ÐÅÏ¢°²È«Öܱ¨-2020ÄêµÚ45ÖÜ

°ä²¼¹¦·ò 2020-11-09

> ±¾Öܰ²È«Ì¬ÊÆ×ÛÊö


2020Äê11ÔÂ02ÈÕÖÁ11ÔÂ08ÈÕ¹²ÊÕ¼°²È«·ì϶61¸ö£¬£¬ÖµµÃ¹Ø×¢µÄÊÇAdobe Acrobat Reader CVE-2020-24435¶Ñ»º³åÇøÒç³ö·ì϶£»£»£»Google Android¸ßͨ¹Ø±ÕÔ´×é¼þÔ¶³Ì´úÂëÖ´Ðзì϶£»£»£»Oracle WebLogic Server Oracle Fusion Middleware ConsoleÔ¶³Ì´úÂëÖ´Ðзì϶£»£»£»SaltStack Salt APIËÁÒâ´úÂëÖ´Ðзì϶£»£»£»Apache Shiro CVE-2020-17510ÊÚÈ¨ÈÆ¹ý·ì϶¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇHackerOne°ä²¼µÚËĽìÄê¶ÈHACKER-POWERED°²È«»ã±¨£»£»£»Pulse Secure°ä²¼ÆóÒµÍÆ¶¯ÁãÐÅÀµÍøÂçµÄ·ÖÎö»ã±¨£»£»£»Google°ä²¼°²È«¸üУ¬£¬ÐÞ¸´ChromeÖÐÒѱ»ÀûÓõÄ0day£»£»£»Ë¼¿ÆÅû¶ÆäAnyConnect¿Í»§¶ËÖÐ0day£¬£¬ÉÐÎÞÓйز¹¶¡£¡£¡£»£»£»Apple°ä²¼¸üУ¬£¬ÐÞ¸´Òѱ»»ý¼«ÀûÓõÄ3¸ö0day¡£¡£¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬£¬±¾Öܰ²È«ÍþвΪÖС£¡£¡£


ÖØÒª°²È«·ì϶Áбí


1.Adobe Acrobat Reader CVE-2020-24435¶Ñ»º³åÇøÒç³ö·ì϶


Adobe Acrobat Reader´¦ÖÃPDFÎļþ´æÔÚ»º³åÇøÒç³ö·ì϶£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÎļþÒªÇ󣬣¬ÓÕʹÓû§½âÎö£¬£¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»£»£»òÒÔÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£¡£¡£

https://helpx.adobe.com/security/products/acrobat/apsb20-67.html


2.Google Android¸ßͨ¹Ø±ÕÔ´×é¼þÔ¶³Ì´úÂëÖ´Ðзì϶


Google Android¸ßͨ¹Ø±ÕÔ´×é¼þ´æÔÚ°²È«·ì϶£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»£»£»òÒÔÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£¡£¡£

https://source.android.com/security/bulletin/2020-11-01


3.Oracle WebLogic Server Oracle Fusion Middleware ConsoleÔ¶³Ì´úÂëÖ´Ðзì϶


Oracle WebLogic Server Oracle Fusion Middleware Console´æÔÚ°²È«·ì϶£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄHTTPÒªÇ󣬣¬¿Éʹϵͳ±ÀÀ£»£»£»òÕßÒÔÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£¡£¡£

https://www.oracle.com/security-alerts/alert-cve-2020-14750.html


4.SaltStack Salt APIËÁÒâ´úÂëÖ´Ðзì϶


SaltStack Salt API´æÔÚÊäÈëÑéÖ¤·ì϶£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬¿ÉδÊÚȨ½Ó¼ûËÁÒâ´úÂë¡£¡£¡£

https://www.auscert.org.au/bulletins/ESB-2020.3863/


5.Apache Shiro CVE-2020-17510ÊÚÈ¨ÈÆ¹ý·ì϶


Apache Shiro´æÔÚÊÚÈ¨ÈÆ¹ý·ì϶£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬¿ÉδÊÚȨ½Ó¼ûÀûÓᣡ£¡£

https://lists.apache.org/thread.html/rc2cff2538b683d480426393eecf1ce8dd80e052fbef49303b4f47171%40%3Cdev.shiro.apache.org%3E


