D-Link NASµÄí§ÒâÏÂÁî×¢ÈëºÍÓ²±àÂëºóÃÅ

Ðû²¼Ê±¼ä 2024-04-08
1. D-Link NASµÄí§ÒâÏÂÁî×¢ÈëºÍÓ²±àÂëºóÃÅ


4ÔÂ6ÈÕ£¬£¬£¬£¬ £¬£¬£¬ÍþвÑо¿Ö°Ô±Åû¶Á˶à¸ö²»ÔÚÖ§³ÖµÄ D-Link ÍøÂ總¼Ó´æ´¢ (NAS) ×°±¸ÐͺÅÖб£´æÐµÄí§ÒâÏÂÁî×¢ÈëºÍÓ²±àÂëºóÃÅȱÏÝ¡£¡£¡£¡£ ¡£¡£¡£¸ÃÎÊÌâ±£´æÓÚ¡°/cgi-bin/nas_sharing.cgi¡±¾ç±¾ÖУ¬£¬£¬£¬ £¬£¬£¬Ó°ÏìÆä HTTP GET ÇëÇó´¦Öóͷ£³ÌÐò×é¼þ¡£¡£¡£¡£ ¡£¡£¡£µ¼Ö¸ÃȱÏÝ£¨±àºÅΪ CVE-2024-3273£©µÄÁ½¸öÖ÷ÒªÎÊÌâÊÇͨ¹ýÓ²±àÂëÕÊ»§£¨Óû§Ãû£º¡°messagebus¡±ºÍ¿ÕÃÜÂ룩´Ù³ÉµÄºóÃÅÒÔ¼°Í¨¹ý¡°system¡±²ÎÊýµÄÏÂÁî×¢ÈëÎÊÌâ¡£¡£¡£¡£ ¡£¡£¡£ÏÂÁî×¢ÈëȱÏÝÊÇÓÉÓÚͨ¹ý HTTP GET ÇëÇó½« Base64 ±àÂëµÄÏÂÁîÌí¼Óµ½¡°system¡±²ÎÊý£¬£¬£¬£¬ £¬£¬£¬È»ºóÖ´ÐиÃÏÂÁî¶øÒýÆðµÄ¡£¡£¡£¡£ ¡£¡£¡£D-LinkΪ¾É×°±¸½¨ÉèÁË ×¨ÃŵÄÖ§³ÖÒ³Ãæ £¬£¬£¬£¬ £¬£¬£¬Óû§¿ÉÒÔÔÚÆäÖÐä¯ÀÀµµ°¸ÒÔ²éÕÒ×îеÄÇå¾²ºÍ¹Ì¼þ¸üС£¡£¡£¡£ ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/over-92-000-exposed-d-link-nas-devices-have-a-backdoor-account/


2. Áè¼Ý1.6Íò¸öIVANTI VPNÈÔÈ»Ò×Êܵ½CVE-2024-21894µÄ¹¥»÷


4ÔÂ6ÈÕ£¬£¬£¬£¬ £¬£¬£¬Shadowserver Ñо¿Ö°Ô±±¨¸æ³Æ£¬£¬£¬£¬ £¬£¬£¬Ô¼Äª 16500 ¸ö Ivanti Connect Secure ºÍ Poly Secure Íø¹ØÈÝÒ×Êܵ½×î½ü±¨¸æµÄ RCE CVE-2024-21894µÄÓ°Ïì¡£¡£¡£¡£ ¡£¡£¡£¸Ã¹«Ë¾ÒÑÐû²¼ÁËÇå¾²¸üУ¬£¬£¬£¬ £¬£¬£¬ÒÔ½â¾öÓ°Ïì Connect Secure ºÍÕ½ÂÔÇå¾²Íø¹ØµÄËĸöÇå¾²Îó²î£¬£¬£¬£¬ £¬£¬£¬ÕâЩÎó²î¿ÉÄܵ¼Ö´úÂëÖ´Ðк;ܾøÐ§ÀÍ (DoS)£¬£¬£¬£¬ £¬£¬£¬°üÀ¨CVE-2024-21894¡£¡£¡£¡£ ¡£¡£¡£CVE-2024-21894£¨CVSS ÆÀ·Ö 8.2£©ÊÇ Ivanti Connect Secure£¨9.x¡¢22.x£©ºÍ Ivanti Policy Secure µÄ IPSec ×é¼þÖеĶÑÒç³öÎó²î£¬£¬£¬£¬ £¬£¬£¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¶ñÒâÓû§ÔÚÒÔÏÂλÖ÷¢ËÍÌØÖÆÇëÇó£ºÏÂÁî - ʹЧÀÍÍß½â´Ó¶øµ¼Ö DoS ¹¥»÷¡£¡£¡£¡£ ¡£¡£¡£ÔÚijЩÇéÐÎÏ£¬£¬£¬£¬ £¬£¬£¬Õâ¿ÉÄܻᵼÖÂÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£ ¡£¡£¡£Shadowserver Ñо¿Ö°Ô±É¨ÃèÁË»¥ÁªÍøÉÏÊÇ·ñ±£´æÒ×ÊÜ CVE-2024-21894 Ó°ÏìµÄʵÀý£¬£¬£¬£¬ £¬£¬£¬²¢±¨¸æ³ÆÔ¼ÓÐ 16,500 ¸öʵÀýÈÔÈ»ÈÝÒ×Êܵ½¹¥»÷¡£¡£¡£¡£ ¡£¡£¡£´ó´ó¶¼Ò×Êܹ¥»÷µÄϵͳλÓÚÃÀ¹ú£¨×èֹ׫д±¾ÎÄʱÓÐ 4686 ¸ö£©£¬£¬£¬£¬ £¬£¬£¬Æä´ÎÊÇÈÕ±¾£¨2009 Ä꣩ºÍÓ¢¹ú£¨1032 ¸ö£©¡£¡£¡£¡£ ¡£¡£¡£


