AtlassianÐÞ¸´Confluence©¶´CVE-2023-22518

Ðû²¼Ê±¼ä 2023-11-02

1¡¢AtlassianÐÞ¸´Confluence©¶´CVE-2023-22518


¾ÝýÌå10ÔÂ31ÈÕ³Æ  £¬AtlassianÐÞ¸´ÁËÒ»¸öÑÏÖØµÄ©¶´£¨CVE-2023-22518£©  £¬ËüÓ°ÏìÁËËùÓа汾µÄConfluence Data CenterºÍConfluence Server ¡£ÕâÊÇÒ»¸öÊÚȨ²»Íש¶´  £¬¹¥»÷Õß¿ÉÀûÓøÃ©¶´ÆÆ»µÊÜÓ°Ïì·þÎñÆ÷ÉϵÄÊý¾Ý  £¬µ¼ÖÂÊý¾Ý¶ªÊ§  £¬µ«ÎÞ·¨±»ÓÃÀ´ÇÔÈ¡Êý¾Ý ¡£Í¨¹ýatlassian.netÓò·ÃÎʵÄAtlassian CloudÍøÕ¾²»ÊÜ´Ë©¶´µÄÓ°Ïì ¡£´Ë©¶´ÉÐδ±»Ö÷¶¯ÀûÓà  £¬¸Ã¹«Ë¾½¨ÒéÓû§Á¢¼´Ó¦ÓøüР¡£


https://www.bleepingcomputer.com/news/security/atlassian-warns-of-critical-confluence-flaw-leading-to-data-loss/


2¡¢Avastɱ¶¾Èí¼þ½«Android Google±ê־Ϊ¶ñÒâÈí¼þ


¾Ý10ÔÂ31ÈÕ±¨µÀ  £¬Äþ¾²¹«Ë¾Avast³Æ×ÔÖÜÁùÒÔÀ´  £¬Æäɱ¶¾Èí¼þ½«²¿ÃÅÐͺŵÄÖÇÄÜÊÖ»úÉϵÄGoogle AndroidÓ¦Óñê־Ϊ¶ñÒâÈí¼þ ¡£ÔÚÊÜÓ°ÏìÉ豸ÉÏ  £¬Óû§±»ÌáÐÑÁ¢¼´Ð¶ÔØGoogleÓ¦Óà  £¬ÒòΪËü¿ÉÄÜ»áÃØÃÜ·¢ËͶÌÐÅ¡¢ÏÂÔØºÍ°²×°ÆäËüÓ¦ÓûòÇÔÈ¡Óû§ÐÅÏ¢ ¡ £»¹ÓÐÈË¿´µ½Á˲îÒìµÄÌáÐÑ  £¬³ÆGoogleÓ¦ÓÃÊÇÒ»¸öľÂí  £¬¿ÉÒÔÔ¶³Ì·ÃÎÊËûÃǵÄÉ豸  £¬±»¹¥»÷ÕßÓÃÀ´°²×°¶ñÒâÈí¼þ²¢ÇÔÈ¡Êý¾Ý ¡£Avast͸¶  £¬Æäɱ¶¾SDKÎó½«Google¿ìËÙËÑË÷¿òÓ¦Ó÷¨Ê½Æô¶¯Æ÷±ê־Ϊ¶ñÒâÈí¼þ  £¬¸ÃÎÊÌâÒÑÓÚ10ÔÂ30ÈÕ½â¾ö ¡£


https://www.bleepingcomputer.com/news/security/avast-confirms-it-tagged-google-app-as-malware-on-android-phones/


3¡¢Scarred ManticoreÀûÓÃLIONTAIL¹¥»÷Öж«µÄ¹ú¼Ò


Check PointÓÚ10ÔÂ31ÈÕÅû¶ÁËScarred ManticoreÕë¶ÔÖж«¹ú¼Ò¾üÕþ»ú¹¹ºÍµçÐŹ«Ë¾µÄ¹¥»÷»î¶¯ ¡£¸ÃÍÅ»ï´Ó2019ÄêÆðÒ»Ö±»îÔ¾  £¬Ä¿Ç°µÄ»î¶¯ÔÚ2023ÄêÖÐÆÚµ½´ïáÛ·å ¡£×îлÀûÓÃÁËLIONTAIL  £¬ÕâÊÇÒ»ÖÖ°²×°ÔÚWindows·þÎñÆ÷Éϵı»¶¯¶ñÒâÈí¼þ¿ò¼Ü ¡£³öÓÚÒþ±ÎÐÔ  £¬LIONTIALÖ²È뷨ʽÀûÓöÔWindows HTTPÕ»Çý¶¯·¨Ê½HTTP.sysµÄÖ±½Óµ÷ÓÃÀ´¼ÓÔØ³£×¤ÄÚ´æµÄpayload ¡£Ñо¿ÈËÔ±»¹³Æ  £¬Scarred ManticoreÓëOilRig£¨ÓÖÃûAPT34£©ÓйØÁª ¡£


https://research.checkpoint.com/2023/from-albania-to-the-middle-east-the-scarred-manticore-is-listening/