> ÖØÒª°²È«ÊÂÎñ×ÛÊö


1¡¢¡¢HackerOne°ä²¼µÚËĽìÄê¶ÈHACKER-POWERED°²È«»ã±¨


1.jpg


HackerOne°ä²¼µÚËĽìÄê¶ÈHACKER-POWERED°²È«»ã±¨£¬£¬³Æ¿çÕ¾µã¾ç±¾£¨XSS£©ÊÇ×î³£¼ûµÄ·ì϶ÀàÐÍ£¬£¬±È2019ÄêÔö³¤ÁË134%¡£¡£¡£»ã±¨ÏÔʾ£¬£¬XSS·ì϶ռÁ˻㱨µÄËùÓзì϶µÄ18%£¬£¬×ܼƻñµÃÁË420ÍòÃÀÔªµÄ½±½ð(±ÈÈ¥ÄêÔö³¤ÁË26%)¡£¡£¡£´ËÍ⣬£¬²»µ±½Ó¼û½ÚÖÆ·ì϶Ëù»ñµÃµÄ½±½ð¶î¶È±ÈÈ¥Äêͬ±ÈÔö³¤134£¥£¬£¬¸ß´ïµ½400ÍòÃÀÔª£¬£¬Æä´ÎÊÇÐÅÏ¢Åû¶·ì϶£¬£¬Í¬±ÈÔö³¤63£¥¡£¡£¡£ÕâÁ½ÖÖ·½Ê½³ÇÊÐй¶DZÔÚµÄÃô¸ÐÊý¾Ý£¬£¬ÀýÈçСÎÒÉí·ÝÐÅÏ¢¡£¡£¡£


Ô­ÎÄÁ´½Ó£º£º£º

hackerone.com/hacker-powered-security-report


2¡¢¡¢Pulse Secure°ä²¼ÆóÒµÍÆ¶¯ÁãÐÅÀµÍøÂçµÄ·ÖÎö»ã±¨


2.jpg


Pulse Secure°ä²¼ÁËÓÐ¹ØÆóÒµÍÆ¶¯ÁãÐÅÀµÍøÂçµÄ·ÖÎö»ã±¨¡£¡£¡£ÄÇÐ©ÍÆ¶¯ºÍ¹æ»®ÁãÐÅÀµÁ÷³ÌºÍ¼¼ÊõÖ´Ðз½ÏòµÄ×éÖ¯£¬£¬½«×ßÔÚÊý×ÖתÐÍÇúÏßµÄÇ°Ãæ¡£¡£¡£×êÑз¢ÏÖ£¬£¬ÁãÐÅÀµÏîÄ¿ÍùÍùÊÇ¿çѧ¿ÆµÄ£¬£¬»ã¼¯Á˰²È«ºÍÍøÂçÍŶÓ¡£¡£¡£ËûÃÇͨ³£Ê¹ÓÃÈýÖÖºÏ×÷·½Ê½£¬£¬±ðÀëÊÇЭµ÷·ÖÆçϵͳ֮¼äµÄ½Ó¼û°²È«½ÚÖÆ(48%)¡¢¡¢ÆÀ¹À½Ó¼û°²È«½ÚÖÆÐèÒª(41%)ºÍƾ¾ÝÓû§¡¢¡¢½ÇÉ«¡¢¡¢Êý¾ÝºÍÀûÓ÷¨Ê½½ç˵½Ó¼ûÐèÒª(40%)¡£¡£¡£ÆóÒµÖÎÀíЭ»á¸±×ÜShamus McGillicuddy°µÊ¾£¬£¬ÆóÒµÏÔÈ»ÕýÔÚ¼Ó¿ì²ÉÈ¡ÁãÐÅÀµÍøÂçµÄ´ëÊ©¡£¡£¡£