https://securityaffairs.com/161544/security/ivanti-16500-vulnerable-istances.html


3. ÃÀ¹úÎÀÉú²¿ÖÒÑÔÒ½Ôº IT ЧÀĮ́Ò×Ôâµ½ºÚ¿Í¹¥»÷


4ÔÂ6ÈÕ£¬£¬£¬£¬ £¬£¬£¬ÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿ (HHS) ÖÒÑԳƣ¬£¬£¬£¬ £¬£¬£¬ºÚ¿ÍÏÖÔÚÕýÔÚʹÓÃÉç»á¹¤³ÌÕ½ÂÔÀ´¹¥»÷Ò½ÁƱ£½¡ºÍ¹«¹²ÎÀÉú (HPH) ÁìÓòµÄ IT ЧÀĮ́¡£¡£¡£¡£ ¡£¡£¡£ÎÀÉú²¿·ÖÍøÂçÇ徲Эµ÷ÖÐÐÄ (HC3) ±¾ÖÜÐû²¼µÄ²¿·Ö¾¯±¨³Æ£¬£¬£¬£¬ £¬£¬£¬ÕâЩսÂÔÔÊÐí¹¥»÷Õßͨ¹ý×¢²á×Ô¼ºµÄ¶àÖØÉí·ÝÑéÖ¤ (MFA) ×°±¸À´»á¼ûÄ¿µÄ×éÖ¯µÄϵͳ¡£¡£¡£¡£ ¡£¡£¡£ÔÚÕâЩ¹¥»÷ÖУ¬£¬£¬£¬ £¬£¬£¬ÍþвÐÐΪÕßʹÓÃÍâµØÇøÓò´úÂëÖµçð³ä²ÆÎñ²¿·ÖÔ±¹¤µÄ×éÖ¯£¬£¬£¬£¬ £¬£¬£¬²¢ÌṩÇÔÈ¡µÄÉí·ÝÑéÖ¤ÏêϸÐÅÏ¢£¬£¬£¬£¬ £¬£¬£¬°üÀ¨¹«Ë¾ ID ºÍÉç»áÇå¾²ºÅÂë¡£¡£¡£¡£ ¡£¡£¡£ËûÃÇʹÓÃÕâЩÃô¸ÐÐÅÏ¢²¢Éù³Æ×Ô¼ºµÄÖÇÄÜÊÖ»úÒÑË𻵣¬£¬£¬£¬ £¬£¬£¬Ëµ·þ IT ×ÊÖų́ÔÚ¹¥»÷ÕߵĿØÖÆÏÂÔÚ MFA ÖÐ×¢²áÐÂ×°±¸¡£¡£¡£¡£ ¡£¡£¡£ÕâʹËûÃÇÄܹ»»á¼û¹«Ë¾×ÊÔ´£¬£¬£¬£¬ £¬£¬£¬²¢ÔÊÐíËûÃÇÔÚÉÌÒµµç×ÓÓʼþй¶¹¥»÷ÖÐÖØ¶¨ÏòÒøÐÐÉúÒâ¡£¡£¡£¡£ ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/us-health-dept-warns-hospitals-of-hackers-targeting-it-help-desks/


