̻¶µÄ»·¾³±äÁ¿Îļþµ¼ÖÂÔÆ»·¾³ÔâÊÜ´ó¹æÄ£ÀÕË÷
Ðû²¼Ê±¼ä 2024-08-208ÔÂ16ÈÕ£¬Ò»³¡Õë¶Ô¶à¸ö×éÖ¯µÄ´ó¹æÄ£ÀÕË÷»î¶¯ÀûÓÃÁ˿ɹûÈ»·ÃÎʵĻ·¾³±äÁ¿Îļþ£¨.env£©£¬ÕâЩÎļþ°üÂÞÔƺÍÉ罻ýÌåÓ¦Ó÷¨Ê½µÄÃô¸Ðƾ¾Ý¡£Palo Alto Networks Unit 42ÔÚ³ÂËßÖÐÖ¸³ö£¬´Ë´Î¹¥»÷̻¶ÁË»·¾³±äÁ¿¡¢ºã¾Ãƾ֤ʹÓü°×îСÌØȨ¼Ü¹¹È±Ê§µÈÄþ¾²Â©¶´¡£¹¥»÷Õßͨ¹ýÊÜѬȾµÄAmazon Web Services (AWS)»·¾³ÉèÖÃÁË»ù´¡ÉèÊ©£¬É¨ÃèÁè¼Ý2.3ÒÚ¸öÄ¿±êÒÔÊÕ¼¯Ãô¸ÐÊý¾Ý¡£ËûÃÇ´Ó110,000¸öÓòÃûµÄ.envÎļþÖÐÌáÈ¡ÁË90,000¶à¸öΨһ±äÁ¿£¬°üÂÞÔÆ·þÎñºÍÉ罻ýÌåÕË»§Æ¾¾Ý¡£¹¥»÷Õßδ¼ÓÃÜÊý¾Ý¼´ÇÔÈ¡£¬²¢ÔÚÔÆ´æ´¢ÈÝÆ÷ÖзÅÖÃÀÕË÷ÐÅ¡£ÀûÓÃAWS IAMȨÏÞ£¬¹¥»÷ÕßÀ©´óÁ¢×ãµã£¬´´½¨ÐÂLambdaº¯Êý½øÐл¥ÁªÍø·¶Î§É¨Ã裬ѰÕÒ̻¶µÄ»·¾³Îļþ¡£Àֳɻñȡƾ¾Ýºó£¬¹¥»÷Õß½«Æä´æ´¢ÔÚ¹«¹²S3´æ´¢Í°ÖС£ÌرðµØ£¬ËûÃǹØ×¢º¬ÓÐMailgunƾ¾ÝµÄ.envÎļþ£¬Æóͼ·¢ËÍÍøÂçµöÓãÓʼþ¡£¾¡¹ÜʵÑé·Ç·¨¼ÓÃÜ»õ±ÒÍÚ¾òʧ°Ü£¬µ«¾¼Ã¶¯»úÃ÷ÏÔ¡£¹¥»÷ÕßʹÓÃVPNºÍTORÒþ²ØÉí·Ý£¬Unit 42¼ì²âµ½ÎÚ¿ËÀ¼ºÍĦÂå¸çµÄIPµØÖ·Óë»î¶¯Ïà¹Ø¡£´Ë´Î»î¶¯ÏÔʾÁ˹¥»÷ÕßÀûÓÃ×Ô¶¯»¯¼¼ÊõÔÚÔÆ»·¾³ÖÐѸËÙÕ¹¿ªÐж¯µÄ¸ßÃ÷¼¼ÄÜ¡£
https://thehackernews.com/2024/08/attackers-exploit-public-env-files-to.html
2. WPS Office©¶´CVE-2024-7262ÔâÀûÓã¬Î£¼°2ÒÚÓû§
