Evernote Chrome²å¼þXSSÎó²î£¬£¬£¬£¬£¬²¨¼°Ô¼460ÍòÓû§£»£»£»£»£»£»£»WAGO¹¤Òµ½»Á÷»úÓ²±àÂëºóÃÅÕË»§£»£»£»£»£»£»£»ºÚ¿ÍÍÅ»ïOutlaw»Ø¹é
Ðû²¼Ê±¼ä 2019-06-14
1¡¢Evernote Chrome²å¼þXSSÎó²î£¬£¬£¬£¬£¬²¨¼°Ô¼460ÍòÓû§

Çå¾²³§ÉÌGuardio·¢Ã÷EvernoteµÄChrome²å¼þ£¨Evernote Web Clipper£©Öб£´æÒ»¸öÑÏÖØµÄXSSÎó²î£¬£¬£¬£¬£¬¿ÉÔÊÐí¹¥»÷Õß»á¼ûÓû§ÔÚµÚÈý·½Ð§ÀÍÖеÄÃô¸ÐÐÅÏ¢¡£¡£¡£¡£ÓÉÓÚEvernote¹ãÊܽӴý£¬£¬£¬£¬£¬¸ÃÎó²î¿ÉÄܲ¨¼°Ô¼460ÍòÓû§¡£¡£¡£¡£¸ÃÎó²î£¨CVE-2019-12592£©ÊôÓÚ²å¼þÖеıàÂëÂß¼¹ýʧ£¬£¬£¬£¬£¬¿ÉÈÆ¹ýä¯ÀÀÆ÷µÄͬԴսÂÔ£¬£¬£¬£¬£¬Ê¹µÃ¹¥»÷Õß»á¼ûµÚÈý·½Ð§À͵ÄÃô¸ÐÓû§ÐÅÏ¢£¬£¬£¬£¬£¬°üÀ¨Éí·ÝÑéÖ¤ÐÅÏ¢¡¢²ÆÎñÐÅÏ¢¡¢É罻ýÌå̸ÌìÐÅÏ¢¡¢µç×ÓÓʼþÐÅÏ¢µÈ¡£¡£¡£¡£½¨ÒéÓû§¸üÐÂÖÁ7.11.1¼°¸ü¸ß°æ±¾¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/critical-flaw-in-evernote-add-on-exposed-sensitive-data-of-millions/
2¡¢Ë¼¿ÆÐû²¼IOS XEÈí¼þ¸üУ¬£¬£¬£¬£¬ÐÞ¸´Web UIÖеÄCSRFÎó²î

Cisco IOS XEÈí¼þWeb UIÖеÄÎó²î£¨CVE-2019-1904£©¿ÉÔÊÐíδ¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¾ÙÐпçÕ¾ÇëÇóαÔ죨CSRF£©¹¥»÷¡£¡£¡£¡£¸ÃÎó²îÔ´ÓÚÊÜÓ°ÏìÉè±¹ØÁ¬ÄWeb UIµÄCSRF±£»£»£»£»£»£»£»¤È±·¦£¬£¬£¬£¬£¬¹¥»÷Õß¿Éͨ¹ýÓÕÆÓû§»á¼û¶ñÒâÁ´½ÓÀ´Ê¹ÓôËÎó²î£¬£¬£¬£¬£¬ÀÖ³ÉʹÓôËÎó²î¿ÉÔÊÐí¹¥»÷ÕßÒÔÓû§µÄȨÏÞ¼¶±ðÖ´ÐÐí§Òâ²Ù×÷¡£¡£¡£¡£ÈôÊÇÓû§¾ßÓÐÖÎÀíȨÏÞ£¬£¬£¬£¬£¬Ôò¹¥»÷Õß¿ÉÒÔ¸ü¸ÄÉèÖá¢Ö´ÐÐÏÂÁî»òÖØÐ¼ÓÔØÊÜÓ°ÏìµÄ×°±¸¡£¡£¡£¡£¸ÃÎó²îµÄCVSSÆÀ·ÖΪ8.8·Ö£¬£¬£¬£¬£¬½¨ÒéÓû§¾¡¿ì×°ÖÃÐÞ¸´²¹¶¡¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190612-iosxe-csrf
3¡¢WAGO¹¤Òµ½»Á÷»ú¶à¸öÎó²î£¬£¬£¬£¬£¬°üÀ¨Ó²±àÂëµÄºóÃÅÕË»§

SEC ConsultÑо¿Ö°Ô±·¢Ã÷µÂ¹úWAGO¹«Ë¾ÖÆÔìµÄ¹¤Òµ½»Á÷»ú±£´æ¶à¸öÎó²î¡£¡£¡£¡£ÕâЩÎó²îÓ°ÏìÁËWAGO 852-303¡¢852-1305ºÍ852-1505ϵÁн»Á÷»ú£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÒÑ»®·ÖÐû²¼¹Ì¼þ°æ±¾1.2.2.S0¡¢1.1.6.S0ºÍ1.1.5.S0¾ÙÐÐÁËÐÞ¸´¡£¡£¡£¡£ÆäÖÐ×îÑÏÖØµÄÎó²îÊÇÓ²±àÂëºóÃÅÕË»§Îó²î£¨CVE-2019-12550£©£¬£¬£¬£¬£¬Ò»¸ö¾ßÓÐrootȨÏÞµÄĬÈÏÕË»§µÄƾ֤´æ´¢ÔÚÎļþÖУ¬£¬£¬£¬£¬²¢ÇÒ¾ßÓÐÈõÃÜÂ룬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓøÃÕË»§Í¨¹ýTelnet»òSSHÅþÁ¬µ½ÊÜÓ°ÏìµÄ½»Á÷»ú¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.securityweek.com/critical-vulnerabilities-found-wago-industrial-switches
4¡¢EviteÈ·ÈϽü1000Íò¿Í»§Êý¾Ý±»µÁ£¬£¬£¬£¬£¬ÒÑÔÚ°µÍø³öÊÛ

