΢Èí10Ô·ݸüн¨¸´3¸ö±»ÀûÓ÷ì϶ÔÚÄÚµÄ104¸ö·ì϶

°ä²¼¹¦·ò 2023-10-11

1¡¢Î¢Èí10Ô·ݸüн¨¸´3¸ö±»ÀûÓ÷ì϶ÔÚÄÚµÄ104¸ö·ì϶


΢ÈíÔÚ10ÔÂ10ÈÕ°ä²¼Á˱¾ÔµÄÖܶþ²¹¶¡ £¬×ܼƽ¨¸´ÁË104¸ö°²È«·ì϶ £¬Ô̺¬Èý¸öÒѱ»ÀûÓõķì϶¡£±»ÀûÓ÷ì϶Ô̺¬Skype for BusinessÌáȨ·ì϶£¨CVE-2023-41763£©¡¢Microsoft WordPadÐÅϢй¶·ì϶£¨CVE-2023-36563£©ºÍHTTP/2¼±¾ç³ÁÖù¥»÷£¨CVE-2023-44487£©¡£¶ÔÓÚCVE-2023-44487 £¬Î¢Èí°ä²¼ÁËÕë¶ÔDDoS¹¥»÷¼¼ÊõHTTP/2 Rapid ResetµÄ»º½â´ëÊ© £¬¸Ã¼¼Êõ×Ô8Ô·ÝÒÔÀ´Ò»Ïò±»ÀûÓá£ÓÉÓÚ¸ÃÖ°ÄÜÄÚÖÃÓÚHTTP/2³ß¶ÈÖÐ £¬Òò¶ø³ýÁËÏÞ¶ÈËÙ¶È»ò×èÖ¹ºÍ̸±í £¬Ã»ÓÐÆäËü½¨¸´²½Öè¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-october-2023-patch-tuesday-fixes-3-zero-days-104-flaws/


2¡¢ºÚ¿Í¹«¿ªHelloKittyÔ´Âë²¢³ÆÔÚ¿ª·¢¸ü׳´óµÄ¼ÓÃÜÆ÷


¾ÝýÌå10ÔÂ9ÈÕ±¨Â· £¬ºÚ¿Íkapuchin0£¨±ðºÅGookee£©ÔÚXSSÂÛ̳ÉϹ«¿ªÁËÀÕË÷Èí¼þHelloKittyµÄÔ´´úÂë £¬²¢Ðû³ÆÔÚ¿ª·¢Ò»ÖÖеĸü׳´óµÄ¼ÓÃÜÆ÷¡£°ä²¼µÄhellokitty.zipѹËõ°üÔ̺¬Ò»¸öMicrosoft Visual Studio½â¾ö¹æ»® £¬¿É¹¹½¨HelloKitty¼ÓÃÜÆ÷ºÍ½âÃÜÆ÷ÒÔ¼°NTRUEncrypt¿â¡£×êÑÐÈËԱȷÈÏ £¬ÕâÊÇHelloKittyÔÚ2020Äê³õ´ÎÆô¶¯Ê±Ê¹ÓõĺϷ¨Ô´´úÂë¡£¹ÌÈ»ÀÕË÷Èí¼þÔ´´úÂëµÄ¹«¿ªÓÐÖúÓÚ°²È«×êÑÐ £¬µ«Ò²ÈÝÒ×±»¹¥»÷ÕßÀÄÓÿª·¢×Ô¼ºµÄ¶ñÒâÈí¼þ¡£


https://securityaffairs.com/152182/malware/hellokitty-ransomware-source-code-leaked.html


3¡¢Akamai¼ì²âµ½½Ù³ÖµçÉÌÍøÕ¾404Ò³ÃæÇÔÊØÐÅÓþ¿¨µÄ»î¶¯


AkamaiÔÚ10ÔÂ9ÈÕ³ÆÆä¼ì²âµ½ÐÂÒ»ÂÖµÄMagecart¹¥»÷»î¶¯¡£¸Ã»î¶¯ÖØÒªÕë¶ÔMagentoºÍWooCommerceÍøÕ¾ £¬Éæ¼°ÓëʳƷºÍÁãÊÛÐÐÒµÓйصĹ«Ë¾ £¬ÀûÓÃĬÈϵġ°404 Not Found¡±Ò³ÃæÀ´°µ²ØºÍ¼ÓÔØÒøÐп¨ÇÔÈ¡´úÂë¡£¼ÓÔØ·¨Ê½ÏòÏà¶Ôõè¾¶¡°icons¡±ÌáÒé»ñȡҪÇó £¬µ«ÓÉÓÚ¸Ãõè¾¶²»´æÔڻᵼÖÂ404ÃýÎ󡣯ð³õ £¬×êÑÐÈËÔ±ÒÔΪskimmerÒѲ»»îÔ¾ £¬»ò¹¥»÷ÕßÅäÖÃÃýÎ󡣺óÀ´·ÖÎö·¢ÏÖ £¬¼ÓÔØ·¨Ê½Ô̺¬Ò»¸öÕýÔò±í°×ʽƥÅä £¬ÔÚ404Ò³Ãæ·µ»ØµÄHTMLÖÐËÑË÷ÌØ¶¨×Ö·û´®¡£AkamaiÔÚÕÒµ½¸Ã×Ö·û´®ºó·¢ÏÖÁ˰µ²ØÔÚ×¢½âÖеÄbase64±àÂë×Ö·û´® £¬½âÂëºó·¢ÏÖÁ˰µ²ØÔÚËùÓÐ404Ò³ÃæÖеÄJavaScript skimmer¡£


https://www.akamai.com/blog/security-research/magecart-new-technique-404-pages-skimmer