8ÔÂ16ÈÕ£¬WPS OfficeÊÇÒ»¿îÓµÓÐÁè¼Ý2ÒÚÓû§µÄ°ì¹«Ì×¼þ£¬½üÆÚÆسöÁ½¸ö¸ßΣ©¶´CVE-2024-7262ºÍCVE-2024-7263£¬CVSSÆÀ·Ö¸ß´ï9.3£¬½ÒʾÁ˼«¸ßµÄÄþ¾²·çÏÕºÍÒ×±»ÀûÓÃÐÔ¡£ÕâÁ½¸ö©¶´¾ùλÓÚÆäpromecefpluginhost.exe×é¼þÖУ¬Í¨¹ý²»³äʵµÄ·¾¶ÑéÖ¤»úÖÆ£¬Ê¹¹¥»÷ÕßÄܹ»ÓÕµ¼Óû§´ò¿ªÌØÖƵç×Ó±í¸ñÎĵµ£¬½ø¶ø¼ÓÔز¢Ö´ÐÐÈÎÒâWindows¿â¡£CVE-2024-7262Ó°Ïì12.2.0.13110ÖÁ12.2.0.13489°æ±¾£¬ÔÊÐíÔ¶³Ì´úÂëÖ´ÐУ¬¿ÉÄÜÒý·¢Êý¾Ýй¶¡¢ÀÕË÷Èí¼þ¹¥»÷»òϵͳÉî¶ÈÈëÇÖ¡£¾¡¹Ü½ðɽ¶¾°ÔÐû²¼ÁË12.2.0.16909°æ±¾×÷ΪCVE-2024-7262µÄ²¹¶¡£¬µ«ËæºóÓÖ·¢ÏÖÁËCVE-2024-7263£¬¸Ã©¶´´æÔÚÓÚ12.2.0.17153ÒÔÏ°汾£¬ÓÉÓÚδ³¹µ×ÇåÀíÌرð²ÎÊý£¬Ê¹µÃÔ²¹¶¡Ê§Ð§£¬ÔÙ´Î̻¶Äþ¾²·çÏÕ¡£ÓÈΪÑÏÖصÄÊÇ£¬CVE-2024-7262Òѱ»¶ñÒâÀûÓã¬Í¨¹ý·Ö·¢Î±×°³ÉºÏ·¨ÎĵµµÄ¶ñÒâÎļþ£¬¹¥»÷ÕßÕý»ý¼«Õ¹¿ª¹¥»÷¡£Òò´Ë£¬Ç¿ÁÒ½¨ÒéËùÓÐWPS OfficeÓû§Á¢¼´Éý¼¶ÖÁ12.2.0.17153»ò¸ü¸ß°æ±¾£¬ÒÔ·À·¶Ç±ÔÚµÄÄþ¾²Íþв¡£
https://securityonline.info/wps-office-vulnerabilities-expose-200-million-users-cve-2024-7262-exploited-in-the-wild/
3. Ailurophile£ºÔ´×ÔÔ½ÄϵĶ¨ÖÆ»¯ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ½ÒÃØ
8ÔÂ19ÈÕ£¬G DATAÍøÂçÄþ¾²ÍŶӽÒ¶ÁËÒ»¿îÃûΪ¡°Ailurophile¡±µÄÐÂÐÍPHP»ùÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ£¬ÒÉËÆÔ´×ÔÔ½Äϲ¢ÒÔ¶©ÔÄģʽÏúÊÛ¡£AilurophileÅ䱸ÁËÒ»¸ö¹¦Ð§¸»ºñµÄÍøÂçÃæ°å£¬ÔÊÐíÂò¼Ò¸ß¶È×Ô½ç˵¶ñÒâÈí¼þ£¬°üÂÞÃüÃû¡¢Í¼±êÉèÖá¢Telegram֪ͨÅäÖã¬ÉõÖÁʹÈí¼þ¸üÄѱ»¼ì²â¡¢ÈƹýWindows