4¡¢Mandiant¼ì²âµ½¶àÆðÀûÓÃCitrix Bleed©¶´µÄ»î¶¯


10ÔÂ31ÈÕ  £¬Mandiant³ÆÆä¼ì²âµ½¶àÆðÀûÓÃCitrix Bleed©¶´  £¬À´¹¥»÷ÃÀÖÞ¡¢Å·ÖÞ¡¢·ÇÖÞºÍÑÇÌ«µØÓòµÄ»î¶¯ ¡£ÕâÊÇNetScaler ADCºÍNetScaler GatewayÉ豸ÖеÄÐÅϢй¶©¶´£¨CVE-2023-4966£©  £¬×Ô8ÔÂÏÂÑ®ÒÔÀ´Ò»Ö±ÔÚ±»ÀûÓà ¡£ÀûÓé¶´ºó  £¬¹¥»÷Õß»á½øÐÐÍøÂçÕì²ì¡¢ÇÔÈ¡ÕÊ»§Æ¾¾Ý²¢Í¨¹ýRDP½øÐкáÏòÒÆ¶¯ ¡£MandiantÌåÏÖ  £¬ÔÚÖÖÖֻÖÐÀûÓÃCVE-2023-4966µÄ4¸ö¹¥»÷ÍÅ»ï  £¬ÔÚPost-Exploitation½×¶Î´æÔÚÒ»Ð©ÖØµþ ¡£


https://www.mandiant.com/resources/blog/session-hijacking-citrix-cve-2023-4966


5¡¢¶ñÒâNuGet°üÀûÓÃMSBuild¼¯³ÉÀ´·Ö·¢¶ñÒâÈí¼þ


 ReversingLabsÔÚ10ÔÂ31ÈÕÅû¶ÁËͨ¹ý¶ñÒâNuGet°üÀ´·Ö·¢¶ñÒâÈí¼þµÄ»î¶¯ ¡£Ñо¿ÈËÔ±ÓÚ10ÔÂ15ÈÕ·¢ÏÖÁË×îÐÂNuGet»î¶¯  £¬ÀûÓòîÒìµÄƴд´íÎóµÄÈí¼þ°üÀ´°²×°¶ñÒâÈí¼þ ¡£´Ë»î¶¯µÄÐÂÓ±Ö®´¦ÔÚÓÚ  £¬ÕâЩÈí¼þ°üûÓÐʹÓÃÔÚ°²×°½Å±¾ÖÐÖ²ÈëÏÂÔØ·¨Ê½µÄ³£ÓÃÒªÁì  £¬¶øÊÇÀûÓÃNuGetµÄMSBuild¼¯³ÉÀ´Ö´ÐдúÂë ¡£ÕâÊÇ8Ô³õÒÔÀ´µÄÁ¬Ðø»î¶¯µÄÒ»²¿ÃÅ  £¬Ö±µ½10ÔÂÖÐÑ®  £¬¹¥»÷Õ߲ſªÊ¼ÀûÓÃMSBuild¼¯³É ¡£ÔçÆÚ°æ±¾ÀûÓÃPowerShell½Å±¾£¨init.ps1£©´ÓGitHub´æ´¢¿â»ñÈ¡¶ñÒâÈí¼þpayload ¡£


https://www.reversinglabs.com/blog/iamreboot-malicious-nuget-packages-exploit-msbuild-loophole


6¡¢CiscoÐû²¼¹ØÓÚArid Viper¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß


10ÔÂ31ÈÕ  £¬Cisco TalosÐû²¼Á˹ØÓÚArid Viper¹¥»÷»î¶¯µÄ·ÖÎö³ÂËß ¡£¸Ã»î¶¯×Ô2022Äê4Ô¿ªÊ¼»îÔ¾  £¬Ò»Ö±Õë¶Ô°¢À­²®ÓïµØÓò ¡£¹¥»÷ÕßÀûÓÃαÔìµÄ¶ñÒâAndroidÓ¦Óà  £¬Ö¼ÔÚ´ÓÄ¿±êÊÖ»úÖÐÊÕ¼¯Êý¾Ý ¡£ÓÐȤµÄÊÇ  £¬¸Ã¶ñÒâÈí¼þÓëÔ¼»áÈí¼þSkippedµÄÔ´´úÂëÏàËÆ  £¬Õâ±íÃ÷ÔËÓªÍÅ»ïҪôÓëSkippedµÄ¿ª·¢ÈËÔ±ÓÐÁªÏµ  £¬ÒªÃ´·Ç·¨»ñµÃÁËÏîÄ¿µÄ·ÃÎÊȨÏÞ ¡£¹¥»÷Õß»á·Ö·¢Î±×°³ÉÔ¼»áÓ¦ÓøüеĶñÒâÁ´½Ó  £¬´Ó¶ø½«¶ñÒâÈí¼þ°²×°µ½Óû§µÄÉ豸 ¡£


https://blog.talosintelligence.com/arid-viper-mobile-spyware/