Cisco Jabber±£´æÔ¶³ÌÖ´ÐдúÂëÎó²î£¬£¬£¬£¬£¬£¬£¬ÏÖÒѱ»ÐÞ¸´£»£»£»£»£»wolfSSLÖб£´æÎó²î£¬£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂMiTM¹¥»÷
Ðû²¼Ê±¼ä 2020-09-031.Cisco Jabber±£´æÔ¶³ÌÖ´ÐдúÂëÎó²î£¬£¬£¬£¬£¬£¬£¬ÏÖÒѱ»ÐÞ¸´
WatchcomµÄOlav Sortland Thoresen·¢Ã÷Windows°æCisco JabberÖб£´æÑÏÖØµÄ´úÂëÖ´ÐÐÎó²î£¬£¬£¬£¬£¬£¬£¬ÏÖÒѱ»ÐÞ¸´¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î±»¸ú×ÙΪCVE-2020-3495£¬£¬£¬£¬£¬£¬£¬ CVSSΪ9.9·Ö£¬£¬£¬£¬£¬£¬£¬ÊÇÓÉÓÚ´«ÈëÐÂÎÅÄÚÈݵÄÊäÈëÑéÖ¤²»×¼È·ÒýÆðµÄ¡£¡£¡£¡£¡£¡£¡£¾ÓÉÉí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓöñÒâµÄ¿ÉÀ©Õ¹ÐÂÎźÍ״̬ÐÒ飨XMPP£©ÐÂÎÅʹÓøÃÎó²î£¬£¬£¬£¬£¬£¬£¬ÀÖ³ÉʹÓú󹥻÷Õß¿ÉÔÚÄ¿µÄϵͳÉÏÖ´ÐÐí§Òâ³ÌÐò¡£¡£¡£¡£¡£¡£¡£Ë¼¿Æ²úÆ·Çå¾²ÊÂÎñÏìӦС×飨PSIRT£©ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÏÖÔÚÉÐδ±»ÆÕ±éʹÓᣡ£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/cisco-fixes-critical-code-execution-bug-in-jabber-for-windows/
2.Ñо¿Ö°Ô±·¢Ã÷wolfSSLÖб£´æÎó²î£¬£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂMiTM¹¥»÷
Ñо¿Ö°Ô±G¨¦raldDoussotÓÚ2020Äê7Ô·¢Ã÷wolfSSLÖб£´æÎó²î£¬£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂMiTM¹¥»÷¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î±»×·×ÙΪCVE-2020-24613£¬£¬£¬£¬£¬£¬£¬ÊÇÓÉÓÚTLS 1.3¿Í»§¶Ë״̬»úµÄ¹ýʧʵÏÖ¶øµ¼Öµġ£¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÒÔʹÓøÃÎó²î×èµ²¿Í»§¶Ëͨ¹ýTLS 1.3ÓëЧÀÍÆ÷µÄÁªÏµ£¬£¬£¬£¬£¬£¬£¬²¢ÔÚTLSÎÕÊÖ½×¶ÎʹÓÃÎÞЧµÄ°ü¾ÙÐÐÏìÓ¦¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß»¹¿ÉÒÔÄ£ÄâÄ¿µÄЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬ÌᳫÖÐÐÄÈË£¨MiTM£©¹¥»÷¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬¹©Ó¦ÉÌÒÑÐû²¼Õë¶Ô¸ÃÎó²îµÄ²¹¶¡³ÌÐò¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://latesthackingnews.com/2020/09/01/vulnerability-in-wolfssl-could-allow-mitm-attacks-patch-available/
3.MagentoµÄ²å¼þMagmi±£´æCSRFºÍÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î
µç×ÓÉÌÎñÍøÕ¾MagentoµÄµÚÈý·½²å¼þMagmi±£´æÁ½¸öÑÏÖØµÄÎó²î¡£¡£¡£¡£¡£¡£¡£µÚÒ»¸öΪ¿çÕ¾µãÇëÇóαÔ죨CSRF£©Îó²î£¨CVE-2020-5776£©Ó°ÏìÁËMagmi°æ±¾0.7.24£¬£¬£¬£¬£¬£¬£¬CVSSv2ÆÀ·ÖΪ6.8£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÊÇÓÉÓÚMagmiµÄGETºÍPOST¶ËµãδʵÏÖCSRF±£»£»£»£»£»¤¶øµ¼Öµģ¬£¬£¬£¬£¬£¬£¬ÀÖ³ÉʹÓú󹥻÷Õß¿ÉÐ®ÖÆÖÎÀíÔ±µÄ»á»°£¬£¬£¬£¬£¬£