ÐÅÏ¢Çå¾²Öܱ¨-2021ÄêµÚ22ÖÜ
Ðû²¼Ê±¼ä 2021-05-31> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
2021Äê05ÔÂ24ÈÕÖÁ05ÔÂ30ÈÕ¹²ÊÕ¼Çå¾²Îó²î62¸ö£¬£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇApple Safari CVE-2021-30749ÄÚ´æ¹ýʧÒýÓôúÂëÖ´ÐÐÎó²î£»£»£»£»£»£»Google Chrome CVE-2021-30521 Autofill¶ÑÒç³öÎó²î£»£»£»£»£»£»MesaLabs AmegaViewĬÈÏCOOKIEÑéÖ¤ÈÆ¹ýÎó²î£»£»£»£»£»£»CommScope Ruckus IoT ControllerÓ²±àÂëAPIÃÜÔ¿Îó²î£»£»£»£»£»£»IBM WebSphere Exteme Scale apache synapse´úÂëÖ´ÐÐÎó²î¡£¡£¡£¡£¡£¡£¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊǵçÉÌÆ½Ì¨Mercari³ÆÆäÊܵ½Codecov¹©Ó¦Á´¹¥»÷Ó°Ï죻£»£»£»£»£»Unit 42Ðû²¼ÓйØÀÕË÷Èí¼þ¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ£»£»£»£»£»£»AppleÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´3¸öÒѱ»ÔÚҰʹÓõÄ0day£»£»£»£»£»£»Ñо¿Ö°Ô±³ÆWindows IISЧÀÍÆ÷ÖеÄÎó²î¿ÉÓ°ÏìWinRM£»£»£»£»£»£»VMwareÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´vCenterÖÐÑÏÖØµÄRCEÎó²î¡£¡£¡£¡£¡£¡£¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£¡£¡£
> Ö÷ÒªÇå¾²Îó²îÁбí
1.Apple Safari CVE-2021-30749ÄÚ´æ¹ýʧÒýÓôúÂëÖ´ÐÐÎó²î
Apple Safari±£´æÄÚ´æÆÆËðÎó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄWEBÇëÇ󣬣¬£¬£¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬£¬£¬£¬¿É¶ÔÓ¦ÓóÌÐò¾ÙÐоܾøÐ§À͹¥»÷»òÕßÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£
https://support.apple.com/en-us/HT212529
2.Google Chrome CVE-2021-30521 Autofill¶ÑÒç³öÎó²î
Google Chrome Autofill±£´æ¶ÑÒç³öÎó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄWEBÇëÇ󣬣¬£¬£¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬£¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë»ò¶ÔÓ¦ÓóÌÐò¾ÙÐоܾøÐ§À͹¥»÷¡£¡£¡£¡£¡£¡£¡£
https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop_25.html
3.MesaLabs AmegaViewĬÈÏCOOKIEÑéÖ¤ÈÆ¹ýÎó²î
MesaLabs AmegaView±£´æÄ¬ÈÏCOOKIEÎó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉδÊÚȨ»á¼ûÓ¦Óᣡ£¡£¡£¡£¡£¡£
https://us-cert.cisa.gov/ics/advisories/icsa-21-147-03
4.CommScope Ruckus IoT ControllerÓ²±àÂëAPIÃÜÔ¿Îó²î
CommScope Ruckus IoT Controller OVAÓ³ÏñÎļþ±£´æAPIÃÜÔ¿Îó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿Éͨ¹ýAPIÖ´ÐйҽÓÎļþϵͳ¡£¡£¡£¡£¡£¡£¡£
https://packetstormsecurity.com/files/162843/CommScope-Ruckus-IoT-Controller-1.7.1.0-Hard-Coded-API-Keys-Exposed.html
5.IBM WebSphere Exteme Scale apache synapse´úÂëÖ´ÐÐÎó²î
IBM WebSphere Exteme Scale apache synapseÐòÁл¯¹¤¾ß±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£
https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-ibm-websphere-extreme-scale-liberty-deployment/
> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢µçÉÌÆ½Ì¨Mercari³ÆÆäÊܵ½Codecov¹©Ó¦Á´¹¥»÷Ó°Ïì

