ÐÅÏ¢Çå¾²Öܱ¨-2018ÄêµÚ36ÖÜ
Ðû²¼Ê±¼ä 2018-09-10±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
2018Äê09ÔÂ03ÈÕÖÁ09ÈÕ¹²ÊÕ¼Çå¾²Îó²î57¸ö£¬£¬£¬£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇCisco Cloud Services Platform 2100 ÏÂÁî×¢ÈëÎó²î£»£»£»Opto22 PAC Control»º³åÇøÒç³öÎó²î£»£»£»ThinkPHP SQL×¢ÈëÎó²î£»£»£»Tenda AC9ºÍAC10 OSÏÂÁî×¢ÈëÎó²î£»£»£»Foxit Reader PDFÎļþ´¦Öóͷ£ÀàÐÍ»ìÏýÎó²î¡£¡£¡£¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÑо¿Ö°Ô±·¢Ã÷Fiservƽ̨±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂÊý°Ù¼ÒÒøÐеÄÓû§ÐÅϢй¶£»£»£»Ñо¿Ö°Ô±·¢Ã÷Ô¼57ÍòMortal OnlineÓÎÏ·Íæ¼ÒµÄƾ֤ÔÚÂÛ̳³öÊÛ£»£»£»Ñо¿ÍŶӷ¢Ã÷ʹÓÃ.tkÓòÃûµÄ´ó¹æÄ£¹ã¸æÕ©Æ»î¶¯£»£»£»½©Ê¬ÍøÂçNecursÔÚ5ÔÂÖÁ7ÔÂʱ´ú·¢³öÁË78Íò·âÀ¬»øÓʼþ£»£»£»¿¨°Í˹»ùÐû²¼2018ÄêÉϰëÄ깤ҵ×Ô¶¯»¯ÏµÍ³µÄÍþв¾°¹Û±¨¸æ¡£¡£¡£¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£
Ö÷ÒªÇå¾²Îó²îÁбí
1. Cisco Cloud Services Platform 2100 ÏÂÁî×¢ÈëÎó²î
Cisco Cloud Services Platform 2100 WEB½Ó¿Ú±£´æÊäÈëÑéÖ¤Îó²î£¬£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬£¬ÒÔWEBÉÏÏÂ
ÎÄÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-csp2100-injection
2. Opto22 PAC Control»º³åÇøÒç³öÎó²î
Opto22 PAC Control±£´æ»ùÓÚÕ»µÄ»º³åÇøÒç³öÎó²î£¬£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬£¬¾ÙÐоܾøÐ§À͹¥»÷»òÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£
https://ics-cert.us-cert.gov/advisories/ICSA-18-247-01
3. ThinkPHP SQL×¢ÈëÎó²î
ThinkPHP public/index/index/test/indexÅÌÎÊ×Ö·û´®Öб£´æSQL×¢ÈëÎó²î£¬£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄSQLÇëÇ󣬣¬£¬£¬£¬£¬£¬£¬²Ù×÷Êý¾Ý¿â£¬£¬£¬£¬£¬£¬£¬£¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£
https://github.com/top-think/framework/issues/1375
4. Tenda AC9ºÍAC10 OSÏÂÁî×¢ÈëÎó²î
