ÐÅÏ¢Äþ¾²Öܱ¨-2020ÄêµÚ45ÖÜ
Ðû²¼Ê±¼ä 2020-11-09> ±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö
2020Äê11ÔÂ02ÈÕÖÁ11ÔÂ08ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´61¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇAdobe Acrobat Reader CVE-2020-24435¶Ñ»º³åÇøÒç³ö©¶´£»Google Android¸ßͨ¹Ø±ÕÔ´×é¼þÔ¶³Ì´úÂëÖ´ÐЩ¶´£»Oracle WebLogic Server Oracle Fusion Middleware ConsoleÔ¶³Ì´úÂëÖ´ÐЩ¶´£»SaltStack Salt APIÈÎÒâ´úÂëÖ´ÐЩ¶´£»Apache Shiro CVE-2020-17510ÊÚȨÈƹý©¶´¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇHackerOneÐû²¼µÚËĽìÄê¶ÈHACKER-POWEREDÄþ¾²³ÂËߣ»Pulse SecureÐû²¼ÆóÒµÍƽøÁãÐÅÈÎÍøÂçµÄ·ÖÎö³ÂËߣ»GoogleÐû²¼Äþ¾²¸üУ¬ÐÞ¸´ChromeÖÐÒѱ»ÀûÓõÄ0day£»Ë¼¿ÆÅû¶ÆäAnyConnect¿Í»§¶ËÖÐ0day£¬ÉÐÎÞÏà¹Ø²¹¶¡£»AppleÐû²¼¸üУ¬ÐÞ¸´Òѱ»»ý¼«ÀûÓõÄ3¸ö0day¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖС£
> ÖØÒªÄþ¾²Â©¶´Áбí
1.Adobe Acrobat Reader CVE-2020-24435¶Ñ»º³åÇøÒç³ö©¶´
Adobe Acrobat Reader´¦ÖÃPDFÎļþ´æÔÚ»º³åÇøÒç³ö©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÎļþÇëÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£
https://helpx.adobe.com/security/products/acrobat/apsb20-67.html
2.Google Android¸ßͨ¹Ø±ÕÔ´×é¼þÔ¶³Ì´úÂëÖ´ÐЩ¶´
Google Android¸ßͨ¹Ø±ÕÔ´×é¼þ´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£
https://source.android.com/security/bulletin/2020-11-01
3.Oracle WebLogic Server Oracle Fusion Middleware ConsoleÔ¶³Ì´úÂëÖ´ÐЩ¶´
Oracle WebLogic Server Oracle Fusion Middleware Console´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄHTTPÇëÇ󣬿Éʹϵͳ±ÀÀ£»òÕßÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£
https://www.oracle.com/security-alerts/alert-cve-2020-14750.html
4.SaltStack Salt APIÈÎÒâ´úÂëÖ´ÐЩ¶´
SaltStack Salt API´æÔÚÊäÈëÑé֤©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉδÊÚȨ·ÃÎÊÈÎÒâ´úÂë¡£
https://www.auscert.org.au/bulletins/ESB-2020.3863/
5.Apache Shiro CVE-2020-17510ÊÚȨÈƹý©¶´
Apache Shiro´æÔÚÊÚȨÈƹý©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉδÊÚȨ·ÃÎÊÓ¦Óá£
https://lists.apache.org/thread.html/rc2cff2538b683d480426393eecf1ce8dd80e052fbef49303b4f47171%40%3Cdev.shiro.apache.org%3E
> ÖØÒªÄþ¾²Ê¼þ×ÛÊö
1¡¢HackerOneÐû²¼µÚËĽìÄê¶ÈHACKER-POWEREDÄþ¾²³ÂËß
