ÐÅÏ¢Çå¾²Öܱ¨-2021ÄêµÚ14ÖÜ
Ðû²¼Ê±¼ä 2021-04-06> ±¾ÖÜÇ徲̬ÊÆ×ÛÊö
2021Äê03ÔÂ29ÈÕÖÁ04ÔÂ04ÈÕ¹²ÊÕ¼Çå¾²Îó²î56¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇMicrosoft Azure SphereδÊðÃû´úÂëÖ´ÐÐÎó²î£»SAP Solution Manager User-Experience MonitoringÊÚȨ¼ì²éȱʧÎó²î£»Adobe Creative Cloud Desktop Applicationí§ÒâÎļþдÈëÎó²î£»F5 BIG-IP Advanced WAF/ASM»º³åÇøÒç³öÎó²î£»Schneider Electric Interactive Graphical SCADA System CGFÎļþÆÊÎöÄÚ´æÆÆËð´úÂëÖ´ÐÐÎó²î¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇNPM¿âNetmask×é¼þ±£´æÎó²î£¬¿ÉÓ°ÏìÊýÍò¸öÓ¦ÓóÌÐò£»Ó¢¹ú¹«Ë¾FatFaceѬȾConti£¬Áè¼Ý200GBÊý¾Ýй¶£»PHP¹Ù·½Git´æ´¢¿âÔâµ½¹©Ó¦Á´¹¥»÷£¬´úÂë¿âÒѱ»¸Ä¶¯£»Õë¶ÔÓ¡¶ÈµÄAPT×éÖ¯RedEchoÒѹرÕÆäʹÓõĻù´¡ÉèÊ©£»VMwareÐÞ¸´vRealize OperationsÖеÄSSRFµÈ¶à¸öÎó²î¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬±¾ÖÜÇå¾²ÍþвΪÖС£
> Ö÷ÒªÇå¾²Îó²îÁбí
1.Microsoft Azure SphereδÊðÃû´úÂëÖ´ÐÐÎó²î
Microsoft Azure Sphere±£´æÇå¾²Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿Éʹ·þÎñ³ÌÐò±ÀÀ£»òÕßÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-27080
2.SAP Solution Manager User-Experience MonitoringÊÚȨ¼ì²éȱʧÎó²î
SAP Solution Manager User-Experience Monitoring±£´æÊÚȨ¼ì²éȷʵÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉδÊÚȨ¿ØÖÆϵͳ¡£
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107
3.Adobe Creative Cloud Desktop Applicationí§ÒâÎļþдÈëÎó²î
Adobe Creative Cloud Desktop Application±£´æí§ÒâÎļþдÈëÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§ÒâÏÂÁî¡£
https://helpx.adobe.com/security/products/creative-cloud/apsb21-18.html
4.F5 BIG-IP Advanced WAF/ASM»º³åÇøÒç³öÎó²î
F5 BIG-IP Advanced WAF/ASM´¦Öóͷ£¶ñÒâHTTPÏìÓ¦±£´æ»º³åÇøÒç³öÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉʹӦÓóÌÐò±ÀÀ£»òÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£
https://www.auscert.org.au/bulletins/ESB-2021.0872
5.Schneider Electric Interactive Graphical SCADA System CGFÎļþÆÊÎöÄÚ´æÆÆËð´úÂëÖ´ÐÐÎó²î
Schneider Electric Interactive Graphical SCADA System CGFÎļþÆÊÎö±£´æÄÚ´æÆÆËðÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇó£¬ÓÕʹÓû§ÆÊÎö£¬¿ÉʹӦÓóÌÐò±ÀÀ£»òÕßÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£
https://us-cert.cisa.gov/ics/advisories/icsa-21-070-01
> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢NPM¿âNetmask×é¼þ±£´æÎó²î£¬¿ÉÓ°ÏìÊýÍò¸öÓ¦ÓóÌÐò
