ÐÅÏ¢Çå¾²Öܱ¨-2021ÄêµÚ14ÖÜ

Ðû²¼Ê±¼ä 2021-04-06

> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö


2021Äê03ÔÂ29ÈÕÖÁ04ÔÂ04ÈÕ¹²ÊÕ¼Çå¾²Îó²î56¸ö£¬£¬£¬£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇMicrosoft Azure SphereδÊðÃû´úÂëÖ´ÐÐÎó²î£»£»£» £»SAP Solution Manager User-Experience MonitoringÊÚȨ¼ì²éȱʧÎó²î£»£»£» £»Adobe Creative Cloud Desktop Applicationí§ÒâÎļþдÈëÎó²î£»£»£» £»F5 BIG-IP Advanced WAF/ASM»º³åÇøÒç³öÎó²î£»£»£» £»Schneider Electric Interactive Graphical SCADA System CGFÎļþÆÊÎöÄÚ´æÆÆËð´úÂëÖ´ÐÐÎó²î¡£¡£¡£¡£¡£¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇNPM¿âNetmask×é¼þ±£´æÎó²î£¬£¬£¬£¬£¬£¬£¬£¬¿ÉÓ°ÏìÊýÍò¸öÓ¦ÓóÌÐò£»£»£» £»Ó¢¹ú¹«Ë¾FatFaceѬȾConti£¬£¬£¬£¬£¬£¬£¬£¬Áè¼Ý200GBÊý¾Ýй¶£»£»£» £»PHP¹Ù·½Git´æ´¢¿âÔâµ½¹©Ó¦Á´¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬´úÂë¿âÒѱ»¸Ä¶¯£»£»£» £»Õë¶ÔÓ¡¶ÈµÄAPT×éÖ¯RedEchoÒÑ¹Ø±ÕÆäʹÓõĻù´¡ÉèÊ©£»£»£» £»VMwareÐÞ¸´vRealize OperationsÖеÄSSRFµÈ¶à¸öÎó²î¡£¡£¡£¡£¡£¡£¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£¡£¡£¡£


> Ö÷ÒªÇå¾²Îó²îÁбí


1.Microsoft Azure SphereδÊðÃû´úÂëÖ´ÐÐÎó²î


Microsoft Azure Sphere±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬£¬¿ÉʹЧÀͳÌÐò±ÀÀ£»£»£» £»òÕßÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£¡£

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-27080


2.SAP Solution Manager User-Experience MonitoringÊÚȨ¼ì²éȱʧÎó²î


SAP Solution Manager User-Experience Monitoring±£´æÊÚȨ¼ì²éȷʵÎó²î£¬£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬£¬¿ÉδÊÚȨ¿ØÖÆÏµÍ³¡£¡£¡£¡£¡£¡£¡£¡£

https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107


3.Adobe Creative Cloud Desktop Applicationí§ÒâÎļþдÈëÎó²î


Adobe Creative Cloud Desktop Application±£´æí§ÒâÎļþдÈëÎó²î£¬£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£¡£¡£¡£

https://helpx.adobe.com/security/products/creative-cloud/apsb21-18.html


4.F5 BIG-IP Advanced WAF/ASM»º³åÇøÒç³öÎó²î


F5 BIG-IP Advanced WAF/ASM´¦Öóͷ£¶ñÒâHTTPÏìÓ¦±£´æ»º³åÇøÒç³öÎó²î£¬£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£» £»òÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£¡£

https://www.auscert.org.au/bulletins/ESB-2021.0872


5.Schneider Electric Interactive Graphical SCADA System CGFÎļþÆÊÎöÄÚ´æÆÆËð´úÂëÖ´ÐÐÎó²î


Schneider Electric Interactive Graphical SCADA System CGFÎļþÆÊÎö±£´æÄÚ´æÆÆËðÎó²î£¬£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇ󣬣¬£¬£¬£¬£¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬£¬£¬£¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£» £»òÕßÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£¡£

https://us-cert.cisa.gov/ics/advisories/icsa-21-070-01


> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢NPM¿âNetmask×é¼þ±£´æÎó²î£¬£¬£¬£¬£¬£¬£¬£¬¿ÉÓ°ÏìÊýÍò¸öÓ¦ÓóÌÐò


