ÐÅÏ¢Çå¾²Öܱ¨-2021ÄêµÚ35ÖÜ

Ðû²¼Ê±¼ä 2021-08-30

>±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö

2021Äê08ÔÂ23ÈÕÖÁ08ÔÂ29ÈÕ¹²ÊÕ¼Çå¾²Îó²î60¸ö£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇFlatCore-CMS upload addon²å¼þ´úÂëÖ´ÐЩ£»£»£»£»£»NASCENT RemKon Device Manager assets/index.phpí§Òâ´úÂëÉÏ´«Îó²î£»£»£»£»£»Teamviewer TVSÆÊÎöÄÚ´æÆÆËð´úÂëÖ´ÐÐÎó²î£»£»£»£»£»RaspAP raspap-webguiÌØÈ¨ÌáÉýÎó²î£»£»£»£»£»SolarWinds Web Help Desk referrerαÔì»á¼ûÏÞÖÆÈÆ¹ýÎó²î¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÐÂ¼ÓÆÂ·¿µØ²ú¹«Ë¾OrangeTeeÔâµ½ALTDOSµÄÀÕË÷¹¥»÷£»£»£»£»£»HuntressÔÚ1900̨Exchange¼ì²âµ½140¶àÖÖWeb shell£»£»£»£»£»Razer SynapseÖеÄÍâµØÌáȨ0dayÓ°ÏìÁè¼Ý1ÒÚÓû§£»£»£»£»£»SAM·¢Ã÷MiraiʹÓÃRealtek SDKÖÐÎó²îµÄ¹¥»÷»î¶¯£»£»£»£»£»OpenSSLÐû²¼Çå¾²¸üУ¬£¬£¬ÐÞ¸´²úÆ·ÖеÄ2¸öÇå¾²Îó²î¡£¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£


>Ö÷ÒªÇå¾²Îó²îÁбí


1.Google chrome V8 CVE-2021-30598ÀàÐÍ»ìÏý´úÂëÖ´ÐÐÎó²î


FlatCore-CMS upload addon²å¼þ±£´æÇå¾²Îó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£


https://github.com/flatCore/flatCore-CMS/issues/52


2.NASCENT RemKon Device Manager assets/index.phpí§Òâ´úÂëÉÏ´«Îó²î


NASCENT RemKon Device Manager assets/index.phpͼÏñÉÏ´«¹¦Ð§±£´æÇå¾²Îó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉÉÏ´«í§ÒâÎļþ²¢ÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£


https://www.blacklanternsecurity.com/2021-08-23-Nascent-RemKon-CVEs/


3.Teamviewer TVSÆÊÎöÄÚ´æÆÆËð´úÂëÖ´ÐÐÎó²î


Teamviewer TVSÆÊÎö±£´æÄÚ´æÆÆËðÎó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇ󣬣¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»£»£»òÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£


https://www.zerodayinitiative.com/advisories/ZDI-21-1003/


4.RaspAP raspap-webguiÌØÈ¨ÌáÉýÎó²î


RaspAP raspap-webgui±£´æ²»Çå¾²µÄsudoersȨÏÞÎó²î£¬£¬£¬ÔÊÐíÍâµØ¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬»ñµÃROOTȨÏÞ¡£¡£¡£


https://github.com/RaspAP/raspap-webgui/blob/fabc48c7daae4013b9888f266332e510b196a062/installers/raspap.sudoers


5.SolarWinds Web Help Desk referrerαÔì»á¼ûÏÞÖÆÈÆ¹ýÎó²î


SolarWinds Web Help Desk referrerαÔì±£´æÇå¾²Îó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉÈÆ¹ýÏÞÖÆÎ´ÊÚȨ»á¼û¡£¡£¡£


https://www.solarwinds.com/trust-center/security-advisories/cve-2021-32076


 >Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢ÐÂ¼ÓÆÂ·¿µØ²ú¹«Ë¾OrangeTeeÔâµ½ALTDOSµÄÀÕË÷¹¥»÷


