ÐÅÏ¢Çå¾²Öܱ¨-2021ÄêµÚ22ÖÜ

Ðû²¼Ê±¼ä 2021-05-31

> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö


2021Äê05ÔÂ24ÈÕÖÁ05ÔÂ30ÈÕ¹²ÊÕ¼Çå¾²Îó²î62¸ö£¬£¬£¬ £¬ £¬£¬ÖµµÃ¹Ø×¢µÄÊÇApple Safari CVE-2021-30749ÄÚ´æ¹ýʧÒýÓôúÂëÖ´ÐÐÎó²î£»£»£»£»Google Chrome CVE-2021-30521 Autofill¶ÑÒç³öÎó²î£»£»£»£»MesaLabs AmegaViewĬÈÏCOOKIEÑéÖ¤ÈÆ¹ýÎó²î£»£»£»£»CommScope Ruckus IoT ControllerÓ²±àÂëAPIÃÜÔ¿Îó²î£»£»£»£»IBM WebSphere Exteme Scale apache synapse´úÂëÖ´ÐÐÎó²î¡£¡£ ¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊǵçÉÌÆ½Ì¨Mercari³ÆÆäÊܵ½Codecov¹©Ó¦Á´¹¥»÷Ó°Ï죻£»£»£»Unit 42Ðû²¼ÓйØÀÕË÷Èí¼þ¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ£»£»£»£»AppleÐû²¼Çå¾²¸üУ¬£¬£¬ £¬ £¬£¬ÐÞ¸´3¸öÒѱ»ÔÚҰʹÓõÄ0day£»£»£»£»Ñо¿Ö°Ô±³ÆWindows IISЧÀÍÆ÷ÖеÄÎó²î¿ÉÓ°ÏìWinRM£»£»£»£»VMwareÐû²¼Çå¾²¸üУ¬£¬£¬ £¬ £¬£¬ÐÞ¸´vCenterÖÐÑÏÖØµÄRCEÎó²î¡£¡£ ¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬ £¬ £¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£ ¡£¡£


> Ö÷ÒªÇå¾²Îó²îÁбí


1.Apple Safari CVE-2021-30749ÄÚ´æ¹ýʧÒýÓôúÂëÖ´ÐÐÎó²î


Apple Safari±£´æÄÚ´æÆÆËðÎó²î£¬£¬£¬ £¬ £¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄWEBÇëÇ󣬣¬£¬ £¬ £¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬ £¬ £¬£¬¿É¶ÔÓ¦ÓóÌÐò¾ÙÐоܾøÐ§À͹¥»÷»òÕßÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£ ¡£¡£

https://support.apple.com/en-us/HT212529


2.Google Chrome CVE-2021-30521 Autofill¶ÑÒç³öÎó²î


Google Chrome Autofill±£´æ¶ÑÒç³öÎó²î£¬£¬£¬ £¬ £¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄWEBÇëÇ󣬣¬£¬ £¬ £¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬ £¬ £¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë»ò¶ÔÓ¦ÓóÌÐò¾ÙÐоܾøÐ§À͹¥»÷¡£¡£ ¡£¡£

https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop_25.html


3.MesaLabs AmegaViewĬÈÏCOOKIEÑéÖ¤ÈÆ¹ýÎó²î


MesaLabs AmegaView±£´æÄ¬ÈÏCOOKIEÎó²î£¬£¬£¬ £¬ £¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬ £¬ £¬£¬¿ÉδÊÚȨ»á¼ûÓ¦Óᣡ£ ¡£¡£

https://us-cert.cisa.gov/ics/advisories/icsa-21-147-03


4.CommScope Ruckus IoT ControllerÓ²±àÂëAPIÃÜÔ¿Îó²î


CommScope Ruckus IoT Controller OVAÓ³ÏñÎļþ±£´æAPIÃÜÔ¿Îó²î£¬£¬£¬ £¬ £¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬ £¬ £¬£¬¿Éͨ¹ýAPIÖ´ÐйҽÓÎļþϵͳ¡£¡£ ¡£¡£

https://packetstormsecurity.com/files/162843/CommScope-Ruckus-IoT-Controller-1.7.1.0-Hard-Coded-API-Keys-Exposed.html


5.IBM WebSphere Exteme Scale apache synapse´úÂëÖ´ÐÐÎó²î


IBM WebSphere Exteme Scale apache synapseÐòÁл¯¹¤¾ß±£´æÇå¾²Îó²î£¬£¬£¬ £¬ £¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬ £¬ £¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£ ¡£¡£

https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-ibm-websphere-extreme-scale-liberty-deployment/


> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢µçÉÌÆ½Ì¨Mercari³ÆÆäÊܵ½Codecov¹©Ó¦Á´¹¥»÷Ó°Ïì


1.jpg


µçÉÌÆ½Ì¨Mercari³ÆÆäÊܵ½Codecov¹©Ó¦Á´¹¥»÷µÄÓ°Ï죬£¬£¬ £¬ £¬£¬´ó×Ú¿Í»§ÐÅϢй¶¡£¡£ ¡£¡£MercariÊÇÒ»¼ÒÈÕ±¾ÉÏÊй«Ë¾£¬£¬£¬ £¬ £¬£¬×èÖ¹2017Ä꣬£¬£¬ £¬ £¬£¬ÆäÓ¦ÓóÌÐòÔÚÈ«ÇòµÄÏÂÔØÁ¿ÒÑÁè¼Ý1ÒڴΡ£¡£ ¡£¡£´Ë´ÎÊÂÎñй¶ÁË17085ÌõÉæ¼°¿Í»§ÕÊ»§µÄÐÅÏ¢£¬£¬£¬ £¬ £¬£¬°üÀ¨ÒøÐдúÂë¡¢·ÖÐдúÂë¡¢ÕʺźͳÖÓÐÈ˵ȣ»£»£»£»7966ÌõMercariºÍMerpayÏàÖúͬ°éµÄÐÅÏ¢£¬£¬£¬ £¬ £¬£¬°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Á¥Êô¹ØÏµºÍÓʼþµØµãµÈ£»£»£»£»ÒÔ¼°2615ÌõÔ±¹¤ÐÅÏ¢µÈ¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/e-commerce-giant-suffers-major-data-breach-in-codecov-incident/


2¡¢Unit 42Ðû²¼ÓйØÀÕË÷Èí¼þ¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ


2.jpg


Unit 42Ðû²¼ÁËÓйØÀÕË÷Èí¼þ¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£ ¡£¡£±¨¸æÖ¸³ö£¬£¬£¬ £¬ £¬£¬ÔÚÒÑÍùµÄ¼¸ÄêÖУ¬£¬£¬ £¬ £¬£¬ÀÕË÷¹¥»÷»î¶¯µÄÊýÄ¿¼±¾çÉÏÉý¡£¡£ ¡£¡£2020ÄêÖ§¸¶µÄƽ¾ùÊê½ðÁè¼Ý31.2ÍòÃÀÔª£¬£¬£¬ £¬ £¬£¬±È2019ÄêÔöÌíÁË171£¥£¬£¬£¬ £¬ £¬£¬µ½ÏÖÔÚΪֹ£¬£¬£¬ £¬ £¬£¬ÕâÒ»Êý×ÖÓÖÔöÌíÁ˽üÁ½±¶£¬£¬£¬ £¬ £¬£¬µÖ´ï85ÍòÃÀÔª¡£¡£ ¡£¡£¶ø¹ØÓÚ´óÐÍÆóÒµ£¬£¬£¬ £¬ £¬£¬Êê½ð½ð¶îƽ¾ù¿¿½ü300ÍòÃÀÔª¡£¡£ ¡£¡£È¥Äê×î¸ßµÄÊê½ð½ð¶î´Ó1500ÍòÃÀÔªÔöÌíµ½3000ÍòÃÀÔª£¬£¬£¬ £¬ £¬£¬ÏÖÔÚÄêÔò¸ß´ï5000ÍòÃÀÔª¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://unit42.paloaltonetworks.com/breaking-down-ransomware-attacks/


3¡¢AppleÐû²¼Çå¾²¸üУ¬£¬£¬ £¬ £¬£¬ÐÞ¸´3¸öÒѱ»ÔÚҰʹÓõÄ0day


3.jpg


Æ»¹ûÒѾ­Ðû²¼ÁËÇå¾²¸üУ¬£¬£¬ £¬ £¬£¬ÐÞ²¹3¸öÒѱ»ÔÚҰʹÓõÄmacOSºÍtvOS 0day¡£¡£ ¡£¡£ÆäÖеÄÁ½¸öÊÇÄÚ´æËð»µÎó²î£¨CVE-2021-30663ºÍCVE-2021-30665£©£¬£¬£¬ £¬ £¬£¬Ó°ÏìÁËApple TV 4KºÍApple TV HD×°±¸¡£¡£ ¡£¡£µÚÈý¸öÊÇTCC¿ò¼ÜÖеÄÌáȨÎó²î£¬£¬£¬ £¬ £¬£¬Ó°ÏìÁËmacOS Big Sur×°±¸£¬£¬£¬ £¬ £¬£¬ÏÖÒѱ»XCSSET¶ñÒâÈí¼þÓÃÀ´ÈƹýmacOSÒþ˽±£»£»£»£»¤¡£¡£ ¡£¡£±¾Ô³õ£¬£¬£¬ £¬ £¬£¬Apple»¹ÐÞ¸´ÁËWebkitÒýÇæÖеÄÁ½¸öiOS 0day¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/apple-fixes-three-zero-days-one-abused-by-xcsset-macos-malware/