4. ÒÔÉ«ÁÐ˾·¨²¿Ôںڿͻ·Ö×ÓÉù³ÆÈëÇÖºóÉó²éÍøÂçÊÂÎñ


4ÔÂ6ÈÕ£¬£¬£¬£¬ £¬£¬£¬ ÒÔÉ«ÁÐ˾·¨²¿ÌåÏÖ£¬£¬£¬£¬ £¬£¬£¬ÕýÔÚÊÓ²ìÒ»ÆðÍøÂçÊÂÎñ£¬£¬£¬£¬ £¬£¬£¬¹æÄ£ÈÔÔÚÉó²éÖУ¬£¬£¬£¬ £¬£¬£¬ÐèҪʱ¼äÀ´¼ì²éй¶ÎļþµÄÄÚÈݺ͹æÄ£¼°ÆäȪԴ¡£¡£¡£¡£ ¡£¡£¡£Ò»¸öÃûΪ Anonymous for Justice µÄ×éÖ¯Éù³Æ¶Ô´Ë´Îй¶ÈÏÕæ£¬£¬£¬£¬ £¬£¬£¬²¢³Æ´Ë´Îй¶°üÀ¨¼ìË÷½ü 300 GB µÄÊý¾Ý¡£¡£¡£¡£ ¡£¡£¡£¸Ã×éÖ¯ÔÚÆäÍøÕ¾ÉÏÌåÏÖ£¬£¬£¬£¬ £¬£¬£¬½«¼ÌÐø¹¥»÷ÒÔÉ«ÁУ¬£¬£¬£¬ £¬£¬£¬¡°Ö±µ½¼ÓɳսÕù×èÖ¹¡±¡£¡£¡£¡£ ¡£¡£¡£¸Ã×éÖ¯Ðû²¼Á˾ݳÆÔÚ¹¥»÷»î¶¯ÖлñµÃµÄÎļþ£¬£¬£¬£¬ £¬£¬£¬ÀýÈçÖ´·¨Îļþ£¬£¬£¬£¬ £¬£¬£¬°üÀ¨±ê¼ÇΪÉñÃØµÄË«±ßЭæÅºÍÌõÔ¼²Ý°¸¡£¡£¡£¡£ ¡£¡£¡£Â·Í¸ÉçÎÞ·¨×ÔÁ¦ºËʵй¶ÎļþµÄÕæÊµÐÔ¡£¡£¡£¡£ ¡£¡£¡£Ë¾·¨²¿ÔÚÌû×ÓÖÐÌåÏÖ£¬£¬£¬£¬ £¬£¬£¬ÒÑÕë¶ÔÕâÖÖÇéÐÎÌáǰ×öºÃ×¼±¸£¬£¬£¬£¬ £¬£¬£¬²¢ÇÒÆäÐж¯²»»áÖÐÖ¹¡£¡£¡£¡£ ¡£¡£¡£¹ú¼ÒÍøÂç¾Ö±¾ÖÜÔçЩʱ¼äÌåÏÖ£¬£¬£¬£¬ £¬£¬£¬Ô¤¼ÆÒÁÀÊÄê¶ÈÊ¥³ÇÈÕÖÜÄ©µÄÍøÂç¹¥»÷ʵÑ齫»áÔöÌí¡£¡£¡£¡£ ¡£¡£¡£


https://www.reuters.com/world/middle-east/israels-justice-ministry-reviewing-cyber-incident-after-hacktivists-claim-breach-2024-04-05/


