ÐÅÏ¢°²È«Öܱ¨-2021ÄêµÚ14ÖÜ

°ä²¼¹¦·ò 2021-04-06

> ±¾Öܰ²È«Ì¬ÊÆ×ÛÊö


2021Äê03ÔÂ29ÈÕÖÁ04ÔÂ04ÈÕ¹²ÊÕ¼°²È«·ì϶56¸ö£¬£¬ÖµµÃ¹Ø×¢µÄÊÇMicrosoft Azure SphereδÊðÃû´úÂëÖ´Ðзì϶£»£»SAP Solution Manager User-Experience MonitoringÊÚȨ²é³­È±Ê§·ì϶£»£»Adobe Creative Cloud Desktop ApplicationËÁÒâÎļþдÈë·ì϶£»£»F5 BIG-IP Advanced WAF/ASM»º³åÇøÒç³ö·ì϶£»£»Schneider Electric Interactive Graphical SCADA System CGFÎļþ½âÎöÄÚ´æ·ÛËé´úÂëÖ´Ðзì϶¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇNPM¿âNetmask×é¼þ´æÔÚ·ì϶£¬£¬¿ÉÓ°ÏìÊýÍò¸öÀûÓ÷¨Ê½£»£»Ó¢¹ú¹«Ë¾FatFaceϰȾConti£¬£¬³¬¹ý200GBÊý¾Ýй¶£»£»PHP¹Ù·½Git´æ´¢¿âÔâµ½¹©¸øÁ´¹¥»÷£¬£¬´úÂë¿âÒѱ»´Û¸Ä£»£»Õë¶ÔÓ¡¶ÈµÄAPT×éÖ¯RedEchoÒÑ¹Ø±ÕÆäʹÓõĻù´¡ÉèÊ©£»£»VMwareÐÞ¸´vRealize OperationsÖеÄSSRFµÈ¶à¸ö·ì϶¡£¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬£¬±¾Öܰ²È«ÍþвΪÖС£¡£


> ÖØÒª°²È«·ì϶Áбí


1.Microsoft Azure SphereδÊðÃû´úÂëÖ´Ðзì϶


Microsoft Azure Sphere´æÔÚ°²È«·ì϶£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬¿Éʹ·þÎñ·¨Ê½±ÀÀ£»£»òÕßÒÔÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£¡£

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-27080


2.SAP Solution Manager User-Experience MonitoringÊÚȨ²é³­È±Ê§·ì϶


SAP Solution Manager User-Experience Monitoring´æÔÚÊÚȨ²é³­µÄÈ··ì϶£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬¿ÉδÊÚȨ½ÚÖÆÏµÍ³¡£¡£

https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107


3.Adobe Creative Cloud Desktop ApplicationËÁÒâÎļþдÈë·ì϶


Adobe Creative Cloud Desktop Application´æÔÚËÁÒâÎļþдÈë·ì϶£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬Äܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâºÅÁî¡£¡£

https://helpx.adobe.com/security/products/creative-cloud/apsb21-18.html


4.F5 BIG-IP Advanced WAF/ASM»º³åÇøÒç³ö·ì϶


F5 BIG-IP Advanced WAF/ASM´¦ÖöñÒâHTTPÏìÓ¦´æÔÚ»º³åÇøÒç³ö·ì϶£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»£»òÒÔÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£¡£

https://www.auscert.org.au/bulletins/ESB-2021.0872


5.Schneider Electric Interactive Graphical SCADA System CGFÎļþ½âÎöÄÚ´æ·ÛËé´úÂëÖ´Ðзì϶


Schneider Electric Interactive Graphical SCADA System CGFÎļþ½âÎö´æÔÚÄÚ´æ·ÛËé·ì϶£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÎļþÒªÇ󣬣¬ÓÕʹÓû§½âÎö£¬£¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»£»òÕßÒÔÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£¡£

