Evernote Chrome²å¼þXSSÎó²î£¬£¬£¬ £¬£¬²¨¼°Ô¼460ÍòÓû§£»£»£»£»WAGO¹¤Òµ½»Á÷»úÓ²±àÂëºóÃÅÕË»§£»£»£»£»ºÚ¿ÍÍÅ»ïOutlaw»Ø¹é

Ðû²¼Ê±¼ä 2019-06-14

1¡¢Evernote Chrome²å¼þXSSÎó²î£¬£¬£¬ £¬£¬²¨¼°Ô¼460ÍòÓû§

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
 
Çå¾²³§ÉÌGuardio·¢Ã÷EvernoteµÄChrome²å¼þ£¨Evernote Web Clipper£©Öб£´æÒ»¸öÑÏÖØµÄXSSÎó²î£¬£¬£¬ £¬£¬¿ÉÔÊÐí¹¥»÷Õß»á¼ûÓû§ÔÚµÚÈý·½Ð§ÀÍÖеÄÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£ÓÉÓÚEvernote¹ãÊܽӴý£¬£¬£¬ £¬£¬¸ÃÎó²î¿ÉÄܲ¨¼°Ô¼460ÍòÓû§¡£¡£¡£¡£¡£¸ÃÎó²î£¨CVE-2019-12592£©ÊôÓÚ²å¼þÖеıàÂëÂß¼­¹ýʧ£¬£¬£¬ £¬£¬¿ÉÈÆ¹ýä¯ÀÀÆ÷µÄͬԴսÂÔ£¬£¬£¬ £¬£¬Ê¹µÃ¹¥»÷Õß»á¼ûµÚÈý·½Ð§À͵ÄÃô¸ÐÓû§ÐÅÏ¢£¬£¬£¬ £¬£¬°üÀ¨Éí·ÝÑéÖ¤ÐÅÏ¢¡¢²ÆÎñÐÅÏ¢¡¢É罻ýÌå̸ÌìÐÅÏ¢¡¢µç×ÓÓʼþÐÅÏ¢µÈ¡£¡£¡£¡£¡£½¨ÒéÓû§¸üÐÂÖÁ7.11.1¼°¸ü¸ß°æ±¾¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/critical-flaw-in-evernote-add-on-exposed-sensitive-data-of-millions/

2¡¢Ë¼¿ÆÐû²¼IOS XEÈí¼þ¸üУ¬£¬£¬ £¬£¬ÐÞ¸´Web UIÖеÄCSRFÎó²î

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
 
Cisco IOS XEÈí¼þWeb UIÖеÄÎó²î£¨CVE-2019-1904£©¿ÉÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¾ÙÐпçÕ¾ÇëÇóαÔ죨CSRF£©¹¥»÷¡£¡£¡£¡£¡£¸ÃÎó²îÔ´ÓÚÊÜÓ°ÏìÉè±¹ØÁ¬ÄWeb UIµÄCSRF±£»£»£»£»¤È±·¦£¬£¬£¬ £¬£¬¹¥»÷Õß¿Éͨ¹ýÓÕÆ­Óû§»á¼û¶ñÒâÁ´½ÓÀ´Ê¹ÓôËÎó²î£¬£¬£¬ £¬£¬ÀÖ³ÉʹÓôËÎó²î¿ÉÔÊÐí¹¥»÷ÕßÒÔÓû§µÄȨÏÞ¼¶±ðÖ´ÐÐí§Òâ²Ù×÷¡£¡£¡£¡£¡£ÈôÊÇÓû§¾ßÓÐÖÎÀíȨÏÞ£¬£¬£¬ £¬£¬Ôò¹¥»÷Õß¿ÉÒÔ¸ü¸ÄÉèÖá¢Ö´ÐÐÏÂÁî»òÖØÐ¼ÓÔØÊÜÓ°ÏìµÄ×°±¸¡£¡£¡£¡£¡£¸ÃÎó²îµÄCVSSÆÀ·ÖΪ8.8·Ö£¬£¬£¬ £¬£¬½¨ÒéÓû§¾¡¿ì×°ÖÃÐÞ¸´²¹¶¡¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190612-iosxe-csrf

3¡¢WAGO¹¤Òµ½»Á÷»ú¶à¸öÎó²î£¬£¬£¬ £¬£¬°üÀ¨Ó²±àÂëµÄºóÃÅÕË»§

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
 
SEC ConsultÑо¿Ö°Ô±·¢Ã÷µÂ¹úWAGO¹«Ë¾ÖÆÔìµÄ¹¤Òµ½»Á÷»ú±£´æ¶à¸öÎó²î¡£¡£¡£¡£¡£ÕâЩÎó²îÓ°ÏìÁËWAGO 852-303¡¢852-1305ºÍ852-1505ϵÁн»Á÷»ú£¬£¬£¬ £¬£¬¸Ã¹«Ë¾ÒÑ»®·ÖÐû²¼¹Ì¼þ°æ±¾1.2.2.S0¡¢1.1.6.S0ºÍ1.1.5.S0¾ÙÐÐÁËÐÞ¸´¡£¡£¡£¡£¡£ÆäÖÐ×îÑÏÖØµÄÎó²îÊÇÓ²±àÂëºóÃÅÕË»§Îó²î£¨CVE-2019-12550£©£¬£¬£¬ £¬£¬Ò»¸ö¾ßÓÐrootȨÏÞµÄĬÈÏÕË»§µÄƾ֤´æ´¢ÔÚÎļþÖУ¬£¬£¬ £¬£¬²¢ÇÒ¾ßÓÐÈõÃÜÂ룬£¬£¬ £¬£¬¹¥»÷Õß¿ÉʹÓøÃÕË»§Í¨¹ýTelnet»òSSHÅþÁ¬µ½ÊÜÓ°ÏìµÄ½»Á÷»ú¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.securityweek.com/critical-vulnerabilities-found-wago-industrial-switches