5. ÈÕ±¾ Hoya µÄ IT ϵͳÔâÊܹ¥»÷ºóÔÝÍ£Éú²ú


4ÔÂ5ÈÕ£¬£¬£¬£¬ £¬£¬£¬ÈÕ±¾µÄ Hoya¡ª¡ªÒ»¼ÒÑÛ¾µºÍÒþÐÎÑÛ¾µÖÆÔìÉÌ£¬£¬£¬£¬ £¬£¬£¬ÒÔ¼°ÓÃÓÚÖÆÔì°ëµ¼ÌåÖÆÔ졢ƽ°åÏÔʾÆ÷ºÍÓ²ÅÌÇý¶¯Æ÷µÄÌ×¼þ¡ª¡ª IT ϵͳÔâÊܹ¥»÷ºó£¬£¬£¬£¬ £¬£¬£¬¸Ã¹«Ë¾ÒÑ×èÖ¹²¿Ñ§Éú²úºÍÏúÊۻ¡£¡£¡£¡£ ¡£¡£¡£¹Ù·½¶ÔËù±¬·¢ÊÂÎñµÄ¿´·¨ÊÇÄ£ºýµÄ¡£¡£¡£¡£ ¡£¡£¡£¸Ã¹«Ë¾ÔÊÐí¡°½«½ÓÄɲ½·¥»Ö¸´Éú²úºÍÏúÊۻËùÐèµÄϵͳ£¬£¬£¬£¬ £¬£¬£¬²¢¾¡¿ì»Ö¸´Ïò¿Í»§Ìṩ²úÆ·µÄ¹©Ó¦ÏµÍ³¡±¡£¡£¡£¡£ ¡£¡£¡£Hoya ÏÖÔÚÉв»ÇåÎú¡°¹«Ë¾³ÖÓеÄÉñÃØ»òСÎÒ˽¼ÒÐÅÏ¢ÊÇ·ñÒѱ»Ð¹Â¶»ò±»µÚÈý·½»á¼û¡±£¬£¬£¬£¬ £¬£¬£¬²¢ÖÒÑԳơ°ÖÜÈ«ÆÊÎöÔ¤¼ÆÐèÒªÏ൱³¤µÄʱ¼ä¡±¡£¡£¡£¡£ ¡£¡£¡£


https://www.theregister.com/2024/04/05/hoya_infosec_incident/


6. ºÚ¿ÍʹÓà Magento Îó²îÇÔÈ¡µç×ÓÉÌÎñÍøÕ¾Ö§¸¶Êý¾Ý


4ÔÂ6ÈÕ£¬£¬£¬£¬ £¬£¬£¬¸Ã¹¥»÷ʹÓÃÁËCVE-2024-20720£¨CVSS ÆÀ·Ö£º9.1£©£¬£¬£¬£¬ £¬£¬£¬Adobe ½«ÆäÐÎòΪ¡°ÌØÊâÔªËØµÄ²»µ±Öк͡±°¸Àý£¬£¬£¬£¬ £¬£¬£¬¿ÉÄÜΪí§Òâ´úÂëÖ´ÐÐÆÌÆ½õè¾¶¡£¡£¡£¡£ ¡£¡£¡£¹«Ë¾ÔÚ 2024 Äê 2 Ô 13 ÈÕÐû²¼µÄÇå¾²¸üÐÂÖнâ¾öÁËÕâ¸öÎÊÌâ¡£¡£¡£¡£ ¡£¡£¡£Sansec ÌåÏÖ£¬£¬£¬£¬ £¬£¬£¬ËüÔÚÊý¾Ý¿âÖз¢Ã÷ÁËÒ»¸ö¡°È«ÐÄÉè¼ÆµÄ½á¹¹Ä£°å¡±£¬£¬£¬£¬ £¬£¬£¬¸ÃÄ£°å±»ÓÃÀ´×Ô¶¯×¢Èë¶ñÒâ´úÂëÒÔÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£ ¡£¡£¡£¹¥»÷Õß½« Magento ½á¹¹ÆÊÎöÆ÷Óë beberlei/assert °ü£¨Ä¬ÈÏ×°Öã©Á¬ÏµÆðÀ´Ö´ÐÐϵͳÏÂÁî¡£¡£¡£¡£ ¡£¡£¡£ÓÉÓڽṹ¿éÓë½áÕʳµÏà¹ØÁª£¬£¬£¬£¬ £¬£¬£¬Òò´Ëÿµ±ÇëÇó <store>/checkout/cart ʱ¶¼»áÖ´ÐдËÏÂÁî¡£¡£¡£¡£ ¡£¡£¡£ÓÐÎÊÌâµÄÏÂÁîÊÇsed£¬£¬£¬£¬ £¬£¬£¬ËüÓÃÓÚ²åÈëÒ»¸ö´úÂëÖ´ÐкóÃÅ£¬£¬£¬£¬ £¬£¬£¬È»ºóÈÏÕæÌṩ StripeÖ§¸¶ä¯ÀÀÆ÷ÒÔ²¶»ñ²ÆÎñÐÅÏ¢²¢½«Æäй¶µ½ÁíÒ»¸öÊÜѬȾµÄ Magento ÊÐËÁ¡£¡£¡£¡£ ¡£¡£¡£


https://thehackernews.com/2024/04/hackers-exploit-magento-bug-to-steal.html