https://us-cert.cisa.gov/ics/advisories/icsa-21-070-01


> ÖØÒª°²È«ÊÂÎñ×ÛÊö


1¡¢¡¢NPM¿âNetmask×é¼þ´æÔÚ·ì϶£¬£¬¿ÉÓ°ÏìÊýÍò¸öÀûÓ÷¨Ê½


1.jpg


¸Ã×é¼þÿÖÜÏÂÔØÁ¿³¬¹ý300Íò´Î£¬£¬½ØÖÁ´Ë¿ÌÀÛ¼ÆÏÂÔØÁ¿Òѳ¬¹ý2.38ÒڴΣ¬£¬Ô¼ÓÐ27.8Íò¸öGitHub´æ´¢¿âÒÀÀµÓÚnetmask¡£¡£¸Ã·ì϶±»×·×ÙΪCVE-2021-28918£¬£¬Ê®½øÖÆIPv4µØÖ·Ô̺¬Ç°µ¼Áãʱ£¬£¬ÍøÂçÑÚÂë´¦ÖûìºÏÌåʽIPµØÖ·µÄ·½Ê½¡£¡£¹¥»÷ÕßÄܹ»Í¨¹ýÓ°ÏìÀûÓ÷¨Ê½½âÎöµÄIPµØÖ·£¬£¬Ôò¸Ã·ì϶¿ÉÄÜ»áÒýÆð¸÷Àà·ì϶£¬£¬ÀýÈçµ¼Ö·þÎñÆ÷¶ËÒªÇóαÔ죨SSRF£©ºÍµ½Ô¶³ÌÎļþÔ̺¬£¨RFI£©¡£¡£Ä¿Ç°£¬£¬¸Ã·ì϶Òѱ»ÐÞ¸´¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/critical-netmask-networking-bug-impacts-thousands-of-applications/


2¡¢¡¢Ó¢¹ú¹«Ë¾FatFaceϰȾConti£¬£¬³¬¹ý200GBÊý¾Ýй¶


2.jpg


Ó¢¹ú·þ×°¹«Ë¾FatFaceÔâµ½ContiÀÕË÷Èí¼þ¹¥»÷£¬£¬³¬¹ý200GBÊý¾Ýй¶¡£¡£¹¥»÷²úÉúÔÚ2021Äê1ÔÂ17ÈÕ£¬£¬¹¥»÷Õß½Ó¼ûÁËFatFaceµÄÍøÂçºÍϵͳ£¬£¬²¢ÀÕË÷850ÍòÃÀÔª£¬£¬×îÖÕ¾­½»ÉæÊê½ðÈ·¶¨Îª200ÍòÃÀÔª¡£¡£Õâ´Îй¶µÄ¿Í»§ÐÅÏ¢Ô̺¬ÐÕÃû¡¢¡¢µç×ÓÓʼþµØÖ·¡¢¡¢ÓʼĵØÖ·ºÍ²¿ÃÅÐÅÓþ¿¨ÐÅÏ¢£¨×îºóËÄλÊý×ÖºÍÓÐЧÆÚ£©¡£¡£´ËÍ⣬£¬¸Ã¹«Ë¾ÔÚÊý¾Ýй¶֪ͨÓʼþÖÐÒªÇóÆäÊÕ¼þÈËÎñ±Ø¶Ô´ËÓʼþ¼°ÆäÖÐÔ̺¬µÄÐÅÏ¢Ñϸñ±£ÃÜ£¬£¬ÒÔ´ËÊÔͼ¸²¸ÇÊý¾Ýй¶µÄÊÂʵ£¬£¬´ËÊÂÎñÔÚÍøÉÏÒýÆðÐùÈ»´ó²¨¡£¡£    


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/fatface-sends-controversial-data-breach-email-after-ransomware-attack/