4¡¢TagDiv²å¼þ·ì϶CVE-2023-3169±»ÓÃÓÚ¹¥»÷ÉÏÍò¸öWPÍøÕ¾


¾Ý10ÔÂ9ÈÕ±¨Â· £¬TagDiv Composer²å¼þ·ì϶Òѱ»ÓÃÓÚ¹¥»÷³¬¹ý17000¸öWordPressÍøÕ¾ £¬×÷ΪBalada Injector»î¶¯µÄÒ»²¿ÃÅ¡£ÕâÊÇÒ»¸öXSS·ì϶£¨CVE-2023-3169£© £¬Æä¾ßÌåÐÅÏ¢ºÍPoCÓÚ9ÔÂÖÐÑ®Åû¶ £¬²»¾ÃÖ®ºóSucuri¾ÍÆðÍ··¢ÏÖÀûÓø÷ì϶µÄ¹¥»÷¡£¹¥»÷ÕßÀûÓø÷ì϶½«¶ñÒâ´úÂë×¢ÈëWordPressÊý¾Ý¿âÖеÄÌØ¶¨µØÎ» £¬ÒÔÈ·±£´úÂë¿É´«²¼µ½Ö¸±êÍøÕ¾µÄÿ¸ö¹«¿ªÒ³Ãæ¡£Balada Injector»î¶¯×Ô2017ÄêÒÔÀ´Ò»Ïò»îÔ¾ £¬¾Ý¹À¼ÆÒÑÈëÇÖ½ü100Íò¸öWordPressÍøÕ¾¡£


https://www.securityweek.com/recently-patched-tagdiv-plugin-flaw-exploited-to-hack-thousands-of-wordpress-sites/


5¡¢D-Link DAP-X1860 WiFi 6´æÔÚ·ì϶CVE-2023-45208


ýÌå10ÔÂ9ÈÕ³Æ £¬D-Link DAP-X1860 WiFi 6ÁìÓòÀ©´óÆ÷´æÔÚ·ì϶£¨CVE-2023-45208£© £¬ÈÝÒ×µ¼ÖÂDoSºÍÔ¶³ÌºÅÁî×¢Èë¡£ÎÊÌâÔÚÓÚÉ豸µÄÍøÂçɨÃèÖ°ÄÜ £¬ÎÞ·¨½âÎöÃû³ÆÖÐÔ̺¬ÌØÊâ·ûºÅ(')µÄSSID £¬½«ÆäÎó»áΪºÅÁîÖÕÖ¹·û¡£´Ó¼¼ÊõÉϽ² £¬ËüÔ´ÓÚlibcgifunc.so¿âÖеÄparsing_xml_stasurveyº¯Êý¡£ÓÉÓڸòúÆ·²»×ãSSIDËãÕÊÖ°ÄÜ £¬¹¥»÷ÕßÄܹ»ÀûÓôËÖ°ÄÜ´ïµ½¶ñÒâÖ÷ÕÅ¡£×êÑÐÈËÔ±ÓÚ5Ô·¢ÏÖ²¢ÏòD-Link»ã±¨¸Ã·ì϶ £¬Ö»¹ÜÒÑÂŴθú½ø £¬µ«ÈÔδÊÕµ½»Ø¸´¡£


https://www.bleepingcomputer.com/news/security/d-link-wifi-range-extender-vulnerable-to-command-injection-attacks/


6¡¢Check PointÅû¶Õë¶ÔÑÇÖÞʵÌåµÄ»î¶¯Stayin' Alive


10ÔÂ9ÈÕ £¬Check PointÅû¶ÔÚÑÇÖÞ½øÐеļäµý»î¶¯Stayin' Alive £¬ÖØÒªÕë¶ÔµçÐÅÐÐÒµµÄÆóÒµºÍµ±¾Ö»ú¹¹¡£¸Ã»î¶¯ÖÁÉÙ×Ô2021ÄêÒÔÀ´Ò»Ïò»îÔ¾ £¬ÀûÓô¹µöÓʼþºÍDLL²à¼ÓÔØ¼¼Êõ·Ö·¢¶ñÒâÈí¼þ¡£ÖµÍ×ÌùÐĵÄÊÇ £¬Ëüͨ¹ý½Ù³Ödal_keepalives.dllÀûÓÃÁËAudinate¡¯s Dante DiscoveryÈí¼þÖеķì϶(CVE-2022-23748)¡£¸Ã»î¶¯µÄ×Ô½ç˵¹¤¾ßÓëÒÑÖª¹¤¾ß¼¯Ã»ÓÐÏÔÖøµÄ³Áµþ £¬µ«ËüÃǶ¼ÓëToddyCatÓйصĻù´¡ÉèÊ©ÓйØÁª £¬Òò¶ø´§Ä¦¸Ã»î¶¯ÓëToddyCatÓйØ¡£


https://blog.checkpoint.com/security/unveiling-stayin-alive-a-closer-look-at-an-ongoing-campaign-in-asia-targeting-telecom-and-governmental-entities/