Autodesk¡¢Ç÷ÊÆ¿Æ¼¼¼°¿¨°Í˹»ùÆØDLLÐ®ÖÆÎó²î£»£»£»£»£»Î¢ÈíOAuthÑéÖ¤Àú³Ì±£´æÎó²î£¬£¬£¬£¬£¬¿Éµ¼ÖÂAzureÕÊ»§±»½ÓÊÜ
Ðû²¼Ê±¼ä 2019-12-041.Autodesk¡¢Ç÷ÊÆ¿Æ¼¼¼°¿¨°Í˹»ùÆØDLLÐ®ÖÆÎó²î
SafeBreach LabsÑо¿Ö°Ô±Åû¶Autodesk¡¢Ç÷ÊÆ¿Æ¼¼ºÍ¿¨°Í˹»ùÈí¼þÖеÄDLLÐ®ÖÆÎó²î¡£¡£¡£¡£¡£¡£Ç÷ÊÆ¿Æ¼¼Çå¾²Èí¼þ16.0.1221¼°ÒÔϰ汾Êܵ½CVE-2019-15628Ó°Ï죬£¬£¬£¬£¬¸ÃÎó²î±£´æÓÚcoreServiceShell.exe×é¼þÖС£¡£¡£¡£¡£¡£ÓÉÓÚδ¶Ô¼ÓÔØµÄDLLÊðÃû¾ÙÐÐÑéÖ¤£¬£¬£¬£¬£¬Òò´Ë¹¥»÷Õ߿ɼÓÔØºÍÖ´ÐÐí§ÒâDLL£¬£¬£¬£¬£¬µ¼Ö°×Ãûµ¥Èƹý¡¢»ñµÃ³¤ÆÚÐÔ¡¢Ìӱܼì²âÒÔ¼°Ç±ÔÚµÄÌØÈ¨Éý¼¶µÈ¡£¡£¡£¡£¡£¡£Kaspersky Secure ConnectionºÍAutodesk×ÀÃæÓ¦ÓÃÒ²»®·ÖÊܵ½ÀàËÆµÄÎó²îCVE-2019-15689ºÍCVE-2019-7365µÄÓ°Ïì¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/researchers-disclose-bugs-in-autodesk-trend-micro-kaspersky-software/
2.΢ÈíOAuthÑéÖ¤Àú³Ì±£´æÎó²î£¬£¬£¬£¬£¬¿Éµ¼ÖÂAzureÕÊ»§±»½ÓÊÜ
CyberArkÇå¾²Ñо¿Ô±Omer Tsarfati·¢Ã÷΢ÈíµÄÓ¦ÓóÌÐòʹÓÃOAuth¾ÙÐеÚÈý·½Éí·ÝÑéÖ¤µÄ·½·¨Öб£´æÇå¾²Îó²î£¬£¬£¬£¬£¬¿ÉÄÜʹ¹¥»÷Õß½ÓÊÜÓû§µÄAzureÔÆÕÊ»§¡£¡£¡£¡£¡£¡£OAuthÊÇÒ»ÖÖÉí·ÝÑéÖ¤ÐÒ飬£¬£¬£¬£¬ÔÊÐíÓ¦ÓóÌÐòÓëµÚÈý·½ÍøÕ¾»òÈí¼þ¹²ÏíÓû§ÕË»§Êý¾Ý¡£¡£¡£¡£¡£¡£ÔÚ΢ÈíµÄOAuthÊÚȨÁ÷³ÌÖУ¬£¬£¬£¬£¬µÚÈý·½½«ÊǾÓÉ΢ÈíÅú×¼µÄ°×Ãûµ¥URL¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷ÕâЩ±»ÐÅÈεİ×Ãûµ¥URLÖаüÀ¨Ò»Ð©Î´ÔÚAzureÃÅ»§ÖÐ×¢²áµÄURL£¬£¬£¬£¬£¬ÀýÈç.cloudapp.net¡¢.azurewebsites.netºÍ.{vm_region}.cloudapp.azure.com¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷ÖÁÉÙÓÐ54¸öÀàËÆµÄ×ÓÓòδÔÚδÔÚAzureÃÅ»§ÖÐ×¢²á£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔͨ¹ý×¢²áÕâЩÓòÀ´»á¼û΢ÈíÓû§µÄÊý¾Ý¡£¡£¡£¡£¡£¡£Î¢ÈíÔÚ11ÔÂ19ÈÕÐÞ¸´Á˸ÃÎÊÌâ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/microsoft-oauth-flaw-azure-takeover/150737/