Defender·ÀÓù£¬²¢´ÓÔ¶³ÌURL²¿ÊðÌرð¶ñÒ⸺ÔØ¡£ÆäÇ¿´óµÄÊý¾ÝÇÔÈ¡ÄÜÁ¦¾Û½¹ÓÚChrome¡¢EdgeµÈÖ÷Á÷ä¯ÀÀÆ÷£¬ÄÜÇÔÈ¡°üÂÞ×Ô¶¯Ìî´ÕÊý¾Ý¡¢cookies¡¢ÃÜÂë¡¢ä¯ÀÀÀúÊ·¡¢ÐÅÓÿ¨ÐÅÏ¢¼°¼ÓÃÜ»õ±ÒÇ®°üÊý¾ÝÔÚÄÚµÄÃô¸ÐÐÅÏ¢¡£Ailurophileͨ¹ý¡°ExeOutput¡±ºÍ¡°BoxedApp¡±¼¼Êõ·â×°ºÍÐéÄ⻯£¬Ê¹ÆäÔÚÄÚ´æÖÐÔËÐУ¬Ôö¼ÓÁËÒþ±ÎÐÔºÍÌӱܼì²âµÄÄÜÁ¦¡£¶ñÒâÈí¼þÓɶà¸öPHP½Å±¾×é³É£¬¸÷˾ÆäÖ°£¬´ÓÊÕ¼¯ÏµÍ³ÐÅÏ¢¡¢ÖÕÖ¹¾ºÕù½ø³Ì£¬µ½¾«×¼ÌáÈ¡²¢ÉÏ´«Óû§Êý¾Ý£¬Ã¿¸ö½Å±¾¶¼ÊÎÑÝ×ÅÒªº¦½ÇÉ«¡£ÌرðÊÇÆäÕë¶ÔÌض¨ÎļþºÍÒªº¦×ÖµÄÊý¾ÝËÑË÷¹¦Ð§£¬½øÒ»²½ÍØ¿íÁËÐÅÏ¢ÇÔÈ¡·¶Î§¡£G DATAÖ¸³ö£¬AilurophileÕý´¦ÓÚ»îÔ¾¿ª·¢½×¶Î£¬²»Í£ÒýÈëй¦Ð§Óë¸ïУ¬Í¨¹ý¶ñÒâÈí¼þÆƽâµÈ·½Ê½Á÷´«£¬¶ÔÍøÂçÄþ¾²×é³ÉÁ¬ÐøÍþв¡£
https://securityonline.info/new-infostealer-ailurophile-discovered-poses-significant-risk-to-user-privacy/
4. ·áÌïÔâºÚ¿ÍÈëÇÖ£¬240GBÊý¾Ýµµ°¸Ð¹Â¶
8ÔÂ19ÈÕ£¬Ò»ÃûºÚ¿ÍÔÚÂÛ̳ÉϹûÈ»ÁË´Ó·áÌïϵͳ·Ç·¨»ñÈ¡µÄ240GBÊý¾Ýµµ°¸£¬È·ÈÏ·áÌïÔâÓöÁËÍøÂçÄþ¾²ÈëÇÖ¡£·áÌï¹Ù·½»ØÓ¦³ÆÒÑÖªÏþ´ËÊ£¬²¢Ç¿µ÷ÎÊÌⷶΧÓÐÏÞ£¬·ÇϵͳÐÔÎÊÌâ¡£¹«Ë¾Õý»ý¼«ÓëÊÜÓ°ÏìÓû§Ïàͬ£¬ÌṩÐëÒªÔ®Öú£¬µ«¾ßÌåϸ½ÚÈ究´·¢ÏÖʱ¼ä¡¢¹¥»÷·¾¶¼°ÊÜÓ°ÏìµÄÓû§ÊýÁ¿µÈÐÅÏ¢ÉÐδ¶ÔÍâÐû²¼¡£Ð¹Â¶±»µÁÊý¾ÝµÄÍþвÕßZeroSevenGroup×Ô³ÆÈëÇÖÁË·áÌïλÓÚÃÀ¹úµÄ·ÖÖ§»ú¹¹£¬ÇÔÈ¡ÁË°üÂÞÔ±¹¤ÐÅÏ¢¡¢¿Í»§ÐÅÏ¢¡¢ºÏͬ¼°²ÆÕþ¼Ç¼ÔÚÄڵĺ£Á¿Êý¾Ý¡£ËûÃÇ»¹Éù³ÆʹÓÃÁË¿ªÔ´¹¤¾ßADReconÊÕ¼¯ÍøÂç»ù´¡ÉèÊ©Ç鱨¼°Æ¾Ö¤£¬½øÒ»²½Õ¹Ê¾ÁË´ÓActive