ÃÀ¹úGilletteÒ½ÔºÔâÀÕË÷Èí¼þ¹¥»÷£»£»£»£»£»£»Magecart¶ñÒâÓòÃûÉúÃüÖÜÆÚµÄÆÊÎö±¨¸æ

Ðû²¼Ê±¼ä 2019-09-23

1.TescoÍ£³µÓ¦Óñ£´æÎó²îµ¼ÖÂÊýÍòÍò³µÅÆÍ¼Ïñй¶


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ÔÚÍâýThe Register±¨µÀÊýÍòÍòÕÅANPR£¨³µÅÆ×Ô¶¯Ê¶±ð£©Í¼ÏñÔÚMicrosoft AzureÖÐ̻¶֮ºó£¬ £¬£¬£¬£¬TescoÒÑ¹Ø±ÕÆäÍ£³µÑéÖ¤WebÓ¦Óà ¡£¡£¡£¡£ÕâЩͼÏñÓÉÓ¢¹ú¸÷µØµÄ19¸öTescoÍ£³µ³¡ºÏÅÄÉãµÄ½øÈëºÍÍÑÀëµÄÆû³µÕÕÆ¬×é³É£¬ £¬£¬£¬£¬ÕÕÆ¬ÖÐÍ»³öÏÔʾÁËÆû³µµÄ³µÅÆ£¬ £¬£¬£¬£¬ËäÈ»ÓÉÓÚÇø·ÖÂʽϵͶø¿´²»µ½¼ÝʻԱ ¡£¡£¡£¡£ANPRͼÏñÒÔ´øÓÐʱ¼ä´ÁµÄjpegÃûÌÃÉúÑÄÔÚAzure blobÖУ¬ £¬£¬£¬£¬²¢ÇÒͼÏñÎļþÃûÒ²°üÀ¨Ê±¼äÐÅÏ¢£¬ £¬£¬£¬£¬´Ó¶øÊ¹µÃÈκÎ×¼È·ÍÆ¶Ï³öËùÐèHTTP POSTÇëÇóÃûÌõÄÈË¿ÉÒÔÅúÁ¿»ñÈ¡ÕâЩͼÏñÒÔ¹©²»·¨Ê¹Óà ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.theregister.co.uk/2019/09/20/tesco_parking_app_10s_millions_anpr_photos_exposed/


2.ÐÂÎ÷À¼³èÎïÁãÊÛÉÌAnimatesÔâºÚ¿ÍÇÔÈ¡2700Ãû¿Í»§ÐÅÏ¢


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ÐÂÎ÷À¼³èÎïÁãÊÛÉÌAnimatesÔâÓöÊý¾Ýй¶ÊÂÎñ£¬ £¬£¬£¬£¬µ¼ÖÂ2700λ¿Í»§µÄСÎÒ˽¼ÒºÍ²ÆÎñÐÅϢй¶ ¡£¡£¡£¡£¸ÃÊÂÎñ±¬·¢ÔÚ2019Äê6ÔÂ29ÈÕÖÁ9ÔÂ13ÈÕÖ®¼ä£¬ £¬£¬£¬£¬ÊÂÎñÔµ¹ÊÔ­ÓÉÊÇδ¾­ÊÚȨµÄµÚÈý·½»á¼û ¡£¡£¡£¡£AnimatesÌåÏÖ¿Í»§µÄÐÅÓÿ¨/½è¼Ç¿¨Êý¾ÝÊǹ¥»÷ÕßµÄÄ¿µÄ£¬ £¬£¬£¬£¬Í¬Ê±¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢Ò²Ôâй¶£¬ £¬£¬£¬£¬°üÀ¨µØµã¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµã¡¢Óû§ÃûºÍÃÜÂë ¡£¡£¡£¡£¹ØÓÚʹÓÃLayby»òPayPalÔÚÏß¹ºÎïµÄ¿Í»§£¬ £¬£¬£¬£¬Æä¸¶¿îÐÅÏ¢²»ÊÜÓ°Ïì ¡£¡£¡£¡£Animates»¹È·ÈϳÆÊµÌåµêµÄÉúÒâδÊÜÓ°Ïì ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.animates.co.nz/data-breach/