ÐÂ¼ÓÆÂ·¿µØ²ú¹«Ë¾OrangeTeeÔâµ½ALTDOSµÄÀÕË÷¹¥»÷.jpg


8ÔÂ6ÈÕ£¬£¬£¬ÐÂ¼ÓÆÂ·¿µØ²ú¹«Ë¾OrangeTee GroupÔÚÆä¹ÙÍøÉÏÐû²¼ÉùÃ÷³ÆÆäÔâµ½Á˹¥»÷¡£¡£¡£8ÔÂ12ÈÕ£¬£¬£¬ºÚ¿ÍÍÅ»ïALTDOSÉù³ÆËüÃÇ×Ô2021Äê6ÔÂÒÔÀ´£¬£¬£¬Ò»Ö±ÔÚÇÔÈ¡¸Ã¹«Ë¾µÄÊý¾Ý£¬£¬£¬ÏÖÒÑ»ñµÃÁËÀ´×ÔACSystem¡¢NewOrangeTee¡¢OT_Analytics¡¢OT_LeaveºÍProjInfoListingµÄ969¸öÊý¾Ý¿â¡£¡£¡£Í¬ÈÕ£¬£¬£¬OrangeTee¹«Ë¾ÌåÏÖÆä²»»áÖ§¸¶Êê½ð¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.databreaches.net/singapore-real-estate-firm-breached-by-altdos/


2¡¢HuntressÔÚ1900̨Exchange¼ì²âµ½140¶àÖÖWeb shell


HuntressÔÚ1900̨Exchange¼ì²âµ½140¶àÖÖWeb shell.jpg


ÉÏÖÜÎ壬£¬£¬Çå¾²¹«Ë¾Huntress Labs³Æ½ü2000̨Microsoft ExchangeÓʼþЧÀÍÆ÷ÔÚÒÑÍù¼¸ÌìÄÚÔâµ½ºÚ¿Í¹¥»÷¡£¡£¡£ProxyShellÊÇ3¸öÎó²îCVE-2021-34473¡¢CVE-2021-34523ºÍCVE-2021-31207µÄͳ³Æ¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬ÔÚProxyShell¿´·¨ÑéÖ¤´úÂëÐû²¼ºó²»¾Ã·ºÆðÁËÏà¹ØÉ¨Ãè»î¶¯£¬£¬£¬Ö±µ½ÉÏÖÜÄ©Äð³ÉÁËÏÖʵ¹¥»÷¡£¡£¡£±ðµÄ£¬£¬£¬Òѱ»ÈëÇÖµÄ1900¶ą̀ExchangeЧÀÍÆ÷Éæ¼°µ½µÄ×éÖ¯°üÀ¨ÐÞ½¨ÖÆÔìÉÌ¡¢º£Ïʼӹ¤³§¡¢¹¤Òµ»úе¹«Ë¾¡¢Æû³µÎ¬ÐÞµêºÍСÐÍ»ú³¡µÈ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://therecord.media/almost-2000-exchange-servers-hacked-using-proxyshell-exploit/


