΢Èí10Ô·ݸüÐÂÐÞ¸´3¸ö±»ÀûÓ鶴ÔÚÄÚµÄ104¸ö©¶´

Ðû²¼Ê±¼ä 2023-10-11

1¡¢Î¢Èí10Ô·ݸüÐÂÐÞ¸´3¸ö±»ÀûÓ鶴ÔÚÄÚµÄ104¸ö©¶´


΢ÈíÔÚ10ÔÂ10ÈÕÐû²¼Á˱¾ÔµÄÖܶþ²¹¶¡£¬×ܼÆÐÞ¸´ÁË104¸öÄþ¾²Â©¶´£¬°üÂÞÈý¸öÒѱ»ÀûÓõÄ©¶´ ¡£±»ÀûÓ鶴°üÂÞSkype for BusinessÌáȨ©¶´£¨CVE-2023-41763£©¡¢Microsoft WordPadÐÅϢ鶩¶´£¨CVE-2023-36563£©ºÍHTTP/2¿ìËÙÖØÖù¥»÷£¨CVE-2023-44487£© ¡£¶ÔÓÚCVE-2023-44487£¬Î¢ÈíÐû²¼ÁËÕë¶ÔDDoS¹¥»÷¼¼ÊõHTTP/2 Rapid ResetµÄ»º½â´ëÊ©£¬¸Ã¼¼Êõ×Ô8Ô·ÝÒÔÀ´Ò»Ö±±»ÀûÓà ¡£ÓÉÓڸù¦Ð§ÄÚÖÃÓÚHTTP/2³ß¶ÈÖУ¬Òò´Ë³ýÁËÏÞÖÆËÙÂÊ»ò×èֹЭÒéÍ⣬ûÓÐÆäËüÐÞ¸´ÒªÁì ¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-october-2023-patch-tuesday-fixes-3-zero-days-104-flaws/


2¡¢ºÚ¿Í¹ûÈ»HelloKittyÔ´Âë²¢³ÆÔÚ¿ª·¢¸üÇ¿´óµÄ¼ÓÃÜÆ÷


¾ÝýÌå10ÔÂ9ÈÕ±¨µÀ£¬ºÚ¿Íkapuchin0£¨±ðÃûGookee£©ÔÚXSSÂÛ̳ÉϹûÈ»ÁËÀÕË÷Èí¼þHelloKittyµÄÔ´´úÂ룬²¢Éù³ÆÕýÔÚ¿ª·¢Ò»ÖÖеĸüÇ¿´óµÄ¼ÓÃÜÆ÷ ¡£Ðû²¼µÄhellokitty.zipѹËõ°ü°üÂÞÒ»¸öMicrosoft Visual Studio½â¾ö·½°¸£¬¿É¹¹½¨HelloKitty¼ÓÃÜÆ÷ºÍ½âÃÜÆ÷ÒÔ¼°NTRUEncrypt¿â ¡£Ñо¿ÈËԱȷÈÏ£¬ÕâÊÇHelloKittyÔÚ2020ÄêÊ×´ÎÆô¶¯Ê±Ê¹ÓõĺϷ¨Ô´´úÂë ¡£ËäÈ»ÀÕË÷Èí¼þÔ´´úÂëµÄ¹ûÈ»ÓÐÖúÓÚÄþ¾²Ñо¿£¬µ«Ò²ÈÝÒ×±»¹¥»÷ÕßÀÄÓÿª·¢×Ô¼ºµÄ¶ñÒâÈí¼þ ¡£


https://securityaffairs.com/152182/malware/hellokitty-ransomware-source-code-leaked.html


3¡¢Akamai¼ì²âµ½½Ù³ÖµçÉÌÍøÕ¾404Ò³ÃæÇÔÈ¡ÐÅÓÿ¨µÄ»î¶¯


AkamaiÔÚ10ÔÂ9ÈÕ³ÆÆä¼ì²âµ½ÐÂÒ»ÂÖµÄMagecart¹¥»÷»î¶¯ ¡£¸Ã»î¶¯Ö÷ÒªÕë¶ÔMagentoºÍWooCommerceÍøÕ¾£¬Éæ¼°ÓëʳƷºÍÁãÊÛÐÐÒµÓйصĹ«Ë¾£¬ÀûÓÃĬÈϵġ°404 Not Found¡±Ò³ÃæÀ´Òþ²ØºÍ¼ÓÔØÒøÐп¨ÇÔÈ¡´úÂë ¡£¼ÓÔØ·¨Ê½ÏòÏà¶Ô·¾¶¡°icons¡±Ìᳫ»ñÈ¡ÇëÇ󣬵«ÓÉÓڸ÷¾¶²»´æÔڻᵼÖÂ404´íÎó ¡£Æð³õ£¬Ñо¿ÈËÔ±ÈÏΪskimmerÒѲ»»îÔ¾£¬»ò¹¥»÷ÕßÅäÖôíÎó ¡£ºóÀ´·ÖÎö·¢ÏÖ£¬¼ÓÔØ·¨Ê½°üÂÞÒ»¸öÕýÔò±í´ïʽƥÅ䣬ÔÚ404Ò³Ãæ·µ»ØµÄHTMLÖÐËÑË÷Ìض¨×Ö·û´® ¡£AkamaiÔÚÕÒµ½¸Ã×Ö·û´®ºó·¢ÏÖÁËÒþ²ØÔÚ×¢ÊÍÖеÄbase64±àÂë×Ö·û´®£¬½âÂëºó·¢ÏÖÁËÒþ²ØÔÚËùÓÐ404Ò³ÃæÖеÄJavaScript skimmer ¡£


https://www.akamai.com/blog/security-research/magecart-new-technique-404-pages-skimmer