3.ÃÀ¹úGilletteÒ½ÔºÔâÀÕË÷Èí¼þ¹¥»÷µ¼ÖÂЧÀÍÖÐÖ¹


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ƾ֤ÃÀ¹úÎÀÉú²¿·¢³öµÄ¾¯±¨£¬ £¬£¬£¬£¬GilletteÒ½ÔºÔÚÉÏÖÜÎåÔâµ½ÀÕË÷Èí¼þ¹¥»÷ ¡£¡£¡£¡£¸Ã¹¥»÷Ô¼±¬·¢ÔÚÖÜÎ寯Ïþ3µã£¬ £¬£¬£¬£¬µ¼ÖÂÒ½ÔºÔâÓöÁËÑÏÖØµÄÅÌËã»úÎÊÌâÒÔ¼°Ð§ÀÍÖÐÖ¹ ¡£¡£¡£¡£ÔÚÖÜÎåϰàʱ¼ä£¬ £¬£¬£¬£¬¸ÃÒ½ÔºµÄµç»°ÏµÍ³ÒÑÖØÐÂÉÏÏߣ¬ £¬£¬£¬£¬µ«ÈÔ²»¿É½ÓÄÉÈκÎл¼Õߣ¬ £¬£¬£¬£¬²¢ÇÒ×ÅʵÑéÊÒ¡¢ºôÎüÖÎÁƼ°·ÅÉä¿ÆÒ²²»¿ÉÌṩ¼ì²éºÍÖÎÁÆÐ§ÀÍ ¡£¡£¡£¡£¸ÃÒ½ÔºÕý½«ÃÅÕïЧÀÍ»ò¼±ÕïЧÀ͵ϼÕß·ÖÁ÷ÖÁÆäËüÒ½Ôº ¡£¡£¡£¡£ÎÀÉú²¿ÖÒÑÔÆäËüÒ½Ôº¼ì²âÆäITЧÀÍ£¬ £¬£¬£¬£¬²¢ÔÚ·¢Ã÷ÈκοÉÒÉÄÚÈÝʱÌáÐÑÕþ¸® ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.databreaches.net/wy-gillette-hospital-targeted-in-ransomware-attack/


4.AtlassianÐÞ¸´Jira ServerºÍService DeskÖеÄÁ½¸öÎó²î


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


AtlassianÐû²¼Jira ServerºÍService DeskµÄÇå¾²¸üУ¬ £¬£¬£¬£¬ÐÞ¸´Á½¸öÇå¾²Îó²î ¡£¡£¡£¡£µÚÒ»¸öÎó²îÊÇURL·¾¶±éÀúÎó²î£¨CVE-2019-14994£©£¬ £¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓôËÎó²îÉó²éÄ¿µÄʵÀýÖеÄËùÓÐJiraÏîÄ¿£¬ £¬£¬£¬£¬°üÀ¨Service DeskÏîÄ¿¡¢Jira CoreÏîÄ¿ºÍJira SoftwareÏîÄ¿ ¡£¡£¡£¡£TenableÑо¿Ö°Ô±Satnam Narang±¨¸æ³Æ2.5Íò¶à¸öÒ×Êܹ¥»÷µÄʵÀýÔÚÍøÉÏ̻¶£¬ £¬£¬£¬£¬ËüÃÇÊôÓÚÒ½ÁÆ¡¢Õþ¸®¡¢½ÌÓýºÍÖÆÔìÐÐÒµµÈ ¡£¡£¡£¡£µÚ¶þ¸öÎó²îÊÇJira Importers²å¼þÖеÄÄ£°å×¢ÈëÎó²î£¨CVE-2019-15001£©£¬ £¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÁËJira ServerºÍJira Data CenterµÄ7.0.10°æ±¾£¬ £¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓøÃÎó²îÔ¶³ÌÖ´ÐдúÂë ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/jira-server-and-service-desk-fix-critical-security-bugs/