µçÉÌÆ½Ì¨Mercari³ÆÆäÊܵ½Codecov¹©Ó¦Á´¹¥»÷µÄÓ°Ï죬£¬£¬£¬£¬£¬´ó×Ú¿Í»§ÐÅϢй¶¡£¡£¡£¡£¡£¡£¡£MercariÊÇÒ»¼ÒÈÕ±¾ÉÏÊй«Ë¾£¬£¬£¬£¬£¬£¬×èÖ¹2017Ä꣬£¬£¬£¬£¬£¬ÆäÓ¦ÓóÌÐòÔÚÈ«ÇòµÄÏÂÔØÁ¿ÒÑÁè¼Ý1ÒڴΡ£¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñй¶ÁË17085ÌõÉæ¼°¿Í»§ÕÊ»§µÄÐÅÏ¢£¬£¬£¬£¬£¬£¬°üÀ¨ÒøÐдúÂë¡¢·ÖÐдúÂë¡¢ÕʺźͳÖÓÐÈ˵ȣ»£»£»£»£»£»7966ÌõMercariºÍMerpayÏàÖúͬ°éµÄÐÅÏ¢£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Á¥Êô¹ØÏµºÍÓʼþµØµãµÈ£»£»£»£»£»£»ÒÔ¼°2615ÌõÔ±¹¤ÐÅÏ¢µÈ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/e-commerce-giant-suffers-major-data-breach-in-codecov-incident/
2¡¢Unit 42Ðû²¼ÓйØÀÕË÷Èí¼þ¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ

Unit 42Ðû²¼ÁËÓйØÀÕË÷Èí¼þ¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬ÔÚÒÑÍùµÄ¼¸ÄêÖУ¬£¬£¬£¬£¬£¬ÀÕË÷¹¥»÷»î¶¯µÄÊýÄ¿¼±¾çÉÏÉý¡£¡£¡£¡£¡£¡£¡£2020ÄêÖ§¸¶µÄƽ¾ùÊê½ðÁè¼Ý31.2ÍòÃÀÔª£¬£¬£¬£¬£¬£¬±È2019ÄêÔöÌíÁË171£¥£¬£¬£¬£¬£¬£¬µ½ÏÖÔÚΪֹ£¬£¬£¬£¬£¬£¬ÕâÒ»Êý×ÖÓÖÔöÌíÁ˽üÁ½±¶£¬£¬£¬£¬£¬£¬µÖ´ï85ÍòÃÀÔª¡£¡£¡£¡£¡£¡£¡£¶ø¹ØÓÚ´óÐÍÆóÒµ£¬£¬£¬£¬£¬£¬Êê½ð½ð¶îƽ¾ù¿¿½ü300ÍòÃÀÔª¡£¡£¡£¡£¡£¡£¡£È¥Äê×î¸ßµÄÊê½ð½ð¶î´Ó1500ÍòÃÀÔªÔöÌíµ½3000ÍòÃÀÔª£¬£¬£¬£¬£¬£¬ÏÖÔÚÄêÔò¸ß´ï5000ÍòÃÀÔª¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://unit42.paloaltonetworks.com/breaking-down-ransomware-attacks/
3¡¢AppleÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´3¸öÒѱ»ÔÚҰʹÓõÄ0day

