Lodash¿â±¬³öÑÏÖØÇå¾²Îó²î£¬£¬£¬£¬£¬²¨¼°400Íò+ÏîÄ¿£»£»£» £»£»£»£»Áè¼Ý1300¸öAndroid APP×ÝÈ»¾Ü¾øÊÚÈ¨Ò²ÍøÂçÓû§ÐÅÏ¢

Ðû²¼Ê±¼ä 2019-07-12
1¡¢Lodash¿â±¬³öÑÏÖØÇå¾²Îó²î£¬£¬£¬£¬£¬²¨¼°400Íò+ÏîÄ¿

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨
 
Ñо¿Ö°Ô±Liran TalÅû¶Lodash¿âÖеĸßΣԭÐÍÎÛȾÎó²î¡£¡£¡£¡£¡£¡£¡£LodashÊÇÒ»¸öÊ¢ÐеÄnpm¿â£¬£¬£¬£¬£¬½öÔÚGitHubÉϾÍÓÐÁè¼Ý400Íò¸öÏîĿʹÓᣡ£¡£¡£¡£¡£¡£¸ÃÎó²î£¨CVE-2019-10744£©Ó°ÏìÁË4.17.11°æ±¾Ö®Ç°µÄLodash¿â£¬£¬£¬£¬£¬´ó×Úǰ¶ËÏîÄ¿¿ÉÄÜÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£¡£Ô­ÐÍÎÛȾÎó²îÔÊÐí¹¥»÷ÕßÐÞ¸ÄWebÓ¦ÓõÄJavaScript¹¤¾ßÔ­ÐÍ£¬£¬£¬£¬£¬Æ¾Ö¤TalµÄ˵·¨£¬£¬£¬£¬£¬Lodash¿âÖеÄÒªÁì¡°defaultsDeep¡±¿É±»ÓÃÓÚÌí¼Ó»òÐÞ¸ÄObject.prototypeµÄÊôÐÔ£¬£¬£¬£¬£¬Õâ¿ÉÄܵ¼ÖÂWebÓ¦ÓÃÍ߽⻣»£» £»£»£»£»ò¸Ä±äÆäÐÐΪ¡£¡£¡£¡£¡£¡£¡£Lodash½«ÔÚÏÂÒ»¸ö°æ±¾ÖÐÐÞ¸´¸ÃÎó²î¡£¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/07/lodash-prototype-pollution.html

2¡¢AppleÔÝʱ½ûÓÃApple Watch¶Ô½²»ú¹¦Ð§£¬£¬£¬£¬£¬±£´æÇÔÌýΣº¦

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨
 
ƾ֤TechCrunchµÄÒ»·Ý±¨¸æ£¬£¬£¬£¬£¬ÓÉÓÚ±£´æ¿ÉÇÔÌýËûÈ˵ÄÎó²î£¬£¬£¬£¬£¬AppleÒÑÔÝʱ½ûÓÃÁËApple WatchµÄWalkie-Talkie¹¦Ð§¡£¡£¡£¡£¡£¡£¡£Walkie-TalkieÊÇApple WatchµÄ¶Ô½²»ú¹¦Ð§£¬£¬£¬£¬£¬ÔÊÐíÓû§ÎÞÐ貦´òµç»°ÊµÊ±ÓëÅóÙ­¾ÙÐÐÅÊ̸¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îµÄÏêϸϸ½ÚÉÐδÅû¶£¬£¬£¬£¬£¬AppleÌåÏÖÕýÔÚ¿ª·¢ÐÞ¸´²¹¶¡£¬£¬£¬£¬£¬Apple WatchÉϵÄWalkie-TalkieÓ¦ÓÃÒÀÈ»»á±£´æ£¬£¬£¬£¬£¬µ«ÔÝʱÎÞ·¨Ê¹Óᣡ£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://threatpost.com/apple-disables-walkie-talkie-app-due-to-eavesdropping-flaw/146410/

3¡¢iMessage¾Ü¾øÐ§ÀÍÎó²î£¬£¬£¬£¬£¬¿ÉʹiOS12.2¼°ÒÔϰ汾±äש

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

Google Project ZeroÅû¶iMessageÖеľܾøÐ§ÀÍÎó²î£¨CVE-2019-8664£©£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÁËÔËÐоɰ汾£¨iOS 12.2¼°Ö®Ç°£©µÄiPhone×°±¸£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÏòÒ×Êܹ¥»÷µÄiOS×°±¸·¢ËͶñÒâÐÂÎÅ£¬£¬£¬£¬£¬¿Éµ¼ÖÂÄ¿µÄ×°±¸ÎÞ·¨²Ù×÷£¨±äש£©¡£¡£¡£¡£¡£¡£¡£AppleÔÚ2019Äê5ÔÂ13ÈÕÐû²¼µÄiOS 12.3ÖÐÐÞ¸´Á˸ÃÎó²î¡£¡£¡£¡£¡£¡£¡£µ«Æ¾Ö¤iOS°æ±¾¸ú×Ù¹«Ë¾StatcounterµÄÊý¾Ý£¬£¬£¬£¬£¬×èÖ¹6ÔÂÈ«ÇòÈÔÓÐ47£¥µÄiOS×°±¸ÔËÐÐÔÚ12.2¼°ÒÔϰ汾£¬£¬£¬£¬£¬ÕâÒâζ×ÅËüÃÇÈÔÈ»Ò×Êܹ¥»÷¡£¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://threatpost.com/apple-patches-imessage-bug/146277/

