹«Ë¾¿¨°Í˹»ù¶¨ÃûΪBellaCPP¡£BellaCiao³õ´ÎÓÚ2023Äê4Ô±»¼Í¼ £¬ÊÇÒ»¸ö¿ÉÄÜ´«µÝ¶î±íÓÐÐ§ÔØºÉµÄ×Ô½ç˵Ͷ·ÅÆ÷ £¬ÒÑÔÚÕë¶ÔÃÀ¹ú¡¢Öж«ºÍÓ¡¶ÈµÄÍøÂç¹¥»÷Öв¿Êð¡£Charming Kitten´ÓÊôÓÚÒÁÀÊÒÁ˹À¼¸ïÃüÎÀ¶Ó £¬¶àÄêÀ´¿ª·¢Á˶à¶à¶¨Ôì¶ñÒâÈí¼þ¼Ò×å¡£¹ÌÈ»¸Ã×éÖ¯ÔøÍ¨¹ýÉç»á¹¤³Ì»î¶¯´«²¼¶ñÒâÈí¼þ £¬µ«Éæ¼°BellaCiaoµÄ¹¥»÷»áÀûÓÿɹ«¿ª½Ó¼ûÀûÓ÷¨Ê½Öеݲȫ·ì϶¡£BellaCiaoµÄC++±äÌåÊÇÒ»¸öÃûΪ¡°adhapl.dll¡±µÄDLLÎļþ £¬ÊµÏÖÓëÆä׿ÏÈÀàËÆµÄÖ°ÄÜ £¬µ«¶ÌȱÓÃÓÚÉÏ´«ºÍÏÂÔØËÁÒâÎļþÒÔ¼°ÔËÐкÅÁîµÄWeb shell¡£BellaCPPʹÓÃÁËÏÈǰ¹éÒòÓÚCharming KittenµÄÓòÃû¡£


https://thehackernews.com/2024/12/irans-charming-kitten-deploys-bellacpp.html


5. Picus Labs»ã±¨£ºÉî¿Ì½âÎöOilRigµÄÍøÂç¼äµý»î¶¯ÓëÕ½Êõ


12ÔÂ24ÈÕ £¬OilRig£¨ÓÖ³Æ APT34 »ò Helix Kitten£©ÊÇÒ»¸öÒÁÀʵ±¾ÖÖ§³ÖµÄÍøÂç¼äµýÐÐΪÕß £¬ÒÔÆäÕë¶ÔÖж«¹Ø¼üÐÐÒµµÄ¾«×¼Ðж¯¶øÎÅÃû¡£Picus Labs ÔÚÆä×îл㱨ÖÐÉî¿Ì×êÑÐÁË OilRig µÄ·¢Õ¹¹ý³Ì¡¢º¹Çà»î¶¯¼°ÆäʹÓõÄÏȽøÕ½Êõ¡£×Ô2016Äê³öÏÖÒÔÀ´ £¬OilRig չʾÁ˳־ÃÓÆ¾ÃÐÔºÍÒþÉíÐÔ £¬Í¨¹ýÓã²æÊ½ÍøÂç´¹µö»î¶¯ºÍ²¿Êð Helminth ºóÃŵÈÏȽø¶ñÒâÈí¼þ¹¤¾ß £¬¶ÔÉ³ÌØ°¢À­²®µÈ¹ú¶ÈµÄ×éÖ¯½øÐй¥»÷¡£Æä¹¥»÷ÁìÓòÒÑÀ©´óµ½Öж«µØÓòµÄµÐÔÖʵÌå¡¢ÄÜÔ´²¿Ãźͼ¼ÊõÌṩÉÌ £¬Ê¹ÓõŤ¾ßÒ²´ÓÔçÆÚµÄ Helminth ¶ñÒâÈí¼þ·¢Õ¹Îª¸ü¸´ÔÓµÄÓÐÐ§ÔØºÉ £¬Èç QUADAGENT ºÍ ISMAgent¡£OilRig »¹ÀûÓÃÁãÈÕ·ì϶ºÍ×î½üÅû¶µÄ·ì϶ £¬Èç CVE-2024-30088 £¬»ñµÃϵͳ¼¶½Ó¼ûȨÏÞ £¬²¿Êð×Ô½ç˵ STEALHOOK ºóÃŽøÐÐ³Ö¾Ã¼à¿ØºÍÊý¾Ýй¶¡£¸Ã×éÖ¯»¹Õë¶Ô¹©¸øÁ´ÌáÒé¹¥»÷ £¬ÀûÓü¼ÊõÌṩÉÌÄÚ±»µÁµÄÕË»§ÌáÒé¸ü¿í·ºµÄ¹¥»÷¡£


https://securityonline.info/cve-2024-30088-under-attack-oilrig-targets-windows-kernel-vulnerability/


6. ÃÀ¹ú³Éñ«Ò½ÖÎÖÐÐÄÔâÍøÂç¹¥»÷ £¬³¬40ÍòÃû»¼ÕßÐÅϢй¶


12ÔÂ24ÈÕ £¬ÃÀ¹ú³Éñ«Ò½ÖÎÖÐÐÄ£¨AAC£©ÊÇÒ»¼ÒͶ»úÐÔÁ¬Ëø»ú¹¹ £¬×î½üÔâ·êÍøÂ簲ȫÊÂÎñ £¬µ¼ÖÂ422,424È˵ÄÓ×ÎҼͼй¶ £¬Ô̺¬ÐÕÃû¡¢µØÖ·¡¢µç»°ºÅÂë¡¢µ®ÉúÈÕÆÚ¡¢Ò½ÁƼͼºÅµÈÐÅÏ¢ £¬µ«Ò½ÖÎÐÅÏ¢»òÖ§¸¶¿¨Êý¾ÝδÊÜÓ°Ïì¡£¸ÃÊÂÎñ²úÉúÔÚ9ÔÂ23ÈÕÖÁ9ÔÂ26ÈÕÆÚ¼ä £¬AACÒѵ±¼´·¢Õ¹µ÷²é £¬²¢Í¨Öª·¨Âɲ¿ÃźÍÀñƸµÚÈý·½ÍøÂ簲ȫר¼ÒЭÖú¡£Ä¿Ç°ÉÐδ·¢ÏÖÓë¸ÃÊÂÎñÓйصÄÉí·Ý͵ÇÔ»òڲƭÐÐΪ¡£Õâ´ÎйÃÜÊÂÎñ»¹Ó°ÏìÁËAACµÄ´ÓÊô¹©¸øÉ̵Ŀͻ§ £¬Ô̺¬ AdCare¡¢Greenhouse¡¢Desert Hope CenterµÈ¡£½üÆÚ £¬¶à¼ÒÒ½ÁÆ·þÎñÌṩÉ̳ÉÎªÍøÂ簲ȫ¹¥»÷µÄÖ¸±ê £¬ÈçRegional Care¡¢¾²Âö½¨¸´ÖÐÐÄ£¨CVR£©ºÍ°²ÄÈÑÅ¿ËÒ½Ôº£¨AJH£© £¬ÕâЩ»ú¹¹Í¨³£±£»¤²»Á¦ £¬µ«±£ÁôµÄÊý¾Ý¼«¶ÈÓмÛÖµ £¬¹¥»÷ÕßÄܹ»ÀûÓÃй¶µÄÐÅÏ¢½øÐн¡È«Éí·Ýڲƭ¡£


https://cybernews.com/news/patients-exposed-addiction-treatment-hack/