1.jpg


¸Ã×é¼þÿÖÜÏÂÔØÁ¿Áè¼Ý300Íò´Î£¬£¬£¬£¬£¬£¬£¬£¬×èÖ¹ÏÖÔÚÀÛ¼ÆÏÂÔØÁ¿ÒÑÁè¼Ý2.38ÒڴΣ¬£¬£¬£¬£¬£¬£¬£¬Ô¼ÓÐ27.8Íò¸öGitHub´æ´¢¿âÒÀÀµÓÚnetmask¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î±»×·×ÙΪCVE-2021-28918£¬£¬£¬£¬£¬£¬£¬£¬Ê®½øÖÆIPv4µØµã°üÀ¨Ç°µ¼Áãʱ£¬£¬£¬£¬£¬£¬£¬£¬ÍøÂçÑÚÂë´¦Öóͷ£»ì¼°ÃûÌÃIPµØµãµÄ·½·¨¡£¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÒÔͨ¹ýÓ°ÏìÓ¦ÓóÌÐòÆÊÎöµÄIPµØµã£¬£¬£¬£¬£¬£¬£¬£¬Ôò¸ÃÎó²î¿ÉÄÜ»áÒýÆðÖÖÖÖÎó²î£¬£¬£¬£¬£¬£¬£¬£¬ÀýÈçµ¼ÖÂЧÀÍÆ÷¶ËÇëÇóαÔ죨SSRF£©ºÍµ½Ô¶³ÌÎļþ°üÀ¨£¨RFI£©¡£¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÒѱ»ÐÞ¸´¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/critical-netmask-networking-bug-impacts-thousands-of-applications/


2¡¢Ó¢¹ú¹«Ë¾FatFaceѬȾConti£¬£¬£¬£¬£¬£¬£¬£¬Áè¼Ý200GBÊý¾Ýй¶


2.jpg


Ó¢¹ú´ò°ç¹«Ë¾FatFaceÔâµ½ContiÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬Áè¼Ý200GBÊý¾Ýй¶¡£¡£¡£¡£¡£¡£¡£¡£¹¥»÷±¬·¢ÔÚ2021Äê1ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß»á¼ûÁËFatFaceµÄÍøÂçºÍϵͳ£¬£¬£¬£¬£¬£¬£¬£¬²¢ÀÕË÷850ÍòÃÀÔª£¬£¬£¬£¬£¬£¬£¬£¬×îÖÕ¾­Ì¸ÅÐÊê½ðÈ·¶¨Îª200ÍòÃÀÔª¡£¡£¡£¡£¡£¡£¡£¡£´Ë´Îй¶µÄ¿Í»§ÐÅÏ¢°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢ÓʼĵصãºÍ²¿·ÖÐÅÓÿ¨ÐÅÏ¢£¨×îºóËÄλÊý×ÖºÍÓÐÓÃÆÚ£©¡£¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÔÚÊý¾Ýй¶֪ͨÓʼþÖÐÒªÇóÆäÊÕ¼þÈËÎñ±Ø¶Ô´ËÓʼþ¼°ÆäÖаüÀ¨µÄÐÅÏ¢ÑϿᱣÃÜ£¬£¬£¬£¬£¬£¬£¬£¬ÒÔ´ËÊÔͼÑÚÊÎÊý¾Ýй¶µÄÊÂʵ£¬£¬£¬£¬£¬£¬£¬£¬´ËÊÂÎñÔÚÍøÉÏÒýÆðÐùÈ»´ó²¨¡£¡£¡£¡£¡£¡£¡£¡£    


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/fatface-sends-controversial-data-breach-email-after-ransomware-attack/


3¡¢PHP¹Ù·½Git´æ´¢¿âÔâµ½¹©Ó¦Á´¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬´úÂë¿âÒѱ»¸Ä¶¯