3.¹È¸èÐû²¼12ÔÂAndroidÇå¾²¸üУ¬£¬£¬£¬£¬ ÐÞ¸´¶à¸öÎó²î
¹È¸èµÄ12ÔÂAndroidÇå¾²¸üÐÂÓÉ2019-12-01ºÍ2019-12-05Á½¸öÇå¾²²¹¶¡³ÌÐò¼¶±ð×é³É£¬£¬£¬£¬£¬ÆäÖÐ2019-12-01²¹¶¡°üÖÐÐÞ¸´ÁË15¸öÎó²î¡£¡£¡£¡£¡£¡£×îÑÏÖØµÄÎó²îÊÇFramework×é¼þÖеÄDoSÎó²îCVE-2019-2232£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÁËAndroid°æ±¾8.0¡¢8.1¡¢9ºÍ10£¬£¬£¬£¬£¬Ô¶³Ì¹¥»÷Õß¿Éͨ¹ý·¢ËͶñÒâÐÂÎŵ¼ÖÂÓÀÊÀ¾Ü¾øÐ§ÀÍ¡£¡£¡£¡£¡£¡£ÆäËüÑÏÖØµÄÎó²î»¹°üÀ¨Media¿ò¼ÜÖеÄÒªº¦Îó²îCVE-2019-2222ºÍCVE-2019-2223£¬£¬£¬£¬£¬Ô¶³Ì¹¥»÷Õß¿ÉʹÓøÃÎó²îÔÚÌØÈ¨Àú³ÌµÄÉÏÏÂÎÄÖÐÖ´ÐдúÂë¡£¡£¡£¡£¡£¡£±¾´ÎÇå¾²¸üÐÂÖиßͨ±ÕÔ´×é¼þÐÞ¸´ÁË22¸öÎó²î£¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄ×é¼þ°üÀ¨¶àģʽºô½Ð´¦Öóͷ£Æ÷¡¢¿í´øÂë·Ö¶àÖ·ºÍµ÷ÖÆ½âµ÷Æ÷µÈ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://source.android.com/security/bulletin/2019-12-01
4.ÃÀ¹úÇ¹Ö§ÖÆÔìÉÌSmith£¦WessonÔâMageCart¹¥»÷
ÃÀ¹úÇ¹Ö§ÖÆÔìÉÌSmith£¦WessonµÄÔÚÏßÊÐËÁÔâµ½Magecart¹¥»÷£¬£¬£¬£¬£¬¿Í»§Ö§¸¶ÐÅÏ¢¿ÉÄܱ»ÇÔ¡£¡£¡£¡£¡£¡£Æ¾Ö¤Sanguine SecurityµÄÑо¿Ö°Ô±Willem de GrootµÄ˵·¨£¬£¬£¬£¬£¬Smith£¦WessonµÄÍøÕ¾ÔÚÐþÉ«ÐÇÆÚÎå֮ǰÒѾ±»ÈëÇÖ£¬£¬£¬£¬£¬²¢ÇÒÖ»Õë¶ÔÃÀ¹úIPµØµãµÄ¿Í»§¡£¡£¡£¡£¡£¡£Í¨Ë׿ͻ§ÔÚ»á¼û¸ÃÍøÕ¾Ê±Ö»»áÏÂÔØÒ»¸ö11KBµÄÕý³£JavaScript¾ç±¾£¬£¬£¬£¬£¬µ«ÃÀ¹úIPµÄ¿Í»§ÔÚ»á¼ûʱÔò»áÏÂÔØÒ»¸ö20KBµÄ¶ñÒâ¾ç±¾£¬£¬£¬£¬£¬²¢ÏÔʾαÔìµÄÖ§¸¶Ò³Ãæ¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÉÐδ¶Ô´ËÊÂÎñ¾ÙÐлØÓ¦¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/smith-and-wesson-web-site-hacked-to-steal-customer-payment-info/