4¡¢MagecartʹÓÃÉèÖùýʧµÄAWS S3ѬȾÁè¼Ý1.7Íò¸öÍøÕ¾

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

ƾ֤ÍþвÇ鱨³§ÉÌRiskIQÐû²¼µÄÒ»·Ý±¨¸æ£¬£¬£¬£¬£¬×Ô4Ô·ÝÒÔÀ´MagecartʹÓÃÉèÖùýʧµÄAWS S3´æ´¢Í°ÒÑѬȾÁè¼Ý1.7Íò¸öÍøÕ¾£¬£¬£¬£¬£¬ÆäÖаüÀ¨AlexaÅÅÃûǰ2000µÄÍøÕ¾¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÖ÷ҪɨÃè¿É¹ûÕæ»á¼ûµÄS3´æ´¢Í°£¬£¬£¬£¬£¬²¢ÔÚÍøÕ¾Ê¹ÓõÄJavaScriptÎļþÖÐ×¢Èë¶ñÒâ´úÂë¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß²¢²»×ÜÊÇÖªµÀÕâЩJSÎļþ±»ÄÄЩÏîÄ¿»òÍøÕ¾Ê¹Ó㬣¬£¬£¬£¬Ðí¶àÊÜѬȾµÄJSÎļþ²¢²»»áÔÚÖ§¸¶Ò³ÃæÉϼÓÔØ¡£¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/new-magecart-attacks-leverage-misconfigured-s3-buckets-to-infect-over-17k-sites/

5¡¢Áè¼Ý1300¸öAndroid APP×ÝÈ»¾Ü¾øÊÚÈ¨Ò²ÍøÂçÓû§ÐÅÏ¢

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

×î½üµÄÒ»ÏîÑо¿·¢Ã÷£¬£¬£¬£¬£¬×ÝÈ»Óû§¾Ü¾øÁËÊÚȨÉêÇ룬£¬£¬£¬£¬Áè¼Ý1300¿îAndroid APPÒÀ¾É¿ÉÒÔÍøÂçÓû§µÄÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£ÕâÏîÑо¿ÊÓ²ìÁËÀ´×ÔGoogle PlayÊÐËÁµÄÁè¼Ý8.8Íò¸öAPP£¬£¬£¬£¬£¬ÆäÖÐ1325¸öAPP±»·¢Ã÷ÈÆ¹ýÁËAndroid²Ù×÷ϵͳÖеÄȨÏÞ»á¼û£¬£¬£¬£¬£¬Ê¹ÓñäͨҪÁì»ñÈ¡Óû§µÄСÎÒ˽¼ÒÊý¾Ý£¬£¬£¬£¬£¬ÀýÈç´ÓÕÕÆ¬¡¢Wi-FiÅþÁ¬µÈÊý¾ÝÔ´ÖлñÈ¡Óû§µÄλÖÃÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£2018Äê9Ô£¬£¬£¬£¬£¬Ñо¿Ö°Ô±¾ÍÏò¹È¸è·´ÏìÁËÕâ¸öÎÊÌ⣬£¬£¬£¬£¬¹È¸èÌåÏÖ½«ÔÚAndroid QÖнâ¾öÕâЩÎÊÌâ¡£¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/07/android-permission-bypass.html

6¡¢Pale MoonЧÀÍÆ÷ÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬×°Öðü±»Ö²Èë¶ñÒâ´úÂë

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

Pale Moon ä¯ÀÀÆ÷¿ª·¢ÍŶÓÐû²¼ÍйܾɰæÈí¼þµÄ´æµµÐ§ÀÍÆ÷Ôâµ½ºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬µ¼Ö¾ɰæÈí¼þµÄ×°Öðü±»Ö²Èë¶ñÒâ´úÂë¡£¡£¡£¡£¡£¡£¡£¸ÃÊÂÎñ¿É×·Ëݵ½2017Äê12ÔÂ27ÈÕ£¬£¬£¬£¬£¬µ«¸ÃÍŶÓÔÚ7ÔÂ9Èղŷ¢Ã÷ÁËÕâ¸öÎÊÌâ¡£¡£¡£¡£¡£¡£¡£Îª±ÜÃâ¶ñÒâÈí¼þ½øÒ»²½Èö²¥£¬£¬£¬£¬£¬¸ÃÍŶÓÁ¬Ã¦ÇжÏÁ˸ÃЧÀÍÆ÷£¨archive.palemoon.org£©µÄËùÓÐÅþÁ¬¡£¡£¡£¡£¡£¡£¡£¾ÝϤ´æµµÐ§ÀÍÆ÷ÖÐÍйܵÄËùÓа汾µÄPale Moon£¨×î¸ß°æ±¾Îª 27.6.2£©¾ù±»Ñ¬È¾£¬£¬£¬£¬£¬µ«¸ÃÍŶÓÇ¿µ÷³ÆÓÃÓÚ·Ö·¢×îа汾Èí¼þµÄЧÀÍÆ÷δÊܴ˴ι¥»÷ÊÂÎñµÄÓ°Ïì¡£¡£¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/hackers-infect-pale-moon-archive-server-with-a-malware-dropper/