ÃÀ¹úGilletteÒ½ÔºÔâÀÕË÷Èí¼þ¹¥»÷£»£»£»£»£»£»£»£»Magecart¶ñÒâÓòÃûÉúÃüÖÜÆÚµÄÆÊÎö±¨¸æ
Ðû²¼Ê±¼ä 2019-09-231.TescoÍ£³µÓ¦Óñ£´æÎó²îµ¼ÖÂÊýÍòÍò³µÅÆÍ¼Ïñй¶
ÔÚÍâýThe Register±¨µÀÊýÍòÍòÕÅANPR£¨³µÅÆ×Ô¶¯Ê¶±ð£©Í¼ÏñÔÚMicrosoft AzureÖÐ̻¶֮ºó£¬£¬£¬£¬£¬£¬TescoÒÑ¹Ø±ÕÆäÍ£³µÑéÖ¤WebÓ¦Óᣡ£¡£ÕâЩͼÏñÓÉÓ¢¹ú¸÷µØµÄ19¸öTescoÍ£³µ³¡ºÏÅÄÉãµÄ½øÈëºÍÍÑÀëµÄÆû³µÕÕÆ¬×é³É£¬£¬£¬£¬£¬£¬ÕÕÆ¬ÖÐÍ»³öÏÔʾÁËÆû³µµÄ³µÅÆ£¬£¬£¬£¬£¬£¬ËäÈ»ÓÉÓÚÇø·ÖÂʽϵͶø¿´²»µ½¼ÝʻԱ¡£¡£¡£ANPRͼÏñÒÔ´øÓÐʱ¼ä´ÁµÄjpegÃûÌÃÉúÑÄÔÚAzure blobÖУ¬£¬£¬£¬£¬£¬²¢ÇÒͼÏñÎļþÃûÒ²°üÀ¨Ê±¼äÐÅÏ¢£¬£¬£¬£¬£¬£¬´Ó¶øÊ¹µÃÈκÎ×¼È·ÍÆ¶Ï³öËùÐèHTTP POSTÇëÇóÃûÌõÄÈË¿ÉÒÔÅúÁ¿»ñÈ¡ÕâЩͼÏñÒÔ¹©²»·¨Ê¹Óᣡ£¡£
ÔÎÄÁ´½Ó£º
https://www.theregister.co.uk/2019/09/20/tesco_parking_app_10s_millions_anpr_photos_exposed/
2.ÐÂÎ÷À¼³èÎïÁãÊÛÉÌAnimatesÔâºÚ¿ÍÇÔÈ¡2700Ãû¿Í»§ÐÅÏ¢
ÐÂÎ÷À¼³èÎïÁãÊÛÉÌAnimatesÔâÓöÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬µ¼ÖÂ2700λ¿Í»§µÄСÎÒ˽¼ÒºÍ²ÆÎñÐÅϢй¶¡£¡£¡£¸ÃÊÂÎñ±¬·¢ÔÚ2019Äê6ÔÂ29ÈÕÖÁ9ÔÂ13ÈÕÖ®¼ä£¬£¬£¬£¬£¬£¬ÊÂÎñÔµ¹ÊÔÓÉÊÇδ¾ÊÚȨµÄµÚÈý·½»á¼û¡£¡£¡£AnimatesÌåÏÖ¿Í»§µÄÐÅÓÿ¨/½è¼Ç¿¨Êý¾ÝÊǹ¥»÷ÕßµÄÄ¿µÄ£¬£¬£¬£¬£¬£¬Í¬Ê±¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢Ò²Ôâй¶£¬£¬£¬£¬£¬£¬°üÀ¨µØµã¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµã¡¢Óû§ÃûºÍÃÜÂë¡£¡£¡£¹ØÓÚʹÓÃLayby»òPayPalÔÚÏß¹ºÎïµÄ¿Í»§£¬£¬£¬£¬£¬£¬Æä¸¶¿îÐÅÏ¢²»ÊÜÓ°Ïì¡£¡£¡£Animates»¹È·ÈϳÆÊµÌåµêµÄÉúÒâδÊÜÓ°Ïì¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.animates.co.nz/data-breach/
3.ÃÀ¹úGilletteÒ½ÔºÔâÀÕË÷Èí¼þ¹¥»÷µ¼ÖÂЧÀÍÖÐÖ¹