Æ»¹ûÒѾÐû²¼ÁËÇå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ²¹3¸öÒѱ»ÔÚҰʹÓõÄmacOSºÍtvOS 0day¡£¡£¡£¡£¡£¡£¡£ÆäÖеÄÁ½¸öÊÇÄÚ´æËð»µÎó²î£¨CVE-2021-30663ºÍCVE-2021-30665£©£¬£¬£¬£¬£¬£¬Ó°ÏìÁËApple TV 4KºÍApple TV HD×°±¸¡£¡£¡£¡£¡£¡£¡£µÚÈý¸öÊÇTCC¿ò¼ÜÖеÄÌáȨÎó²î£¬£¬£¬£¬£¬£¬Ó°ÏìÁËmacOS Big Sur×°±¸£¬£¬£¬£¬£¬£¬ÏÖÒѱ»XCSSET¶ñÒâÈí¼þÓÃÀ´ÈƹýmacOSÒþ˽±£»£»£»£»£»£»¤¡£¡£¡£¡£¡£¡£¡£±¾Ô³õ£¬£¬£¬£¬£¬£¬Apple»¹ÐÞ¸´ÁËWebkitÒýÇæÖеÄÁ½¸öiOS 0day¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/apple-fixes-three-zero-days-one-abused-by-xcsset-macos-malware/
4¡¢Ñо¿Ö°Ô±³ÆWindows IISЧÀÍÆ÷ÖеÄÎó²î¿ÉÓ°ÏìWinRM

Ñо¿Ö°Ô±im DeVries³ÆWindows IISЧÀÍÆ÷ÖеÄÎó²î¿ÉÓ°ÏìWinRM¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÊÇWindows IISЧÀÍÆ÷ʹÓõÄHTTPÐÒéÕ»£¨http.sys£©ÖеÄÔ¶³ÌÖ´ÐдúÂëÎó²î£¬£¬£¬£¬£¬£¬±»×·×ÙΪCVE-2021-31166£¬£¬£¬£¬£¬£¬ÒÑͨ¹ýMicrosoftÐû²¼µÄ5Ô·ÝÇå¾²¸üÐÂÐÞ¸´¡£¡£¡£¡£¡£¡£¡£ÉÏÖÜÄ©£¬£¬£¬£¬£¬£¬Axel SouchetÐû²¼Á˸ÃÎó²îµÄPoC£¬£¬£¬£¬£¬£¬¿ÉʹÓÃÌØÖÆµÄÊý¾Ý°üµ¼ÖÂÀ¶ÆÁËÀ»ú¡£¡£¡£¡£¡£¡£¡£¿ÉÊÇ£¬£¬£¬£¬£¬£¬Jim DeVries·¢Ã÷Ëü»¹»áÓ°ÏìÔËÐÐÁËWinRMЧÀÍ£¨WindowsÔ¶³ÌÖÎÀí£©µÄWindows 10ϵͳºÍЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¡£Will Dormann³Æ£¬£¬£¬£¬£¬£¬ÓÐÁè¼Ý200Íò¸öWinRMЧÀÍ̻¶µÄWindowsϵͳ¿ÉÒÔͨ¹ýInternet»á¼û¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/118189/security/cve-2021-31166-windows-http-flaw.html
5¡¢VMwareÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´vCenterÖÐÑÏÖØµÄRCEÎó²î

VMwareÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´vCenterÖÐÑÏÖØµÄÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©Îó²î¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î±»×·×ÙΪCVE-2021-21985£¬£¬£¬£¬£¬£¬CVSSv3ÆÀ·ÖΪ9.8£¬£¬£¬£¬£¬£¬Ó°ÏìÁËvCenter Server 6.5¡¢6.7ºÍ7.0¡£¡£¡£¡£¡£¡£¡£Îó²îÊÇÓÉÓÚVirtual SANÔËÐÐ״̬¼ì²é²å¼þÖÐȱÉÙÊäÈëÑéÖ¤µ¼Öµģ¬£¬£¬£¬£¬£¬¾ßÓÐ443¶Ë¿Ú»á¼ûȨµÄ¹¥»÷Õß¿ÉÒÔʹÓÃÆäÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£¡£¡£VMware³Æ£¬£¬£¬£¬£¬£¬ËùÓÐvCenter Server£¬£¬£¬£¬£¬£¬ÎÞÂÛÆäÊÇ·ñʹÓÃvSAN£¬£¬£¬£¬£¬£¬¶¼Ä¬ÈÏÆôÓÃÁËVirtual SANÔËÐÐ״̬¼ì²é²å¼þ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/vmware-warns-of-critical-bug-affecting-all-vcenter-server-installs/


¾©¹«Íø°²±¸11010802024551ºÅ