3¡¢Razer SynapseÖеÄÍâµØÌáȨ0dayÓ°ÏìÁè¼Ý1ÒÚÓû§


Razer SynapseÖеÄÍâµØÌáȨ0dayÓ°ÏìÁè¼Ý1ÒÚÓû§.jpg


Ñо¿Ö°Ô±jonhatÓÚ2021Äê8ÔÂ21ÈÕÔÚTwitterÉÏÅû¶ÁËRazer SynapseÖеÄÍâµØÌáȨ0dayµÄϸ½Ú¡£¡£¡£RazerÊÇÒ»¼ÒÅÌËã»úÍâÉèÖÆÔìÉÌ£¬£¬£¬Éù³ÆÆäRazer SynapseÒѱ»È«ÇòÁè¼Ý1ÒÚÓû§Ê¹Óᣡ£¡£ÕâÊÇÒ»¸öÍâµØÌáȨ£¨LPE£©Îó²î£¬£¬£¬½«Razer×°±¸²åÈëWindows 10ʱ£¬£¬£¬ÏµÍ³»á×Ô¶¯ÏÂÔØ²¢×°ÖÃÇý¶¯³ÌÐòºÍRazer Synapse£¬£¬£¬ÓÉÓÚRazerInstaller.exeÊÇͨ¹ýSYSTEMȨÏÞµÄWindowsÀú³ÌÆô¶¯µÄ£¬£¬£¬Òò´ËÆäÒ²»ñµÃÁËSYSTEMȨÏÞ¡£¡£¡£Ö®ºóÔÚÑ¡Ôñ×°ÖÃÎļþ¼Ðʱ£¬£¬£¬°´ÏÂShift²¢ÓÒ¼üµ¥»÷¶Ô»°¿ò£¬£¬£¬¾Í¿ÉÒÔ·­¿ªSYSTEMȨÏÞµÄPowerShell´°¿Ú¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/razer-bug-lets-you-become-a-windows-10-admin-by-plugging-in-a-mouse/


4¡¢SAM·¢Ã÷MiraiʹÓÃRealtek SDKÖÐÎó²îµÄ¹¥»÷»î¶¯


SAM·¢Ã÷MiraiʹÓÃRealtek SDKÖÐÎó²îµÄ¹¥»÷»î¶¯.jpg


Çå¾²¹«Ë¾SAM SeamlessÓÚ8ÔÂ19ÈÕ³ÆÆä·¢Ã÷Á˽©Ê¬ÍøÂçMiraiʹÓÃRealtek SDKÖÐÎó²îµÄ¹¥»÷»î¶¯¡£¡£¡£¸ÃÎó²îΪÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¬£¬£¬×·×ÙΪCVE-2021-20090£¬£¬£¬ÆÀ·ÖΪ9.8·Ö£¬£¬£¬RealtekÒÑÓÚ8ÔÂ13ÈÕÐû²¼¸ÃÎó²îµÄ²¹¶¡³ÌÐò¡£¡£¡£SAMÌåÏÖ£¬£¬£¬ËûÃÇÓÚ8ÔÂ18ÈÕÔÚÒ°·¢Ã÷ÁË´Ë´ÎÎó²îʹÓû£¬£¬£¬¹¥»÷Ô´ÓÚ31.210.20[.]100£¬£¬£¬µ«¹¥»÷ÕßµÄIPµØµã¿ÉÄÜ»áËæ×Åʱ¼ä¶ø¸Ä±ä¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securingsam.com/realtek-vulnerabilities-weaponized/


5¡¢OpenSSLÐû²¼Çå¾²¸üУ¬£¬£¬ÐÞ¸´²úÆ·ÖеÄ2¸öÇå¾²Îó²î


OpenSSL.png


OpenSSLÓÚ8ÔÂ24ÈÕÐû²¼Çå¾²¸üУ¬£¬£¬ÐÞ¸´Æä²úÆ·ÖеÄ2¸öÇå¾²Îó²î¡£¡£¡£ÆäÖÐ×îΪÑÏÖØµÄÊÇ»º³åÇøÒç³öÎó²î£¬£¬£¬×·×ÙΪCVE-2021-3711£¬£¬£¬¹¥»÷ÕßʹÓÃÆä¿Éµ¼ÖÂÓ¦ÓóÌÐòÍ߽⡣¡£¡£¸ÃÎó²îÓëSM2¼ÓÃÜÊý¾ÝµÄ½âÃÜÀú³ÌÏà¹Ø£¬£¬£¬¿ÉÓÃÀ´¸ü¸Ä¶ÑÖеÄÊý¾Ý£¨¼´Æ¾Ö¤£©¡£¡£¡£´Ë´ÎÐÞ¸´µÄÁíÒ»¸öÎó²î×·×ÙΪCVE-2021-3712£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓøÃÎó²î´¥·¢¾Ü¾øÐ§ÀÍ(DoS)£¬£¬£¬»¹¿ÉÄܵ¼ÖÂÉñÃØÐÅϢй¶£¬£¬£¬ÀýÈç˽Կ»òÃô¸ÐÃ÷ÎÄ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/121426/hacking/cve-2021-3711-openssl-flaws.html