4¡¢TagDiv²å¼þ©¶´CVE-2023-3169±»ÓÃÓÚ¹¥»÷ÉÏÍò¸öWPÍøÕ¾


¾Ý10ÔÂ9ÈÕ±¨µÀ£¬TagDiv Composer²å¼þ©¶´Òѱ»ÓÃÓÚ¹¥»÷Áè¼Ý17000¸öWordPressÍøÕ¾£¬×÷ΪBalada Injector»î¶¯µÄÒ»²¿ÃÅ ¡£ÕâÊÇÒ»¸öXSS©¶´£¨CVE-2023-3169£©£¬ÆäÏêϸÐÅÏ¢ºÍPoCÓÚ9ÔÂÖÐÑ®Åû¶£¬²»¾ÃÖ®ºóSucuri¾Í¿ªÊ¼·¢ÏÖÀûÓø鶴µÄ¹¥»÷ ¡£¹¥»÷ÕßÀûÓø鶴½«¶ñÒâ´úÂë×¢ÈëWordPressÊý¾Ý¿âÖеÄÌض¨Î»Öã¬ÒÔÈ·±£´úÂë¿ÉÁ÷´«µ½Ä¿±êÍøÕ¾µÄÿ¸ö¹ûȻҳÃæ ¡£Balada Injector»î¶¯×Ô2017ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬¾ÝÔ¤¼ÆÒÑÈëÇÖ½ü100Íò¸öWordPressÍøÕ¾ ¡£


https://www.securityweek.com/recently-patched-tagdiv-plugin-flaw-exploited-to-hack-thousands-of-wordpress-sites/


5¡¢D-Link DAP-X1860 WiFi 6´æÔÚ©¶´CVE-2023-45208


ýÌå10ÔÂ9Èճƣ¬D-Link DAP-X1860 WiFi 6·¶Î§À©Õ¹Æ÷´æÔÚ©¶´£¨CVE-2023-45208£©£¬ÈÝÒ×µ¼ÖÂDoSºÍÔ¶³ÌÃüÁî×¢Èë ¡£ÎÊÌâÔÚÓÚÉ豸µÄÍøÂçɨÃ蹦Ч£¬ÎÞ·¨½âÎöÃû³ÆÖаüÂÞÌØÊâ·ûºÅ(')µÄSSID£¬½«ÆäÎó½âΪÃüÁîÖÕÖ¹·û ¡£´Ó¼¼ÊõÉϽ²£¬ËüÔ´ÓÚlibcgifunc.so¿âÖеÄparsing_xml_stasurveyº¯Êý ¡£ÓÉÓڸòúÎïȱ·¦SSIDÇåÀí¹¦Ð§£¬¹¥»÷Õß¿ÉÒÔÀûÓô˹¦Ð§µ½´ï¶ñÒâÄ¿µÄ ¡£Ñо¿ÈËÔ±ÓÚ5Ô·¢ÏÖ²¢ÏòD-Link³ÂË߸鶴£¬¾¡¹ÜÒѶà´Î¸ú½ø£¬µ«ÈÔδÊÕµ½»Ø¸´ ¡£


https://www.bleepingcomputer.com/news/security/d-link-wifi-range-extender-vulnerable-to-command-injection-attacks/


6¡¢Check PointÅû¶Õë¶ÔÑÇÖÞʵÌåµÄ»î¶¯Stayin' Alive


10ÔÂ9ÈÕ£¬Check PointÅû¶ÔÚÑÇÖÞ½øÐеļäµý»î¶¯Stayin' Alive£¬Ö÷ÒªÕë¶ÔµçÐÅÐÐÒµµÄÆóÒµºÍÕþ¸®»ú¹¹ ¡£¸Ã»î¶¯ÖÁÉÙ×Ô2021ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬ÀûÓõöÓãÓʼþºÍDLL²à¼ÓÔؼ¼Êõ·Ö·¢¶ñÒâÈí¼þ ¡£ÖµµÃ×¢ÒâµÄÊÇ£¬Ëüͨ¹ý½Ù³Ödal_keepalives.dllÀûÓÃÁËAudinate¡¯s Dante DiscoveryÈí¼þÖеÄ©¶´(CVE-2022-23748) ¡£¸Ã»î¶¯µÄ×Ô½ç˵¹¤¾ßÓëÒÑÖª¹¤¾ß¼¯Ã»ÓÐÃ÷ÏÔµÄÖصþ£¬µ«ËüÃǶ¼ÓëToddyCatÏà¹ØµÄ»ù´¡ÉèÊ©ÓйØÁª£¬Òò´ËÍƲâ¸Ã»î¶¯ÓëToddyCatÓйØ ¡£


https://blog.checkpoint.com/security/unveiling-stayin-alive-a-closer-look-at-an-ongoing-campaign-in-asia-targeting-telecom-and-governmental-entities/