HackerOneÐû²¼µÚËĽìÄê¶ÈHACKER-POWEREDÄþ¾²³ÂËߣ¬³Æ¿çÕ¾µã½Å±¾£¨XSS£©ÊÇ×î³£¼ûµÄ©¶´ÀàÐÍ£¬±È2019ÄêÔö¼ÓÁË134%¡£³ÂËßÏÔʾ£¬XSS©¶´Õ¼Á˳ÂËßµÄËùÓЩ¶´µÄ18%£¬×ܼƻñµÃÁË420ÍòÃÀÔªµÄ½±½ð(±ÈÈ¥ÄêÔö¼ÓÁË26%)¡£´ËÍ⣬²»Í×·ÃÎÊ¿ØÖÆ©¶´Ëù»ñµÃµÄ½±½ð¶î¶È±ÈÈ¥Äêͬ±ÈÔö³¤134£¥£¬¸ßµ½´ï400ÍòÃÀÔª£¬Æä´ÎÊÇÐÅÏ¢Åû¶©¶´£¬Í¬±ÈÔö³¤63£¥¡£ÕâÁ½ÖÖ·½Ê½¶¼ÊÐй¶DZÔÚµÄÃô¸ÐÊý¾Ý£¬ÀýÈç¸öÈËÉí·ÝÐÅÏ¢¡£
ÔÎÄÁ´½Ó£º
hackerone.com/hacker-powered-security-report
2¡¢Pulse SecureÐû²¼ÆóÒµÍƽøÁãÐÅÈÎÍøÂçµÄ·ÖÎö³ÂËß
Pulse SecureÐû²¼ÁËÓйØÆóÒµÍƽøÁãÐÅÈÎÍøÂçµÄ·ÖÎö³ÂËß¡£ÄÇЩÍƶ¯ºÍ¹æ»®ÁãÐÅÈÎÁ÷³ÌºÍ¼¼ÊõʵʩƫÏòµÄ×éÖ¯£¬½«×ßÔÚÊý×ÖתÐÍÇúÏßµÄÇ°Ãæ¡£Ñо¿·¢ÏÖ£¬ÁãÐÅÈÎÏîÄ¿ÍùÍùÊÇ¿çѧ¿ÆµÄ£¬»ã¼¯ÁËÄþ¾²ºÍÍøÂçÍŶӡ£ËûÃÇͨ³£Ê¹ÓÃÈýÖÖÐ×÷·½Ê½£¬·Ö±ðÊÇе÷²îÒìϵͳ֮¼äµÄ·ÃÎÊÄþ¾²¿ØÖÆ(48%)¡¢ÆÀ¹À·ÃÎÊÄþ¾²¿ØÖÆÐèÇó(41%)ºÍƾ¾ÝÓû§¡¢½ÇÉ«¡¢Êý¾ÝºÍÓ¦Ó÷¨Ê½½ç˵·ÃÎÊÐèÇó(40%)¡£ÆóÒµ¹ÜÀíлḱ×ÜShamus McGillicuddyÌåÏÖ£¬ÆóÒµÏÔÈ»ÕýÔÚ¼Ó¿ì½ÓÄÉÁãÐÅÈÎÍøÂçµÄ·¨Ê½¡£
ÔÎÄÁ´½Ó£º
https://www.pulsesecure.net/resource/pulse-zero-trust-access-defense-in-depth/
3¡¢GoogleÐû²¼Äþ¾²¸üУ¬ÐÞ¸´ChromeÖÐÒѱ»ÀûÓõÄ0day
GoogleÐû²¼Äþ¾²¸üУ¬ÐÞ¸´ChromeÖеÄ10¸ö©¶´£¬ÆäÖаüÂÞÒ»¸öÔÚÒ°ÍâÒѱ»»ý¼«ÀûÓõÄ0day¡£¸Ã0day±»×·×ÙΪCVE-2020-16009£¬ÓÉGoogleµÄÍþв·ÖÎöС×飨TAG£©·¢ÏÖ£¬µ«¸ÃС×鲢δ¹ûÈ»¹ØÓڸ鶴µÄÏêϸÐÅÏ¢ÒÔ¼°ÀûÓ㬽öÌåÏָ鶴λÓÚ´¦ÖÃJavaScript´úÂëµÄChrome×é¼þV8ÖС£²»¾Ãºó£¬GoogleÓÖÐû²¼ÁËAndroid°æChromeÖеÄ0dayµÄ²¹¶¡·¨Ê½£¬¸Ã©¶´±»×·×ÙΪCVE-2020-16010£¬ÎªChrome for AndroidÓû§½çÃ棨UI£©×é¼þÖеĶѻº³åÇøÒç³ö©¶´¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/google-patches-second-chrome-zero-day-in-two-weeks/
4¡¢Ë¼¿ÆÅû¶ÆäAnyConnect¿Í»§¶ËÖÐ0day£¬ÉÐÎÞÏà¹Ø²¹¶¡
˼¿ÆÅû¶ÆäAnyConnect¿Í»§¶ËÈí¼þµÄ0day£¬Ä¿Ç°ÒÑÓйûÈ»¿ÉÓõĿ´·¨ÑéÖ¤ÀûÓôúÂ룬µ«ÉÐÎÞÕë¶ÔÕâ¸öÈÎÒâ´úÂëÖ´ÐЩ¶´µÄÄþ¾²¸üС£¸Ã©¶´±»×·×ÙΪCVE-2020-3556£¬´æÔÚÓÚCisco AnyConnect ClientµÄ½ø³Ì¼äͨÐÅ£¨IPC£©Í¨µÀÖУ¬¾¹ýÉí·ÝÑéÖ¤µÄ¹¥»÷Õߺ͵±µØ¹¥»÷Õß¿ÉÀûÓø鶴ִÐжñÒâ½Å±¾¡£¸Ã©¶´Ó°ÏìÁËWindows¡¢LinuxºÍmacOS°æ±¾µÄAnyConnect¿Í»§¶Ë£¬¾¡¹ÜûÓв¹¶¡·¨Ê½£¬µ«ÊÇ¿ÉÒÔͨ¹ý½ûÓÃ×Ô¶¯¸üкÍÍ£Ö¹ÆôÓýű¾ÉèÖÃÀ´»º½â¸ÃÎÊÌâ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/cisco-discloses-anyconnect-vpn-zero-day-exploit-code-available/
5¡¢AppleÐû²¼¸üУ¬ÐÞ¸´Òѱ»»ý¼«ÀûÓõÄ3¸ö0day
AppleÐÞ¸´ÁËÆäiOS 14.2ÖеÄ3¸ö0day£¬ÕâЩ©¶´ÒÑÔÚÒ°Íâ±»»ý¼«ÀûÓò¢Ó°ÏìÁËiPhone¡¢iPadºÍiPod¡£´Ë´ÎÐÞ¸´µÄ©¶´·Ö±ðΪԶ³ÌÖ´ÐдúÂ루RCE£©Â©¶´£¨CVE-2020-27930 £©£¬FontParser¿â´¦ÖöñÒâ×ÖÌåʱÓÉÄÚ´æËð»µÎÊÌâµ¼Ö£»ÄÚºËÄÚ´æй©©¶´£¨CVE-2020-27950£©£¬¸Ã©¶´ÓÉÄÚ´æ³õʼ»¯ÎÊÌâÒýÆð£¬ÔÊÐí¶ñÒâÓ¦Ó÷ÃÎÊÄÚºËÄڴ棻ÄÚºËÌáȨ©¶´(CVE-2020-27932)£¬ÓÉÀàÐÍ»ìÏýµ¼Ö£¬¿É±»ÀûÓÃÀ´Ê¹ÓÃÄÚºËȨÏÞÖ´ÐÐÈÎÒâ´úÂë¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/apple-patches-three-actively-exploited-ios-zero-days/