DirectoryÖÐÌáÈ¡ÐÅÏ¢µÄÄÜÁ¦¡£¸Ã×éÖ¯²»½ö·ÖÏíÁËÊý¾ÝÄÚÈݸÅÀÀ£¬ÈçÁªÏµÈË¡¢¼Æ»®¡¢Ô±¹¤ÕÕƬµÈ£¬»¹ÌṩÁË´øÃÜÂëµÄAD-Recon½á¹û£¬¹©ÈËËæÒâ²éÔÄ¡£ÖµµÃ×¢ÒâµÄÊÇ£¬¾¡¹Ü·áÌïδÃ÷ȷйÃÜʼþµÄ¾ßÌåÈÕÆÚ£¬µ«¼¼Êõ·ÖÎöÖ¸³öÏà¹ØÎļþÖÁÉÙÔÚ2022Äê12ÔÂ25ÈÕÒѱ»´´½¨»ò»ñÈ¡£¬ÌåÏÖ¹¥»÷Õß¿ÉÄÜÒÑÉø͸ÖÁ´æ´¢Êý¾ÝµÄ±¸·Ý·þÎñÆ÷ϵͳ¡£
https://www.bleepingcomputer.com/news/security/toyota-confirms-breach-after-stolen-data-leaks-on-hacking-forum/
5. Jenkins CLI©¶´CVE-2024-23897±»CISAÁÐΪÒÑÖªÀûÓ÷çÏÕ
8ÔÂ19ÈÕ£¬ÃÀ¹úÍøÂçÄþ¾²ºÍ»ù´¡ÉèÊ©Äþ¾²¾Ö£¨CISA£©Òѽ«JenkinsÃüÁîÐнçÃ棨CLI£©µÄÒ»ÏîÑÏÖØ·¾¶±éÀú©¶´£¨CVE-2024-23897£¬CVSSÆÀ·Ö¸ß´ï9.8£©ÄÉÈëÆäÒÑÖªÀûÓ鶴£¨KEV£©Ä¿Â¼£¬Í¹ÏÔÁ˸鶴µÄ½ô¼±ÐÔÓëÑÏÖØÐÔ¡£Jenkins£¬×÷Ϊ¹ãÊÜ»¶ÓµÄ¿ªÔ´×Ô¶¯»¯·þÎñÆ÷£¬Î¬»¤×ÅÈ«ÇòÊýÊ®Íò°²×°ÊµÀý£¬Óû§³¬°ÙÍò¡£½üÆÚÅû¶µÄCVE-2024-23897©¶´ÔÊÐí¹¥»÷Õßͨ¹ýCLIÀûÓÃĬÈÏÆôÓõÄÎļþÄÚÈÝÀ©Õ¹¹¦Ð§£¬¶ÁÈ¡Jenkins¿ØÖÆÆ÷ÉϵÄÈÎÒâÎļþ£¬ÉõÖÁ¿ÉÄÜÖ´ÐÐÔ¶³Ì´úÂ룬¶ÔϵͳÄþ¾²×é³ÉÖØ´óÍþв¡£¸Ã©¶´Ô´ÓÚJenkins¶ÔCLIÃüÁî²ÎÊýµÄ´¦Ö÷½Ê½£¬ÌرðÊÇargs4j¿âÖеġ°expandAtFiles¡±¹¦Ð§£¬Î´ÄÜÔÚ½Ïа汾Öб»ÓÐЧ½ûÓá£ÓµÓС°Overall/Read¡±È¨Ï޵Ĺ¥»÷ÕßÄÜÎÞÏÞÖƵضÁÈ¡Îļþ£¬¶øÎÞ´ËȨÏÞÕßÒ²ÄܶÁÈ¡Ç°ÈýÐÐÄÚÈÝ£¬°üÂÞ¿ÉÄÜ´æ´¢Ãô¸ÐÐÅÏ¢µÄ¼ÓÃÜÃÜÔ¿Îļþ¡£¶à¸öÑо¿Ô±ÒÑÐû²¼¿´·¨ÑéÖ¤£¨PoC£©Â©¶´£¬¾¯Ê¾¸Ã©¶´¿ÉÄÜÔâµ½´ó¹æÄ£ÀûÓã¬ShodanÉϵIJéѯ½á¹ûÏÔʾ³¬75,000¸öJenkinsʵÀýÖ±½Ó̻¶ÓÚ»¥ÁªÍø£¬·çÏÕ¼«¸ß¡£ÎªÓ¦¶Ô´ËÍþв£¬CISAÒÑÏòÁª°î»ú¹¹·¢³öÖ¸ÁҪÇóÔÚ2024Äê9ÔÂ9ÈÕÇ°ÐÞ¸´´Ë©¶´¡£