ƾ֤ÃÀ¹úÎÀÉú²¿·¢³öµÄ¾¯±¨£¬£¬£¬£¬£¬£¬GilletteÒ½ÔºÔÚÉÏÖÜÎåÔâµ½ÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¸Ã¹¥»÷Ô¼±¬·¢ÔÚÖÜÎ寯Ïþ3µã£¬£¬£¬£¬£¬£¬µ¼ÖÂÒ½ÔºÔâÓöÁËÑÏÖØµÄÅÌËã»úÎÊÌâÒÔ¼°Ð§ÀÍÖÐÖ¹¡£¡£¡£ÔÚÖÜÎåϰàʱ¼ä£¬£¬£¬£¬£¬£¬¸ÃÒ½ÔºµÄµç»°ÏµÍ³ÒÑÖØÐÂÉÏÏߣ¬£¬£¬£¬£¬£¬µ«ÈÔ²»¿É½ÓÄÉÈκÎл¼Õߣ¬£¬£¬£¬£¬£¬²¢ÇÒ×ÅʵÑéÊÒ¡¢ºôÎüÖÎÁƼ°·ÅÉä¿ÆÒ²²»¿ÉÌṩ¼ì²éºÍÖÎÁÆÐ§ÀÍ¡£¡£¡£¸ÃÒ½ÔºÕý½«ÃÅÕïЧÀÍ»ò¼±ÕïЧÀ͵ϼÕß·ÖÁ÷ÖÁÆäËüÒ½Ôº¡£¡£¡£ÎÀÉú²¿ÖÒÑÔÆäËüÒ½Ôº¼ì²âÆäITЧÀÍ£¬£¬£¬£¬£¬£¬²¢ÔÚ·¢Ã÷ÈκοÉÒÉÄÚÈÝʱÌáÐÑÕþ¸®¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.databreaches.net/wy-gillette-hospital-targeted-in-ransomware-attack/
4.AtlassianÐÞ¸´Jira ServerºÍService DeskÖеÄÁ½¸öÎó²î
AtlassianÐû²¼Jira ServerºÍService DeskµÄÇå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´Á½¸öÇå¾²Îó²î¡£¡£¡£µÚÒ»¸öÎó²îÊÇURL·¾¶±éÀúÎó²î£¨CVE-2019-14994£©£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓôËÎó²îÉó²éÄ¿µÄʵÀýÖеÄËùÓÐJiraÏîÄ¿£¬£¬£¬£¬£¬£¬°üÀ¨Service DeskÏîÄ¿¡¢Jira CoreÏîÄ¿ºÍJira SoftwareÏîÄ¿¡£¡£¡£TenableÑо¿Ö°Ô±Satnam Narang±¨¸æ³Æ2.5Íò¶à¸öÒ×Êܹ¥»÷µÄʵÀýÔÚÍøÉÏ̻¶£¬£¬£¬£¬£¬£¬ËüÃÇÊôÓÚÒ½ÁÆ¡¢Õþ¸®¡¢½ÌÓýºÍÖÆÔìÐÐÒµµÈ¡£¡£¡£µÚ¶þ¸öÎó²îÊÇJira Importers²å¼þÖеÄÄ£°å×¢ÈëÎó²î£¨CVE-2019-15001£©£¬£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÁËJira ServerºÍJira Data CenterµÄ7.0.10°æ±¾£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓøÃÎó²îÔ¶³ÌÖ´ÐдúÂë¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/jira-server-and-service-desk-fix-critical-security-bugs/