Tenda AC9ºÍAC10´¦Öóͷ£POSTÇëÇóÖеÄ'mcc'²ÎÊý±£´æÊäÈëÑéÖ¤Îó²î£¬£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬£¬Ö´ÐÐí§ÒâOSÏÂÁî¡£¡£¡£¡£
https://github.com/zsjevilhex/iot/blob/master/route/tenda/tenda-04/tenda.md
5. Foxit Reader PDFÎļþ´¦Öóͷ£ÀàÐÍ»ìÏýÎó²î
Foxit Reader´¦Öóͷ£PDFÎļþ±£´æÀàÐÍ»ìÏýÎó²î£¬£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇ󣬣¬£¬£¬£¬£¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬£¬£¬£¬£¬£¬¿ÉÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£
https://www.foxitsoftware.com/support/security-bulletins.php
Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢Ñо¿Ö°Ô±·¢Ã÷Fiservƽ̨±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂÊý°Ù¼ÒÒøÐеÄÓû§ÐÅϢй¶
Çå¾²Ñо¿Ö°Ô±Kristian Erik Hermansen·¢Ã÷½ðÈÚ»ú¹¹ÊÖÒÕЧÀÍÌṩÉÌFiservµÄÍøÂçÆ½Ì¨±£´æÎó²î£¬£¬£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂÊý°Ù¼ÒÒøÐеÄÊý¾Ýй¶¡£¡£¡£¡£FiservûÓÐÃ÷ȷ˵Ã÷Óм¸¶à½ðÈÚ»ú¹¹¿ÉÄÜÊܵ½Ó°Ï죬£¬£¬£¬£¬£¬£¬£¬µ«¾Ý±¨µÀÏÖÔÚÓÐ1700¼ÒÒøÐÐÕýÔÚʹÓÃFiservƽ̨¡£¡£¡£¡£Fiserv½²»°È˳Ƹù«Ë¾ÔÚÊÕµ½±¨¸æºó24СʱÄÚ¿ª·¢ÁËÐÞ¸´²¹¶¡²¢¾ÙÐÐÁ˰²ÅÅ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/hundreds-of-banks-exposed-from/
2¡¢Ñо¿Ö°Ô±·¢Ã÷Ô¼57ÍòMortal OnlineÓÎÏ·Íæ¼ÒµÄƾ֤ÔÚÂÛ̳³öÊÛ
Çå¾²Ñо¿Ö°Ô±Adam Davies·¢Ã÷ÊôÓÚÔ¼57ÍòMortal OnlineÓÎÏ·Íæ¼ÒµÄÕË»§ÐÅÏ¢ÔÚÂÛ̳ÉϳöÊÛ¡£¡£¡£¡£2018Äê6ÔÂ17ÈÕδ¾ÊÚȨµÄµÚÈý·½»á¼ûÁ˸ÃÓÎÏ·µÄÂÛ̳ºÍÊÐËÁÊý¾Ý¿âµÄЧÀÍÆ÷²¢ÇÔÈ¡ÁËÓû§µÄÊý¾Ý¡£¡£¡£¡£¹¥»÷Õß»¹»ñÈ¡ÁËÓû§ÃÜÂëµÄMD5¹þÏ£Öµ£¬£¬£¬£¬£¬£¬£¬£¬ÕâЩ¹þÏ£ÖµËÆºõÒѱ»ÆÆ½â¡£¡£¡£¡£¸ÃÊý¾Ý¿âÏÖÔÚÒѱ»Ìí¼Óµ½Have I Been PwnedÍøÕ¾ÖС£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/cracked-logins-of-570-000-mortal-online-players-sold-on-forums/
3¡¢Ñо¿ÍŶӷ¢Ã÷ʹÓÃ.tkÓòÃûµÄ´ó¹æÄ£¹ã¸æÕ©Æ»î¶¯