¬£¬´Ó¶øÔÚÍйÜMagmiµÄЧÀÍÆ÷ÉÏÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£µÚ¶þ¸öÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2020-5777£©Ó°ÏìÁËMagento°æ±¾0.7.23¼°¸üµÍ°æ±¾£¬£¬£¬£¬£¬£¬£¬CVSSv2ÆÀ·ÖΪ6.8£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿Éͨ¹ýÊý¾Ý¿â¾Ü¾øÐ§ÀÍ(DB-DoS)¹¥»÷µ¼ÖÂÊý¾Ý¿âÅþÁ¬Ê§°Ü£¬£¬£¬£¬£¬£¬£¬´Ó¶øÔÚЧÀÍÆ÷ÉÏÔ¶³ÌÖ´ÐдúÂë¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/magento-sites-vulnerable-to-rce-stemming-from-magmi-plugin-flaws/158864/
4.Ñо¿Ö°Ô±·¢Ã÷ºÚ¿Í¿Éͨ¹ý˽È˵籨ƵµÀÇÔÊØÐÅÓÿ¨ÐÅÏ¢
Ñо¿Ö°Ô±Affable Kraut̫ͨ¹ýÎöºÚ¿ÍʹÓõĶñÒâJavaScript£¬£¬£¬£¬£¬£¬£¬·¢Ã÷ºÚ¿Í¿Éͨ¹ý˽È˵籨ƵµÀÇÔÊØÐÅÓÿ¨ÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¸Ã¾ç±¾ÏÈ´ÓËùÓÐÀàÐ͵ÄÊäÈë×Ö¶ÎÍøÂçÊý¾Ý²¢½«Æä·¢Ë͵½TelegramƵµÀ£¬£¬£¬£¬£¬£¬£¬ËùÓÐÐÅÏ¢¾ù»áʹÓù«¹²ÃÜÔ¿¼ÓÃÜ¡£¡£¡£¡£¡£¡£¡£È»ºó£¬£¬£¬£¬£¬£¬£¬Telegram»úеÈ˽«±»µÁÊý¾Ý×÷ΪÐÂÎÅÐû²¼ÔÚ̸ÌìÖС£¡£¡£¡£¡£¡£¡£ÒÑÍùÒ²ÔøÓкڿÍʹÓõ籨ÇÔÈ¡±»µÁÊý¾Ý£¬£¬£¬£¬£¬£¬£¬Õ°²©ÍøÂçÔÚÈ¥Äê·¢Ã÷ÓкڿÍʹÓÃ̸ÌìÆ½Ì¨µÄÐÅÏ¢ÇÔÈ¡Æ÷Masad ClipperºÍStealer¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/credit-card-data-smuggled-via-private-telegram-channel/
5.Ó¢¹úÕþ¸®ÖÎÀíµÄ450¶à¸öÓòÃû±»·ÅÈëDNSµÄºÚÃûµ¥ÖÐ
GitHubÓû§tg12·¢Ã÷£¬£¬£¬£¬£¬£¬£¬Ó¢¹úÕþ¸®ÖÎÀíµÄ450¶à¸öGOV.UKÓòÃû±»·ÅÈëÁËDNSµÄºÚÃûµ¥ÖУ¬£¬£¬£¬£¬£¬£¬Õâ¿ÉÔì³Éµç×ÓÓʼþͨѶÎÊÌâ¡£¡£¡£¡£¡£¡£¡£¶à¸öÕþ¸®»ú¹¹¡¢ÀíÊ»áºÍ¹«Òæ»ú¹¹¶¼ÒÀÀµGOV.UKÓòÃûΪӢ¹úסÃñÌṩÔÚÏßЧÀÍ¡£¡£¡£¡£¡£¡£¡£Í¨³£ÇéÐÎÏ£¬£¬£¬£¬£¬£¬£¬ÊÕ¼þÈ˵ÄÓʼþÌṩÉÌ¿ÉÄÜ»á²éÕÒÓòÃûϵͳµÄºÚÃûµ¥ÁÐ±í£¨DNSBL£©£¬£¬£¬£¬£¬£¬£¬²¢½«ÇкÏÁбíµÄÓʼþÒÆ¶¯µ½À¬»øÓʼþÎļþ¼ÐÖС£¡£¡£¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬£¬£¬ÕâÖÖÇéÐβ»µ«»áÓ°Ïì×éÖ¯µÄÉùÓþ£¬£¬£¬£¬£¬£¬£¬²¢ÇÒ»¹»áµ¼ÖÂÕýµ±µÄµç×ÓÓʼþת´ï·ºÆðÎÊÌâ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/over-400-govuk-domains-found-on-spam-blacklists/
6.CISAÁªºÏ¶à¸ö»ú¹¹Ðû²¼¹ØÓÚ·¢Ã÷ºÍµ÷½â¶ñÒâ¹¥»÷»î¶¯µÄ½¨Òé
ÍøÂçÇå¾²ºÍ»ù´¡¼Ü¹¹Çå¾²¾Ö£¨CISA£©Óë°Ä´óÀûÑÇ¡¢¼ÓÄôó¡¢ÐÂÎ÷À¼ºÍÓ¢¹úµÄÍøÂçÇå¾²»ú¹¹ÏàÖúÐû²¼ÁËÒ»·ÝÁªºÏÍøÂçÇå¾²×Éѯ¡£¡£¡£¡£¡£¡£¡£¸Ãת´ïÖØµãÏÈÈÝÁË·¢Ã÷¶ñÒâ»î¶¯µÄÊÖÒÕÒªÁ죬£¬£¬£¬£¬£¬£¬°üÀ¨ÔöÇ¿ÏàÖúͬ°éºÍÍøÂçÖÎÀíÔ±Ö®¼äÊÂÎñÏìÓ¦µÄ°ì·¨¡£¡£¡£¡£¡£¡£¡£¸Ã±¨¸æµÄÄ¿µÄÊÇÔöÇ¿ÏàÖúͬ°éºÍÍøÂçÖÎÀíÔ±Ö®¼äµÄÊÂÎñÏìÓ¦ÄÜÁ¦£¬£¬£¬£¬£¬£¬£¬²¢³äµ±ÊÂÎñÊÓ²ìÊֲᡣ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://us-cert.cisa.gov/ncas/alerts/aa20-245a