4¡¢EviteÈ·ÈϽü1000Íò¿Í»§Êý¾Ý±»µÁ£¬£¬£¬ £¬£¬ÒÑÔÚ°µÍø³öÊÛ

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
 
µç×ÓÔ¼Ç뺯ƽ̨EviteÈ·ÈÏÔÚ2019Äê2ÔÂ22ÈÕÔâºÚ¿ÍÈëÇÖ£¬£¬£¬ £¬£¬½ü1000ÍòÓû§Êý¾Ýй¶²¢ÔÚ°µÍøÊг¡ÉϳöÊÛ¡£¡£¡£¡£¡£EviteÌåÏÖδ¾­ÊÚȨµÄµÚÈý·½»ñµÃÁËÒ»¸ö·Ç»î¶¯Êý¾Ý´æ´¢ÎļþµÄ»á¼ûȨÏÞ£¬£¬£¬ £¬£¬¸Ã´æ´¢Îļþ°üÀ¨2013Äê֮ǰµÄEviteÓû§ÕË»§ÐÅÏ¢£¬£¬£¬ £¬£¬ÀýÈçÐÕÃû¡¢Óû§Ãû¡¢µç×ÓÓʼþµØµã¡¢ÃÜÂë¡¢³öÉúÈÕÆÚºÍµç»°ºÅÂ룬£¬£¬ £¬£¬µ«²»°üÀ¨²ÆÎñÐÅÏ¢ºÍÉç»áÇå¾²ºÅÂë¡£¡£¡£¡£¡£ÕâЩÊý¾Ý±»ÎÛÃûÕÑÖøµÄºÚ¿ÍGnosticplayersÔÚ°µÍøÊг¡Dream MarketÉϳöÊÛ¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://cyware.com/news/evite-confirms-that-its-customer-data-was-stolen-and-put-up-for-sale-in-the-dark-web-998a1462

5¡¢ºÚ¿ÍÍÅ»ïOutlaw»Ø¹é£¬£¬£¬ £¬£¬Ê¹Óý©Ê¬ÍøÂç·Ö·¢PerlºóÃźÍMonero¿ó¹¤

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
 
Ç÷ÊÆ¿Æ¼¼·¢Ã÷ºÚ¿Í×éÖ¯Outlaw¾íÍÁÖØÀ´£¬£¬£¬ £¬£¬Ê¹Óý©Ê¬ÍøÂç·Ö·¢ÃÅÂޱҿ󹤡£¡£¡£¡£¡£¸Ã¹¥»÷»î¶¯Ö÷ÒªÕë¶ÔÖйú£¬£¬£¬ £¬£¬Æä·Ö·¢µÄ¶ñÒâ¿ó¹¤À¦°óÁËÒ»¸ö»ùÓÚPerlµÄºóÃÅ×é¼þºÍÒ»¸öSSHºóÃÅ£¬£¬£¬ £¬£¬ÕâÁ½¸ö×é¼þ¶¼ÓëÒÔǰµÄOutlaw¹¥»÷ÓйØ¡£¡£¡£¡£¡£Í¨Ì«¹ýÎöshell¾ç±¾×é¼þºÍ´¦ÓÚδִÐÐ״̬µÄÐÝÃß¶ñÒâÎļþ£¬£¬£¬ £¬£¬Ñо¿Ö°Ô±ÒÔΪOutlaw¹¥»÷ÈÔ´¦ÓÚ²âÊԽ׶Σ¬£¬£¬ £¬£¬ÆäÄ¿µÄÊǽøÒ»²½¿ª·¢´óÐͶñÒâÈí¼þºÍ½©Ê¬ÍøÂç¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/outlaw-hackers-return-with-cryptocurrency-mining-bot/

6¡¢FormBookÐÂÑù±¾ÔöÇ¿»ìÏý¼°³¤ÆÚÐÔ»úÖÆ£¬£¬£¬ £¬£¬Í¨¹ýdropper·Ö·¢

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
 
CyberbitÑо¿Ö°Ô±·¢Ã÷FormBook¶ñÒâÈí¼þµÄÐÂÑù±¾°üÀ¨ÐµÄdropper¡£¡£¡£¡£¡£FormBookÊÇÒ»¸öä¯ÀÀÆ÷±íµ¥ÇÔÈ¡¼°¼üÅ̼ͼľÂí£¬£¬£¬ £¬£¬×Ô2016ÄêÔÚºÚ¿ÍÂÛ̳ÉÏ·ºÆðÒÔÀ´Ò»Ö±ÔÚÆð¾¢¿ª·¢ÖС£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ¸ÃÐÂÑù±¾ÔöÇ¿ÁËϵͳ³¤ÆÚÐԺͻìÏý»úÖÆÒÔÌӱܼì²â£¬£¬£¬ £¬£¬ÐµÄdropper²»µ«»á½âѹËõ¶ñÒâÈí¼þ£¬£¬£¬ £¬£¬»¹»á½¨ÉèÁ½¸ö¶ñÒâÀú³Ì£ºmshta.exeºÍÁíÒ»¸ödropper £¨Rhododendrons8.exe£©¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÉÐ佫¸ÃÐÂÑù±¾ÓëÈκι¥»÷»î¶¯¹ØÁªÆðÀ´¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://threatpost.com/new-formbook-dropper-harbors-persistence/145614/