5.°Ä´óÀûÑÇMonash IVFÔ±¹¤ÓÊÏä±»ºÚ¿ÍÈëÇÖ
°Ä´óÀûÑÇ×î´óµÄÊÔ¹ÜÓ¤¶ùЧÀÍÉÌMonash IVFÖÒÑÔ»¼Õ߯ä¶àÃûÔ±¹¤µÄµç×ÓÓÊÏäÔâµ½´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢¿ÉÄܱ»Ð¹Â¶¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾µÄÊ×ϯִÐйÙMichael KnaapÓÚ11ÔÂ6ÈÕÈ·ÈÏ£¬£¬£¬£¬£¬ºÚ¿Í»á¼ûÁ˶àÃûÔ±¹¤µÄµç×ÓÓʼþ¡¢ÓÊÏ䵨µãºÍͨѶ¼£¬£¬£¬£¬£¬ÆäÖÐһЩÓʼþÖпÉÄܰüÀ¨»¼ÕßµÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬ÀýÈçÐÕÃûºÍÁªÏµ·½·¨¡¢ÅäżÐÅÏ¢¡¢³öÉúÈÕÆÚ¡¢¹ú¼®¡¢Ö°Òµ¡¢²ÆÎñÊý¾Ý¡¢Ò½Áưü¹ÜÐÅÏ¢¡¢¼à¿ØÐÅÏ¢¡¢¼ÝÕÕ»ò»¤ÕÕID¼°²¡ÀúµÈ¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÒѾ֪ͨÁ˰ĴóÀûÑÇÐÅϢרԱ°ì¹«ÊҺͰĴóÀûÑÇÍøÂçÇå¾²ÖÐÐÄ£¨ACSC£©£¬£¬£¬£¬£¬²¢¶Ô´ËÊÂÎñÕö¿ªÊӲ졣¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.smh.com.au/national/fears-over-patient-data-breach-after-cyber-attack-on-monash-ivf-20191203-p53gj0.html
6.Tuft£¦NeedleÒâÍâй¶23.6Íò¸ö¿Í»§¿ìµÝ±êÇ©
´²ÉÏÓÃÆ·¹«Ë¾Tuft£¦NeedleÒâÍ⽫236400¸ö¿Í»§µÄ¿ìµÝ±êÇ©ÒÅÁôÔڿɹûÕæ»á¼ûµÄAWS´æ´¢Í°ÖУ¬£¬£¬£¬£¬Ê¹µÃÈκÎÈ˶¼¿É»á¼û¿Í»§µÄÐÕÃû¡¢µØµãºÍµç»°ºÅÂëµÈÐÅÏ¢¡£¡£¡£¡£¡£¡£ÕâЩ±êÇ©ÊÇÔڸù«Ë¾ÓÚ2014ÄêÖÁ2017ÄêÖ®¼ä½¨ÉèµÄ¡£¡£¡£¡£¡£¡£×ܲ¿Î»ÓÚÓ¢¹úµÄÇå¾²³§ÉÌFidus Information Security·¢Ã÷ÁË̻¶µÄÊý¾Ý²¢¾ÙÐÐÁËÑéÖ¤¡£¡£¡£¡£¡£¡£Tuft£¦NeedleÔÚ½Óµ½±¨¸æºóѸËٹرÕÁ˸ô洢ͰµÄ»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://techcrunch.com/2019/12/02/tuft-and-needle-exposed-shipping-labels/