3.jpg


ÉÏÖÜÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Î¬»¤Ö°Ô±Rasmus Lerdorf·¢Ã÷ºÚ¿Í¹¥»÷ÁËЧÀÍÆ÷git.php.net£¬£¬£¬£¬£¬£¬£¬£¬²¢ÔÚ¸ÃЧÀÍÆ÷µÄ×ÔÍйÜphp-src´æ´¢¿âÖÐÉÏ´«ÁË2¸öδ¾­ÊÚȨµÄ¸üаü£¬£¬£¬£¬£¬£¬£¬£¬ÆäÖеÄÔ´´úÂë±»²åÈëÁËÉñÃØºóÃÅ´úÂë¡£¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬£¬ÕâЩ¶ñÒâ´úÂëÊÇÒÔPHP½¨ÉèÕßRasmus LerdorfµÄÃûÒåÌá½»µÄ¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÍƲâ´Ë´ÎÊÇÃûΪÒÀÀµ»ìÏý£¨dependency confusion£©µÄÐÂÐ͹©Ó¦Á´¹¥»÷·½·¨£¬£¬£¬£¬£¬£¬£¬£¬ËüʹÓÃÁËÒ»¸ö¿ÉÄܰüÀ¨À´×Ô˽Óк͹«¹²ÈªÔ´µÄ»ìÏýÒÀÀµ¿âµÄÈí¼þ¡£¡£¡£¡£¡£¡£¡£¡£×÷ΪԤ·À²½·¥£¬£¬£¬£¬£¬£¬£¬£¬PHPά»¤Ö°Ô±ÒѾöÒ齫¹Ù·½PHPÔ´´úÂë´æ´¢¿âǨáãµ½GitHub¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/phps-git-server-hacked-to-add-backdoors-to-php-source-code/


4¡¢Õë¶ÔÓ¡¶ÈµÄAPT×éÖ¯RedEchoÒÑ¹Ø±ÕÆäʹÓõĻù´¡ÉèÊ©


4.jpg


APT×éÖ¯RedEchoÔÚ2ÔÂβ±»Ñо¿Ö°Ô±Åû¶ºó£¬£¬£¬£¬£¬£¬£¬£¬ÒÑ¹Ø±ÕÆäʹÓõĻù´¡ÉèÊ©¡£¡£¡£¡£¡£¡£¡£¡£Recorded FutureµÄÇå¾²Ö°Ô±ÓÚ2Ô·¢Ã÷Á˸ÃAPT×éÖ¯£¬£¬£¬£¬£¬£¬£¬£¬³Æ¸ÃÍÅ»ï×Ô2020ÄêÍ·¹¥»÷ÁËÓ¡¶ÈµÄÖÁÉÙ10¸öµçÁ¦²¿·Ö£¬£¬£¬£¬£¬£¬£¬£¬»¹½«Ä¿µÄÃé×¼Á˸ßѹÊäµç±äµçÕ¾ºÍȼú»ðÁ¦·¢µç³§¡£¡£¡£¡£¡£¡£¡£¡£Ôڸ÷¢Ã÷Ðû²¼¼¸Öܺ󣬣¬£¬£¬£¬£¬£¬£¬RedEchoÒѾ­¹Ø±ÕÁ˲¿·ÖÓÃÓÚ¿ØÖÆ×°ÖÃÔÚÄ¿µÄÍøÂçÖеÄShadowPadºóÃŵĻù´¡ÉèÊ©¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÍƲ⣬£¬£¬£¬£¬£¬£¬£¬¸ÃAPT×éÖ¯ÔÚ±»·¢Ã÷ºó¿ÉÄܽ«ÆäC2×ªÒÆµ½ÁËÆäËûµØ·½¡£¡£¡£¡£¡£¡£¡£¡£    


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/116094/apt/redecho-apt-c2-shutdown.html


5¡¢VMwareÐÞ¸´vRealize OperationsÖеÄSSRFµÈ¶à¸öÎó²î


5.jpg


VMwareÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬£¬ÒÔÐÞ¸´VMware vRealize OperationsÖеĶà¸öÎó²î¡£¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄ×îΪÑÏÖØµÄÎó²îÊÇvRealize Operations Manager APIÖеÄЧÀÍÆ÷¶ËÇëÇóαÔìÎó²î£¨CVE-2021-21975£©£¬£¬£¬£¬£¬£¬£¬£¬CVSSv3ÆÀ·ÖΪ8.6£¬£¬£¬£¬£¬£¬£¬£¬Ô¶³Ìδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÎÞÐèÓëÓû§½»»¥¼´¿ÉʹÓôËÎó²îÀ´ÇÔÈ¡ÖÎÀíÆ¾Ö¤¡£¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬£¬»¹ÐÞ¸´ÁËí§ÒâÎļþдÈëÎó²î£¨CVE-2021-21983£©£¬£¬£¬£¬£¬£¬£¬£¬CVSSv3ÆÀ·ÖΪ7.2£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓÃÆäÔڵײã¹â×Ó²Ù×÷ϵͳµÄí§ÒâλÖÃдÈëÎļþ¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/116145/security/vmware-vrealize-operations-ssrf-flaw.html