3¡¢¡¢PHP¹Ù·½Git´æ´¢¿âÔâµ½¹©¸øÁ´¹¥»÷£¬£¬´úÂë¿âÒѱ»´Û¸Ä


3.jpg


ÉÏÖÜÈÕ£¬£¬ÊØ»¤ÈËÔ±Rasmus Lerdorf·¢Ïֺڿ͹¥»÷ÁË·þÎñÆ÷git.php.net£¬£¬²¢Ôڸ÷þÎñÆ÷µÄ×ÔÍйÜphp-src´æ´¢¿âÖÐÉÏ´«ÁË2¸öδ¾­ÊÚȨµÄ¸üаü£¬£¬ÆäÖеÄÔ´´úÂë±»²åÈëÁ˰ÂÃØºóÃÅ´úÂë¡£¡£´ËÍ⣬£¬ÕâЩ¶ñÒâ´úÂëÊÇÒÔPHP´´½¨ÕßRasmus LerdorfµÄÃûÒåÌá½»µÄ¡£¡£×êÑÐÈËÔ±´§Ä¦Õâ´ÎÊÇÃûΪÒÀÀµ»ìºÏ£¨dependency confusion£©µÄÐÂÐ͹©¸øÁ´¹¥»÷·½Ê½£¬£¬ËüÀûÓÃÁËÒ»¸ö¿ÉÄÜÔ̺¬À´×Ô˽Óк͹«¹²ÆðÔ´µÄ»ìºÏÒÀÀµ¿âµÄÈí¼þ¡£¡£×÷ΪԤ·À´ëÊ©£¬£¬PHPÊØ»¤ÈËÔ±ÒѾö¶¨½«¹Ù·½PHPÔ´´úÂë´æ´¢¿âǨáãµ½GitHub¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/phps-git-server-hacked-to-add-backdoors-to-php-source-code/


4¡¢¡¢Õë¶ÔÓ¡¶ÈµÄAPT×éÖ¯RedEchoÒÑ¹Ø±ÕÆäʹÓõĻù´¡ÉèÊ©


4.jpg


APT×éÖ¯RedEchoÔÚ2Ôµױ»×êÑÐÈËÔ±Åû¶ºó£¬£¬ÒÑ¹Ø±ÕÆäʹÓõĻù´¡ÉèÊ©¡£¡£Recorded FutureµÄ°²È«ÈËÔ±ÓÚ2Ô·¢ÏÖÁ˸ÃAPT×éÖ¯£¬£¬³Æ¸ÃÍÅ»ï×Ô2020ËêÊ×¹¥»÷ÁËÓ¡¶ÈµÄÖÁÉÙ10¸öµçÁ¦²¿ÃÅ£¬£¬»¹½«Ö¸±ê¶Ô×¼Á˸ßѹÊäµç±äµçÕ¾ºÍȼú»ðÁ¦·¢µç³§¡£¡£Ôڸ÷¢ÏÖ°ä²¼¼¸Öܺ󣬣¬RedEchoÒѾ­¹Ø±ÕÁ˲¿ÃÅÓÃÓÚ½Ú֯װÖÃÔÚÖ¸±êÍøÂçÖеÄShadowPadºóÃŵĻù´¡ÉèÊ©¡£¡£×êÑÐÈËÔ±´§Ä¦£¬£¬¸ÃAPT×éÖ¯ÔÚ±»·¢ÏÖºó¿ÉÄܽ«ÆäC2×ªÒÆµ½ÁËÆäËû´¦Ëù¡£¡£    


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/116094/apt/redecho-apt-c2-shutdown.html


5¡¢¡¢VMwareÐÞ¸´vRealize OperationsÖеÄSSRFµÈ¶à¸ö·ì϶


5.jpg


VMware°ä²¼°²È«¸üУ¬£¬ÒÔÐÞ¸´VMware vRealize OperationsÖеĶà¸ö·ì϶¡£¡£Õâ´ÎÐÞ¸´µÄ×îΪÑÏÖØµÄ·ì϶ÊÇvRealize Operations Manager APIÖеķþÎñÆ÷¶ËÒªÇóαÔì·ì϶£¨CVE-2021-21975£©£¬£¬CVSSv3ÆÀ·ÖΪ8.6£¬£¬Ô¶³Ìδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÎÞÐèÓëÓû§½»»¥¼´¿ÉÀûÓô˷ì϶À´ÇÔÈ¡ÖÎÀíÍ´´¦¡£¡£´ËÍ⣬£¬»¹ÐÞ¸´ÁËËÁÒâÎļþдÈë·ì϶£¨CVE-2021-21983£©£¬£¬CVSSv3ÆÀ·ÖΪ7.2£¬£¬¹¥»÷Õß¿ÉÀûÓÃÆäÔڵײã¹â×Ó²Ù×÷ϵͳµÄËÁÒâµØÎ»Ð´ÈëÎļþ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/116145/security/vmware-vrealize-operations-ssrf-flaw.html