4¡¢Ñо¿Ö°Ô±³ÆWindows IISЧÀÍÆ÷ÖеÄÎó²î¿ÉÓ°ÏìWinRM


4.jpg


Ñо¿Ö°Ô±im DeVries³ÆWindows IISЧÀÍÆ÷ÖеÄÎó²î¿ÉÓ°ÏìWinRM¡£¡£ ¡£¡£¸ÃÎó²îÊÇWindows IISЧÀÍÆ÷ʹÓõÄHTTPЭÒéÕ»£¨http.sys£©ÖеÄÔ¶³ÌÖ´ÐдúÂëÎó²î£¬£¬£¬ £¬ £¬£¬±»×·×ÙΪCVE-2021-31166£¬£¬£¬ £¬ £¬£¬ÒÑͨ¹ýMicrosoftÐû²¼µÄ5Ô·ÝÇå¾²¸üÐÂÐÞ¸´¡£¡£ ¡£¡£ÉÏÖÜÄ©£¬£¬£¬ £¬ £¬£¬Axel SouchetÐû²¼Á˸ÃÎó²îµÄPoC£¬£¬£¬ £¬ £¬£¬¿ÉʹÓÃÌØÖÆµÄÊý¾Ý°üµ¼ÖÂÀ¶ÆÁËÀ»ú¡£¡£ ¡£¡£¿ÉÊÇ£¬£¬£¬ £¬ £¬£¬Jim DeVries·¢Ã÷Ëü»¹»áÓ°ÏìÔËÐÐÁËWinRMЧÀÍ£¨WindowsÔ¶³ÌÖÎÀí£©µÄWindows 10ϵͳºÍЧÀÍÆ÷¡£¡£ ¡£¡£Will Dormann³Æ£¬£¬£¬ £¬ £¬£¬ÓÐÁè¼Ý200Íò¸öWinRMЧÀÍ̻¶µÄWindowsϵͳ¿ÉÒÔͨ¹ýInternet»á¼û¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/118189/security/cve-2021-31166-windows-http-flaw.html


5¡¢VMwareÐû²¼Çå¾²¸üУ¬£¬£¬ £¬ £¬£¬ÐÞ¸´vCenterÖÐÑÏÖØµÄRCEÎó²î


5.jpg


VMwareÐû²¼Çå¾²¸üУ¬£¬£¬ £¬ £¬£¬ÐÞ¸´vCenterÖÐÑÏÖØµÄÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©Îó²î¡£¡£ ¡£¡£¸ÃÎó²î±»×·×ÙΪCVE-2021-21985£¬£¬£¬ £¬ £¬£¬CVSSv3ÆÀ·ÖΪ9.8£¬£¬£¬ £¬ £¬£¬Ó°ÏìÁËvCenter Server 6.5¡¢6.7ºÍ7.0¡£¡£ ¡£¡£Îó²îÊÇÓÉÓÚVirtual SANÔËÐÐ״̬¼ì²é²å¼þÖÐȱÉÙÊäÈëÑéÖ¤µ¼ÖµÄ£¬£¬£¬ £¬ £¬£¬¾ßÓÐ443¶Ë¿Ú»á¼ûȨµÄ¹¥»÷Õß¿ÉÒÔʹÓÃÆäÖ´ÐÐí§ÒâÏÂÁî¡£¡£ ¡£¡£VMware³Æ£¬£¬£¬ £¬ £¬£¬ËùÓÐvCenter Server£¬£¬£¬ £¬ £¬£¬ÎÞÂÛÆäÊÇ·ñʹÓÃvSAN£¬£¬£¬ £¬ £¬£¬¶¼Ä¬ÈÏÆôÓÃÁËVirtual SANÔËÐÐ״̬¼ì²é²å¼þ¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/vmware-warns-of-critical-bug-affecting-all-vcenter-server-installs/