AtlassianÐÞ¸´ConfluenceÎó²îCVE-2023-22518

Ðû²¼Ê±¼ä 2023-11-02

1¡¢AtlassianÐÞ¸´ConfluenceÎó²îCVE-2023-22518


¾ÝýÌå10ÔÂ31Èճƣ¬£¬ £¬£¬£¬£¬AtlassianÐÞ¸´ÁËÒ»¸öÑÏÖØµÄÎó²î£¨CVE-2023-22518£©£¬£¬ £¬£¬£¬£¬ËüÓ°ÏìÁËËùÓа汾µÄConfluence Data CenterºÍConfluence Server¡£¡£¡£¡£ÕâÊÇÒ»¸öÊÚȨ²»µ±Îó²î£¬£¬ £¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓøÃÎó²îÆÆËðÊÜÓ°ÏìЧÀÍÆ÷ÉϵÄÊý¾Ý£¬£¬ £¬£¬£¬£¬µ¼ÖÂÊý¾Ýɥʧ£¬£¬ £¬£¬£¬£¬µ«ÎÞ·¨±»ÓÃÀ´ÇÔÈ¡Êý¾Ý¡£¡£¡£¡£Í¨¹ýatlassian.netÓò»á¼ûµÄAtlassian CloudÍøÕ¾²»ÊÜ´ËÎó²îµÄÓ°Ïì¡£¡£¡£¡£´ËÎó²îÉÐδ±»×Ô¶¯Ê¹Ó㬣¬ £¬£¬£¬£¬¸Ã¹«Ë¾½¨ÒéÓû§Á¬Ã¦Ó¦ÓøüС£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/atlassian-warns-of-critical-confluence-flaw-leading-to-data-loss/


2¡¢Avastɱ¶¾Èí¼þ½«Android Google±ê¼ÇΪ¶ñÒâÈí¼þ


¾Ý10ÔÂ31ÈÕ±¨µÀ£¬£¬ £¬£¬£¬£¬Çå¾²¹«Ë¾Avast³Æ×ÔÖÜÁùÒÔÀ´£¬£¬ £¬£¬£¬£¬Æäɱ¶¾Èí¼þ½«²¿·ÖÐͺŵÄÖÇÄÜÊÖ»úÉϵÄGoogle AndroidÓ¦Óñê¼ÇΪ¶ñÒâÈí¼þ¡£¡£¡£¡£ÔÚÊÜÓ°Ïì×°±¸ÉÏ£¬£¬ £¬£¬£¬£¬Óû§±»ÌáÐÑÁ¬Ã¦Ð¶ÔØGoogleÓ¦Ó㬣¬ £¬£¬£¬£¬ÓÉÓÚËü¿ÉÄÜ»áÉñÃØ·¢ËͶÌÐÅ¡¢ÏÂÔØºÍ×°ÖÃÆäËüÓ¦ÓûòÇÔÈ¡Óû§ÐÅÏ¢¡£¡£¡£¡£»£»£» £ÉÐÓÐÈË¿´µ½Á˲î±ðµÄÌáÐÑ£¬£¬ £¬£¬£¬£¬³ÆGoogleÓ¦ÓÃÊÇÒ»¸öľÂí£¬£¬ £¬£¬£¬£¬¿ÉÒÔÔ¶³Ì»á¼ûËûÃǵÄ×°±¸£¬£¬ £¬£¬£¬£¬±»¹¥»÷ÕßÓÃÀ´×°ÖöñÒâÈí¼þ²¢ÇÔÈ¡Êý¾Ý¡£¡£¡£¡£Avast͸¶£¬£¬ £¬£¬£¬£¬Æäɱ¶¾SDKÎó½«Google¿ìËÙËÑË÷¿òÓ¦ÓóÌÐòÆô¶¯Æ÷±ê¼ÇΪ¶ñÒâÈí¼þ£¬£¬ £¬£¬£¬£¬¸ÃÎÊÌâÒÑÓÚ10ÔÂ30ÈÕ½â¾ö¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/avast-confirms-it-tagged-google-app-as-malware-on-android-phones/