Ô­ÎÄÁ´½Ó£º£º£º

https://www.pulsesecure.net/resource/pulse-zero-trust-access-defense-in-depth/


3¡¢¡¢Google°ä²¼°²È«¸üУ¬£¬ÐÞ¸´ChromeÖÐÒѱ»ÀûÓõÄ0day


3.jpg


Google°ä²¼°²È«¸üУ¬£¬ÐÞ¸´ChromeÖеÄ10¸ö·ì϶£¬£¬ÆäÖÐÔ̺¬Ò»¸öÔÚÒ°ÍâÒѱ»»ý¼«ÀûÓõÄ0day¡£¡£¡£¸Ã0day±»×·×ÙΪCVE-2020-16009£¬£¬ÓÉGoogleµÄÍþв·ÖÎöС×飨TAG£©·¢ÏÖ£¬£¬µ«¸ÃС×鲢δ¹«¿ª¹ØÓڸ÷ì϶µÄ¾ßÌåÐÅÏ¢ÒÔ¼°ÀûÓ㬣¬½ö°µÊ¾¸Ã·ì϶λÓÚ´¦ÖÃJavaScript´úÂëµÄChrome×é¼þV8ÖС£¡£¡£²»¾Ãºó£¬£¬GoogleÓÖ°ä²¼ÁËAndroid°æChromeÖеÄ0dayµÄ²¹¶¡·¨Ê½£¬£¬¸Ã·ì϶±»×·×ÙΪCVE-2020-16010£¬£¬ÎªChrome for AndroidÓû§½çÃæ£¨UI£©×é¼þÖеĶѻº³åÇøÒç³ö·ì϶¡£¡£¡£


Ô­ÎÄÁ´½Ó£º£º£º

https://www.zdnet.com/article/google-patches-second-chrome-zero-day-in-two-weeks/


4¡¢¡¢Ë¼¿ÆÅû¶ÆäAnyConnect¿Í»§¶ËÖÐ0day£¬£¬ÉÐÎÞÓйز¹¶¡


4.jpg


˼¿ÆÅû¶ÆäAnyConnect¿Í»§¶ËÈí¼þµÄ0day£¬£¬Ä¿Ç°ÒÑÓй«¿ª¿ÉÓõĸÅÄîÑéÖ¤ÀûÓôúÂ룬£¬µ«ÉÐÎÞÕë¶ÔÕâ¸öËÁÒâ´úÂëÖ´Ðзì϶µÄ°²È«¸üС£¡£¡£¸Ã·ì϶±»×·×ÙΪCVE-2020-3556£¬£¬´æÔÚÓÚCisco AnyConnect ClientµÄ¹ý³Ì¼äͨѶ£¨IPC£©Í¨µÀÖУ¬£¬¾­¹ýÉí·ÝÑéÖ¤µÄ¹¥»÷Õߺͱ¾µØ¹¥»÷Õß¿ÉÀûÓø÷ì϶ִÐжñÒâ¾ç±¾¡£¡£¡£¸Ã·ì϶ӰÏìÁËWindows¡¢¡¢LinuxºÍmacOS°æ±¾µÄAnyConnect¿Í»§¶Ë£¬£¬Ö»¹ÜûÓв¹¶¡·¨Ê½£¬£¬µ«ÊÇÄܹ»Í¨¹ý½ûÓÃ×Ô¶¯¸üкÍÖÕ³¡ÆôÓþ籾ÉèÖÃÀ´»º½â¸ÃÎÊÌâ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º£º£º

https://www.bleepingcomputer.com/news/security/cisco-discloses-anyconnect-vpn-zero-day-exploit-code-available/


5¡¢¡¢Apple°ä²¼¸üУ¬£¬ÐÞ¸´Òѱ»»ý¼«ÀûÓõÄ3¸ö0day


5.jpg


AppleÐÞ¸´ÁËÆäiOS 14.2ÖеÄ3¸ö0day£¬£¬ÕâЩ·ì϶ÒÑÔÚÒ°Íâ±»»ý¼«ÀûÓò¢Ó°ÏìÁËiPhone¡¢¡¢iPadºÍiPod¡£¡£¡£Õâ´ÎÐÞ¸´µÄ·ì϶±ðÀëΪԶ³ÌÖ´ÐдúÂ루RCE£©·ì϶£¨CVE-2020-27930 £©£¬£¬FontParser¿â´¦ÖöñÒâ×ÖÌåʱÓÉÄÚ´æ°Ü»µÎÊÌâµ¼Ö£»£»£»ÄÚºËÄÚ´æÐ¹Â©·ì϶£¨CVE-2020-27950£©£¬£¬¸Ã·ì϶ÓÉÄÚ´æ³õʼ»¯ÎÊÌâÒýÆð£¬£¬ÔÊÐí¶ñÒâÀûÓýӼûÄÚºËÄڴ棻£»£»ÄÚºËÌáȨ·ì϶(CVE-2020-27932)£¬£¬ÓÉÀàÐÍ»ìºÏµ¼Ö£¬£¬¿É±»ÀûÓÃÀ´Ê¹ÓÃÄÚºËȨÏÞÖ´ÐÐËÁÒâ´úÂë¡£¡£¡£


Ô­ÎÄÁ´½Ó£º£º£º

https://www.bleepingcomputer.com/news/security/apple-patches-three-actively-exploited-ios-zero-days/