ZscalerµÄÑо¿Ö°Ô±·¢Ã÷ʹÓÃ.tkÓòÃûµÄ´ó¹æÄ£¹ã¸æÕ©Æ»î¶¯¡£¡£¡£¡£×Ô2018Äê5ÔÂÒÔÀ´£¬£¬£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâ»î¶¯Ò»Ö±´¦ÓÚ»îԾ״̬¡£¡£¡£¡£¹¥»÷Õß½«Óû§Öض¨ÏòÖÁÐéαµÄ²©¿ÍÍøÕ¾£¬£¬£¬£¬£¬£¬£¬£¬ÕâÐ©ÍøÕ¾ÉÏµÄ¹ã¸æÊÕÈëÿÔ´ï2ÍòÃÀÔªÒÔÉÏ¡£¡£¡£¡£²¿·Ö.tkÓòÃû»¹±»ÓÃÓÚÊÖÒÕÖ§³ÖÕ©Æ¡£¡£¡£¡£.tkÓòÃûÊÇÒ»¸ö¹ú¼Ò/µØÇø¼¶µÄ¶¥¼¶ÓòÃû£¬£¬£¬£¬£¬£¬£¬£¬Ëü´ú±íÁËÁ¥ÊôÓÚÐÂÎ÷À¼µÄµº¹úTokelau¡£¡£¡£¡£¸ÃÓòÃûÊÇÃâ·ÑµÄ£¬£¬£¬£¬£¬£¬£¬£¬ÕâÒýÆðÁ˹¥»÷ÕßµÄÐËȤ¡£¡£¡£¡£Ñо¿Ö°Ô±×ܹ²·¢Ã÷ÁËÓë¸Ã¶ñÒâ»î¶¯ÓйصÄ3804¸ö.tkÓòÃû¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zscaler.com/blogs/research/spam-campaigns-leveraging-tk-domains
4¡¢½©Ê¬ÍøÂçNecursÔÚ5ÔÂÖÁ7ÔÂʱ´ú·¢³öÁË78Íò·âÀ¬»øÓʼþ
IBM X-ForceÑо¿ÍŶӷ¢Ã÷½©Ê¬ÍøÂçNecursÔÚ5ÔÂÖÁ7ÔÂʱ´ú¹²·¢³öÁËÁè¼Ý78Íò·âÀ¬»øÓʼþ¡£¡£¡£¡£ÕâЩÀ¬»øÓʼþ¶¼°üÀ¨¶ñÒâµÄIQYÎļþ£¬£¬£¬£¬£¬£¬£¬£¬ÓÃÓÚ·Ö·¢¶ñÒâÈí¼þFlawedAmmyy RAT¡¢MarapºÍQuant Loader¡£¡£¡£¡£Ñо¿Ö°Ô±¹²ÊӲ쵽5¸ö¹¥»÷À˳±£¬£¬£¬£¬£¬£¬£¬£¬5ÔÂ25ÈÕNecurs·¢ËÍÁËÁè¼Ý30Íò·âÀ¬»øÓʼþ£¬£¬£¬£¬£¬£¬£¬£¬6ÔÂ7ÈÕÓÖ·¢ËÍÁËÔ¼20Íò·â¡£¡£¡£¡£ËæºóµÄ6ÔÂ13ÈÕ·¢ËÍÁËÁè¼Ý15Íò·â£¬£¬£¬£¬£¬£¬£¬£¬7ÔÂ13ÈÕ²»µ½10Íò·âÒÔ¼°7ÔÂ17ÈÕµÄÉÙÓÚ5Íò·â¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/necurs-spews-780-000-emails-with-weaponized-iqy-files/
5¡¢¿¨°Í˹»ùÐû²¼2018ÄêÉϰëÄ깤ҵ×Ô¶¯»¯ÏµÍ³µÄÍþв¾°¹Û±¨¸æ
¿¨°Í˹»ùʵÑéÊÒICS CERTÐû²¼¹ØÓÚ2018ÄêÉϰëÄ깤ҵ×Ô¶¯»¯ÏµÍ³µÄÍþв¾°¹ÛµÄÆÊÎö±¨¸æ¡£¡£¡£¡£Óë2017ÄêϰëÄêÏà±È£¬£¬£¬£¬£¬£¬£¬£¬2018ÄêÉϰëÄêÔâµ½¹¥»÷µÄICSÅÌËã»úµÄ±ÈÀýÔöÌíÁË3.5¸ö°Ù·Öµã£¬£¬£¬£¬£¬£¬£¬£¬µÖ´ïÁË41.2%¡£¡£¡£¡£Í¬±ÈÔòÊÇÔöÌíÁË4.6¸ö°Ù·Öµã¡£¡£¡£¡£·ÇÖÞ¡¢ÑÇÖÞºÍÀ¶¡ÃÀÖÞµÄICSÅÌËã»úÔâµ½¹¥»÷µÄ±ÈÀýÔ¶µÍÓÚÅ·ÖÞ¡¢±±ÃÀºÍ°Ä´óÀûÑÇ¡£¡£¡£¡£¶«Å·µÄÊý×ÖÒ²Ô¶´óÓÚÎ÷Å·µÄÊý×Ö¡£¡£¡£¡£ÄÏÅ·Ôâµ½¹¥»÷µÄICSÅÌËã»úµÄ±ÈÀýÒª¸ßÓÚ±±Å·ºÍÎ÷Å·¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securelist.com/threat-landscape-for-industrial-automation-systems-in-h1-2018/87913/


¾©¹«Íø°²±¸11010802024551ºÅ