5.VMwareÐÞ¸´ESXi¡¢WorkstationµÈ²úÆ·ÖеÄÁ½¸öÎó²î
VMwareÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´¶à¸ö²úÆ·ÖеÄÁ½¸öÎó²î¡£¡£¡£µÚÒ»¸öÎó²îÊÇESXi¡¢Workstation¡¢Fusion¡¢VMRCºÍHorizon ClientÖеÄuse-after-freeÎó²î£¬£¬£¬£¬£¬£¬¸ÃÎó²î£¨CVE-2019-5527£©µÄCVSS v3ÆÀ·ÖΪ8.5·Ö£¬£¬£¬£¬£¬£¬ÊÇÒ»¸öÐéÄâ»úÌÓÒÝÎó²î£¬£¬£¬£¬£¬£¬¿Í»§»úÉϾßÓзÇÖÎÀíԱȨÏÞµÄÍâµØ¹¥»÷Õß¿ÉʹÓøÃÎó²îÔÚËÞÖ÷»úÉÏÖ´ÐдúÂë¡£¡£¡£µÚ¶þ¸öÎó²îÊÇWorkstationºÍFusionÖеÄDoSÎó²î£¨CVE-2019-5535£©£¬£¬£¬£¬£¬£¬¸ÃÎó²îµÄCVSS v3ÆÀ·ÖΪ4.7·Ö¡£¡£¡£¸ÃÎó²îÓëVMNATµÄIPv6ģʽÓйأ¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔͨ¹ý·¢ËͶñÒâIPv6Êý¾Ý°üÀ´Õ¥È¡NATģʽÏ¿ͻ§»úÉϵÄÍøÂç»á¼û¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.vmware.com/security/advisories/VMSA-2019-0014.html
6.Ñо¿ÍŶÓÐû²¼Magecart¶ñÒâÓòÃûÉúÃüÖÜÆÚµÄÆÊÎö±¨¸æ
ƾ֤RiskIQµÄÒ»·ÝÐÂÑо¿£¬£¬£¬£¬£¬£¬·¸·¨·Ö×ÓÕýÔÚ¶þ´ÎʹÓÃMagecart¶ñÒâÓòÃû¾ÙÐÐÆäËü¶ñÒâ»î¶¯¡£¡£¡£ÔÚMagecartÁ÷Á¿±»sinkhole»òÆäËü·½·¨×èÖ¹»î¶¯ºó£¬£¬£¬£¬£¬£¬·¸·¨·Ö×ӻṺÖÃÕâЩÓòÃû£¬£¬£¬£¬£¬£¬´Ó¶øÊ¹Óñ»MagecartÉøÍ¸µÄÍøÕ¾·Ö·¢¶ñÒâ¹ã¸æ»ò¾ÙÐÐÆäËü¶ñÒâ»î¶¯¡£¡£¡£ÕâÊÇÓÉÓÚÍøÕ¾ËùÓÐÕßÍùÍùûÓйØ×¢ÆäÍøÕ¾ÉÏÔËÐеÄJavaScript¾ç±¾£¬£¬£¬£¬£¬£¬Êý¾ÝÏÔʾMagecartƲÔüÆ÷ÔÚÍøÕ¾ÉÏµÄÆ½¾ùÍ£Áôʱ¼äÁè¼ÝÁ½¸öÔ£¬£¬£¬£¬£¬£¬²¢ÇÒÓÐÐí¶àÏÕЩÊÇÎÞÏÞÆÚµØÍ£ÁôÔÚÄÇÀï¡£¡£¡£ÕâÖÖ²»¿É¼ûÐÔÒâζ×ÅÒ»µ©¶ñÒâÓòÃû±»Ôٴμ¤»î£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔ¾ÙÐÐÆäËü¶ñÒâ»î¶¯À´Í¶Æõ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.riskiq.com/blog/labs/magecart-reused-domains/


¾©¹«Íø°²±¸11010802024551ºÅ