https://securityaffairs.com/167267/hacking/cisa-adds-jenkins-command-line-interface-cli-bug-to-its-known-exploited-vulnerabilities-catalog.html
6. FlightAwareÅäÖôíÎóÖ¿ͻ§ÐÅϢй¶
8ÔÂ19ÈÕ£¬º½°à¸ú×Ù·þÎñ¾ÞÍ·FlightAwareÔâÓöÁËÒ»ÆðÑÏÖصĸöÈËÊý¾Ýй¶Ê¼þ£¬¾Ý³ÆÕâÊÇÓÉÓÚ¹«Ë¾ÄÚ²¿µÄÅäÖôíÎóËùµ¼Ö¡£¸Ã¹«Ë¾ÔÚÆä¹Ù·½Í¨ÖªÖÐÈÏ¿É£¬×Ô2021Äê1ÔÂÆð£¬Æäϵͳ´æÔÚÄþ¾²Òþ»¼£¬¿ÉÄÜй¶ÁË°üÂÞ¿Í»§ÐÕÃû¡¢µç×ÓÓʼþ¡¢Õ˵¥ÓëËÍ»õµØÖ·¡¢IPµØÖ·¡¢É罻ýÌåÐÅÏ¢¡¢µç»°ºÅÂë¡¢³öÉúÄê·Ý¡¢ÐÅÓÿ¨Î²ºÅ¡¢·É»úËùÓÐȨÏêÇé¡¢Ö°ÒµÐÅÏ¢¼°ÕË»§»î¶¯¼Ç¼µÈÃô¸ÐÊý¾Ý¡£¸üÁîÈ˵£ÓǵÄÊÇ£¬²¿ÃÅ¿Í»§µÄÉç»áÄþ¾²ºÅÂëºÍÃÜÂëÒ²¿ÉÄÜÊܵ½Ó°Ïì¡£FlightAwareѸËÙÏìÓ¦£¬ÒªÇóËùÓÐDZÔÚÊÜÓ°ÏìµÄÓû§ÖØÖÃÕË»§ÃÜÂ룬µ«¹ØÓÚÃÜÂëµÄ¼ÓÃÜÇé¿ö¼°ÊÇ·ñ´æÔÚ½øÒ»²½µÄÀÄÓÃÐÐΪ£¬¹«Ë¾²¢Î´ÔÚ֪ͨÖÐÏêϸ˵Ã÷¡£´Ë´Îй¶Ê¼þµÄʱ¼ä¿ç¶È³¤´ïÈýÄê¶à£¬ÏÔʾ³ö¹«Ë¾ÔÚÊý¾ÝÄþ¾²¹ÜÀíºÍ¼à¿ØÉϵÄÖØ´óÊè©¡£¾¡¹ÜFlightAware¼á³ÆÕâÊÇÄÚ²¿Ê§Îó¶ø·ÇÍⲿ¶ñÒâ¹¥»÷£¬µ«Êý¾ÝµÄʵ¼ÊÀûÓÃÇé¿öÈÔ²»Ã÷ÀÊ£¬¹«Ë¾Ò²Î´ÄÜÈ·ÈÏÊÇ·ñÓеÚÈý·½·Ç·¨·ÃÎÊ»òÏÂÔØÁËÕâЩÊý¾Ý¡£Ãæ¶Ô¹«ÖÚµÄÖÊÒɺ͹ØÇУ¬FlightAware·¢ÑÔÈ˱£³Ö³ÁĬ£¬Î´¾Í¾ßÌåÊÜÓ°Ïì¿Í»§ÊýÁ¿»ò½øÒ»²½µÄµ÷Í£´ëÊ©ÌṩÈκÎÐÅÏ¢¡£
https://techcrunch.com/2024/08/19/flightaware-warns-that-some-customers-info-has-been-exposed-including-social-security-numbers/