5.VMwareÐÞ¸´ESXi¡¢WorkstationµÈ²úÆ·ÖеÄÁ½¸öÎó²î


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


VMwareÐû²¼Çå¾²¸üУ¬ £¬£¬£¬£¬ÐÞ¸´¶à¸ö²úÆ·ÖеÄÁ½¸öÎó²î ¡£¡£¡£¡£µÚÒ»¸öÎó²îÊÇESXi¡¢Workstation¡¢Fusion¡¢VMRCºÍHorizon ClientÖеÄuse-after-freeÎó²î£¬ £¬£¬£¬£¬¸ÃÎó²î£¨CVE-2019-5527£©µÄCVSS v3ÆÀ·ÖΪ8.5·Ö£¬ £¬£¬£¬£¬ÊÇÒ»¸öÐéÄâ»úÌÓÒÝÎó²î£¬ £¬£¬£¬£¬¿Í»§»úÉϾßÓзÇÖÎÀíԱȨÏÞµÄÍâµØ¹¥»÷Õß¿ÉʹÓøÃÎó²îÔÚËÞÖ÷»úÉÏÖ´ÐдúÂë ¡£¡£¡£¡£µÚ¶þ¸öÎó²îÊÇWorkstationºÍFusionÖеÄDoSÎó²î£¨CVE-2019-5535£©£¬ £¬£¬£¬£¬¸ÃÎó²îµÄCVSS v3ÆÀ·ÖΪ4.7·Ö ¡£¡£¡£¡£¸ÃÎó²îÓëVMNATµÄIPv6ģʽÓйØ£¬ £¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔͨ¹ý·¢ËͶñÒâIPv6Êý¾Ý°üÀ´Õ¥È¡NATģʽÏ¿ͻ§»úÉϵÄÍøÂç»á¼û ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.vmware.com/security/advisories/VMSA-2019-0014.html


6.Ñо¿ÍŶÓÐû²¼Magecart¶ñÒâÓòÃûÉúÃüÖÜÆÚµÄÆÊÎö±¨¸æ


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ƾ֤RiskIQµÄÒ»·ÝÐÂÑо¿£¬ £¬£¬£¬£¬·¸·¨·Ö×ÓÕýÔÚ¶þ´ÎʹÓÃMagecart¶ñÒâÓòÃû¾ÙÐÐÆäËü¶ñÒâ»î¶¯ ¡£¡£¡£¡£ÔÚMagecartÁ÷Á¿±»sinkhole»òÆäËü·½·¨×èÖ¹»î¶¯ºó£¬ £¬£¬£¬£¬·¸·¨·Ö×ӻṺÖÃÕâЩÓòÃû£¬ £¬£¬£¬£¬´Ó¶øÊ¹Óñ»MagecartÉøÍ¸µÄÍøÕ¾·Ö·¢¶ñÒâ¹ã¸æ»ò¾ÙÐÐÆäËü¶ñÒâ»î¶¯ ¡£¡£¡£¡£ÕâÊÇÓÉÓÚÍøÕ¾ËùÓÐÕßÍùÍùûÓйØ×¢ÆäÍøÕ¾ÉÏÔËÐеÄJavaScript¾ç±¾£¬ £¬£¬£¬£¬Êý¾ÝÏÔʾMagecartƲÔüÆ÷ÔÚÍøÕ¾ÉÏµÄÆ½¾ùÍ£Áôʱ¼äÁè¼ÝÁ½¸öÔ£¬ £¬£¬£¬£¬²¢ÇÒÓÐÐí¶àÏÕЩÊÇÎÞÏÞÆÚµØÍ£ÁôÔÚÄÇÀï ¡£¡£¡£¡£ÕâÖÖ²»¿É¼ûÐÔÒâζ×ÅÒ»µ©¶ñÒâÓòÃû±»Ôٴ줻 £¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔ¾ÙÐÐÆäËü¶ñÒâ»î¶¯À´Í¶Æõ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.riskiq.com/blog/labs/magecart-reused-domains/