µç×ÓÔ¼Ç뺯ƽ̨EviteÈ·ÈÏÔÚ2019Äê2ÔÂ22ÈÕÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬½ü1000ÍòÓû§Êý¾Ýй¶²¢ÔÚ°µÍøÊг¡ÉϳöÊÛ¡£¡£¡£¡£EviteÌåÏÖδ¾ÊÚȨµÄµÚÈý·½»ñµÃÁËÒ»¸ö·Ç»î¶¯Êý¾Ý´æ´¢ÎļþµÄ»á¼ûȨÏÞ£¬£¬£¬£¬£¬¸Ã´æ´¢Îļþ°üÀ¨2013Äê֮ǰµÄEviteÓû§ÕË»§ÐÅÏ¢£¬£¬£¬£¬£¬ÀýÈçÐÕÃû¡¢Óû§Ãû¡¢µç×ÓÓʼþµØµã¡¢ÃÜÂë¡¢³öÉúÈÕÆÚºÍµç»°ºÅÂ룬£¬£¬£¬£¬µ«²»°üÀ¨²ÆÎñÐÅÏ¢ºÍÉç»áÇå¾²ºÅÂë¡£¡£¡£¡£ÕâЩÊý¾Ý±»ÎÛÃûÕÑÖøµÄºÚ¿ÍGnosticplayersÔÚ°µÍøÊг¡Dream MarketÉϳöÊÛ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://cyware.com/news/evite-confirms-that-its-customer-data-was-stolen-and-put-up-for-sale-in-the-dark-web-998a1462
5¡¢ºÚ¿ÍÍÅ»ïOutlaw»Ø¹é£¬£¬£¬£¬£¬Ê¹Óý©Ê¬ÍøÂç·Ö·¢PerlºóÃźÍMonero¿ó¹¤

Ç÷ÊÆ¿Æ¼¼·¢Ã÷ºÚ¿Í×éÖ¯Outlaw¾íÍÁÖØÀ´£¬£¬£¬£¬£¬Ê¹Óý©Ê¬ÍøÂç·Ö·¢ÃÅÂޱҿ󹤡£¡£¡£¡£¸Ã¹¥»÷»î¶¯Ö÷ÒªÕë¶ÔÖйú£¬£¬£¬£¬£¬Æä·Ö·¢µÄ¶ñÒâ¿ó¹¤À¦°óÁËÒ»¸ö»ùÓÚPerlµÄºóÃÅ×é¼þºÍÒ»¸öSSHºóÃÅ£¬£¬£¬£¬£¬ÕâÁ½¸ö×é¼þ¶¼ÓëÒÔǰµÄOutlaw¹¥»÷Óйء£¡£¡£¡£Í¨Ì«¹ýÎöshell¾ç±¾×é¼þºÍ´¦ÓÚδִÐÐ״̬µÄÐÝÃß¶ñÒâÎļþ£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÒÔΪOutlaw¹¥»÷ÈÔ´¦ÓÚ²âÊԽ׶Σ¬£¬£¬£¬£¬ÆäÄ¿µÄÊǽøÒ»²½¿ª·¢´óÐͶñÒâÈí¼þºÍ½©Ê¬ÍøÂç¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/outlaw-hackers-return-with-cryptocurrency-mining-bot/
6¡¢FormBookÐÂÑù±¾ÔöÇ¿»ìÏý¼°³¤ÆÚÐÔ»úÖÆ£¬£¬£¬£¬£¬Í¨¹ýdropper·Ö·¢

CyberbitÑо¿Ö°Ô±·¢Ã÷FormBook¶ñÒâÈí¼þµÄÐÂÑù±¾°üÀ¨ÐµÄdropper¡£¡£¡£¡£FormBookÊÇÒ»¸öä¯ÀÀÆ÷±íµ¥ÇÔÈ¡¼°¼üÅ̼ͼľÂí£¬£¬£¬£¬£¬×Ô2016ÄêÔÚºÚ¿ÍÂÛ̳ÉÏ·ºÆðÒÔÀ´Ò»Ö±ÔÚÆð¾¢¿ª·¢ÖС£¡£¡£¡£Ñо¿Ö°Ô±³Æ¸ÃÐÂÑù±¾ÔöÇ¿ÁËϵͳ³¤ÆÚÐԺͻìÏý»úÖÆÒÔÌӱܼì²â£¬£¬£¬£¬£¬ÐµÄdropper²»µ«»á½âѹËõ¶ñÒâÈí¼þ£¬£¬£¬£¬£¬»¹»á½¨ÉèÁ½¸ö¶ñÒâÀú³Ì£ºmshta.exeºÍÁíÒ»¸ödropper £¨Rhododendrons8.exe£©¡£¡£¡£¡£Ñо¿Ö°Ô±ÉÐ佫¸ÃÐÂÑù±¾ÓëÈκι¥»÷»î¶¯¹ØÁªÆðÀ´¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://threatpost.com/new-formbook-dropper-harbors-persistence/145614/