¸Ã×é¼þÿÖÜÏÂÔØÁ¿Áè¼Ý300Íò´Î£¬×èÖ¹ÏÖÔÚÀÛ¼ÆÏÂÔØÁ¿ÒÑÁè¼Ý2.38ÒڴΣ¬Ô¼ÓÐ27.8Íò¸öGitHub´æ´¢¿âÒÀÀµÓÚnetmask¡£¸ÃÎó²î±»×·×ÙΪCVE-2021-28918£¬Ê®½øÖÆIPv4µØµã°üÀ¨Ç°µ¼Áãʱ£¬ÍøÂçÑÚÂë´¦Öóͷ£»ì¼°ÃûÌÃIPµØµãµÄ·½·¨¡£¹¥»÷Õß¿ÉÒÔͨ¹ýÓ°ÏìÓ¦ÓóÌÐòÆÊÎöµÄIPµØµã£¬Ôò¸ÃÎó²î¿ÉÄÜ»áÒýÆðÖÖÖÖÎó²î£¬ÀýÈçµ¼Ö·þÎñÆ÷¶ËÇëÇóαÔ죨SSRF£©ºÍµ½Ô¶³ÌÎļþ°üÀ¨£¨RFI£©¡£ÏÖÔÚ£¬¸ÃÎó²îÒѱ»ÐÞ¸´¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/critical-netmask-networking-bug-impacts-thousands-of-applications/
2¡¢Ó¢¹ú¹«Ë¾FatFaceѬȾConti£¬Áè¼Ý200GBÊý¾Ýй¶
Ó¢¹ú´ò°ç¹«Ë¾FatFaceÔâµ½ContiÀÕË÷Èí¼þ¹¥»÷£¬Áè¼Ý200GBÊý¾Ýй¶¡£¹¥»÷±¬·¢ÔÚ2021Äê1ÔÂ17ÈÕ£¬¹¥»÷Õß»á¼ûÁËFatFaceµÄÍøÂçºÍϵͳ£¬²¢ÀÕË÷850ÍòÃÀÔª£¬×îÖվ̸ÅÐÊê½ðÈ·¶¨Îª200ÍòÃÀÔª¡£´Ë´Îй¶µÄ¿Í»§ÐÅÏ¢°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢ÓʼĵصãºÍ²¿·ÖÐÅÓÿ¨ÐÅÏ¢£¨×îºóËÄλÊý×ÖºÍÓÐÓÃÆÚ£©¡£±ðµÄ£¬¸Ã¹«Ë¾ÔÚÊý¾Ýй¶֪ͨÓʼþÖÐÒªÇóÆäÊÕ¼þÈËÎñ±Ø¶Ô´ËÓʼþ¼°ÆäÖаüÀ¨µÄÐÅÏ¢ÑÏ¿á±£ÃÜ£¬ÒÔ´ËÊÔͼÑÚÊÎÊý¾Ý鶵ÄÊÂʵ£¬´ËÊÂÎñÔÚÍøÉÏÒýÆðÐùÈ»´ó²¨¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/fatface-sends-controversial-data-breach-email-after-ransomware-attack/
3¡¢PHP¹Ù·½Git´æ´¢¿âÔâµ½¹©Ó¦Á´¹¥»÷£¬´úÂë¿âÒѱ»¸Ä¶¯
ÉÏÖÜÈÕ£¬Î¬»¤Ö°Ô±Rasmus Lerdorf·¢Ã÷ºÚ¿Í¹¥»÷ÁË·þÎñÆ÷git.php.net£¬²¢Ôڸ÷þÎñÆ÷µÄ×ÔÍйÜphp-src´æ´¢¿âÖÐÉÏ´«ÁË2¸öδ¾ÊÚȨµÄ¸üаü£¬ÆäÖеÄÔ´´úÂë±»²åÈëÁËÉñÃغóÃÅ´úÂë¡£±ðµÄ£¬ÕâЩ¶ñÒâ´úÂëÊÇÒÔPHP½¨ÉèÕßRasmus LerdorfµÄÃûÒåÌá½»µÄ¡£Ñо¿Ö°Ô±ÍƲâ´Ë´ÎÊÇÃûΪÒÀÀµ»ìÏý£¨dependency confusion£©µÄÐÂÐ͹©Ó¦Á´¹¥»÷·½·¨£¬ËüʹÓÃÁËÒ»¸ö¿ÉÄÜ°üÀ¨À´×Ô˽Óк͹«¹²ÈªÔ´µÄ»ìÏýÒÀÀµ¿âµÄÈí¼þ¡£×÷ΪԤ·À²½·¥£¬PHPά»¤Ö°Ô±ÒѾöÒ齫¹Ù·½PHPÔ´´úÂë´æ´¢¿âǨáãµ½GitHub¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/phps-git-server-hacked-to-add-backdoors-to-php-source-code/
4¡¢Õë¶ÔÓ¡¶ÈµÄAPT×éÖ¯RedEchoÒѹرÕÆäʹÓõĻù´¡ÉèÊ©
APT×éÖ¯RedEchoÔÚ2ÔÂβ±»Ñо¿Ö°Ô±Åû¶ºó£¬ÒѹرÕÆäʹÓõĻù´¡ÉèÊ©¡£Recorded FutureµÄÇå¾²Ö°Ô±ÓÚ2Ô·¢Ã÷Á˸ÃAPT×éÖ¯£¬³Æ¸ÃÍÅ»ï×Ô2020ÄêÍ·¹¥»÷ÁËÓ¡¶ÈµÄÖÁÉÙ10¸öµçÁ¦²¿·Ö£¬»¹½«Ä¿µÄÃé×¼Á˸ßѹÊäµç±äµçÕ¾ºÍȼú»ðÁ¦·¢µç³§¡£Ôڸ÷¢Ã÷Ðû²¼¼¸Öܺó£¬RedEchoÒѾ¹Ø±ÕÁ˲¿·ÖÓÃÓÚ¿ØÖÆ×°ÖÃÔÚÄ¿µÄÍøÂçÖеÄShadowPadºóÃŵĻù´¡ÉèÊ©¡£Ñо¿Ö°Ô±ÍƲ⣬¸ÃAPT×éÖ¯ÔÚ±»·¢Ã÷ºó¿ÉÄܽ«ÆäC2תÒƵ½ÁËÆäËûµØ·½¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/116094/apt/redecho-apt-c2-shutdown.html
5¡¢VMwareÐÞ¸´vRealize OperationsÖеÄSSRFµÈ¶à¸öÎó²î
VMwareÐû²¼Çå¾²¸üУ¬ÒÔÐÞ¸´VMware vRealize OperationsÖеĶà¸öÎó²î¡£´Ë´ÎÐÞ¸´µÄ×îΪÑÏÖصÄÎó²îÊÇvRealize Operations Manager APIÖеķþÎñÆ÷¶ËÇëÇóαÔìÎó²î£¨CVE-2021-21975£©£¬CVSSv3ÆÀ·ÖΪ8.6£¬Ô¶³Ìδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÎÞÐèÓëÓû§½»»¥¼´¿ÉʹÓôËÎó²îÀ´ÇÔÈ¡ÖÎÀíƾ֤¡£±ðµÄ£¬»¹ÐÞ¸´ÁËí§ÒâÎļþдÈëÎó²î£¨CVE-2021-21983£©£¬CVSSv3ÆÀ·ÖΪ7.2£¬¹¥»÷Õß¿ÉʹÓÃÆäÔڵײã¹â×Ó²Ù×÷ϵͳµÄí§ÒâλÖÃдÈëÎļþ¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/116145/security/vmware-vrealize-operations-ssrf-flaw.html