3¡¢Scarred ManticoreʹÓÃLIONTAIL¹¥»÷Öж«µÄ¹ú¼Ò


Check PointÓÚ10ÔÂ31ÈÕÅû¶ÁËScarred ManticoreÕë¶ÔÖж«¹ú¼Ò¾üÕþ»ú¹¹ºÍµçÐŹ«Ë¾µÄ¹¥»÷»î¶¯¡£¡£¡£¡£¸ÃÍÅ»ï´Ó2019ÄêÆðÒ»Ö±»îÔ¾£¬£¬ £¬£¬£¬£¬ÏÖÔڵĻÔÚ2023ÄêÖÐÆÚµÖ´ïáÛ·å¡£¡£¡£¡£×îлʹÓÃÁËLIONTAIL£¬£¬ £¬£¬£¬£¬ÕâÊÇÒ»ÖÖ×°ÖÃÔÚWindowsЧÀÍÆ÷Éϵı»¶¯¶ñÒâÈí¼þ¿ò¼Ü¡£¡£¡£¡£³öÓÚÒþ²ØÐÔ£¬£¬ £¬£¬£¬£¬LIONTIALÖ²Èë³ÌÐòʹÓöÔWindows HTTPÕ»Çý¶¯³ÌÐòHTTP.sysµÄÖ±½ÓŲÓÃÀ´¼ÓÔØ³£×¤ÄÚ´æµÄpayload¡£¡£¡£¡£Ñо¿Ö°Ô±»¹³Æ£¬£¬ £¬£¬£¬£¬Scarred ManticoreÓëOilRig£¨ÓÖÃûAPT34£©ÓйØÁª¡£¡£¡£¡£


https://research.checkpoint.com/2023/from-albania-to-the-middle-east-the-scarred-manticore-is-listening/


4¡¢Mandiant¼ì²âµ½¶àÆðʹÓÃCitrix BleedÎó²îµÄ»î¶¯


10ÔÂ31ÈÕ£¬£¬ £¬£¬£¬£¬Mandiant³ÆÆä¼ì²âµ½¶àÆðʹÓÃCitrix BleedÎó²î£¬£¬ £¬£¬£¬£¬À´¹¥»÷ÃÀÖÞ¡¢Å·ÖÞ¡¢·ÇÖÞºÍÑÇÌ«µØÇøµÄ»î¶¯¡£¡£¡£¡£ÕâÊÇNetScaler ADCºÍNetScaler Gateway×°±¸ÖеÄÐÅϢй¶Îó²î£¨CVE-2023-4966£©£¬£¬ £¬£¬£¬£¬×Ô8ÔÂÏÂÑ®ÒÔÀ´Ò»Ö±ÔÚ±»Ê¹Óᣡ£¡£¡£Ê¹ÓÃÎó²îºó£¬£¬ £¬£¬£¬£¬¹¥»÷Õß»á¾ÙÐÐÍøÂçÕì̽¡¢ÇÔÈ¡ÕÊ»§Æ¾Ö¤²¢Í¨¹ýRDP¾ÙÐкáÏòÒÆ¶¯¡£¡£¡£¡£MandiantÌåÏÖ£¬£¬ £¬£¬£¬£¬ÔÚÖÖÖֻÖÐʹÓÃCVE-2023-4966µÄ4¸ö¹¥»÷ÍŻ£¬ £¬£¬£¬£¬ÔÚPost-Exploitation½×¶Î±£´æÒ»Ð©Öصþ¡£¡£¡£¡£


https://www.mandiant.com/resources/blog/session-hijacking-citrix-cve-2023-4966


5¡¢¶ñÒâNuGet°üʹÓÃMSBuild¼¯³ÉÀ´·Ö·¢¶ñÒâÈí¼þ


 ReversingLabsÔÚ10ÔÂ31ÈÕÅû¶ÁËͨ¹ý¶ñÒâNuGet°üÀ´·Ö·¢¶ñÒâÈí¼þµÄ»î¶¯¡£¡£¡£¡£Ñо¿Ö°Ô±ÓÚ10ÔÂ15ÈÕ·¢Ã÷ÁË×îÐÂNuGet»î¶¯£¬£¬ £¬£¬£¬£¬Ê¹Óòî±ðµÄƴд¹ýʧµÄÈí¼þ°üÀ´×°ÖöñÒâÈí¼þ¡£¡£¡£¡£´Ë»î¶¯µÄÐÂÓ±Ö®´¦ÔÚÓÚ£¬£¬ £¬£¬£¬£¬ÕâЩÈí¼þ°üûÓÐʹÓÃÔÚ×°Öþ籾ÖÐÖ²ÈëÏÂÔØ³ÌÐòµÄ³£ÓÃÒªÁ죬£¬ £¬£¬£¬£¬¶øÊÇʹÓÃNuGetµÄMSBuild¼¯³ÉÀ´Ö´ÐдúÂë¡£¡£¡£¡£ÕâÊÇ8Ô³õÒÔÀ´µÄÒ»Á¬»î¶¯µÄÒ»²¿·Ö£¬£¬ £¬£¬£¬£¬Ö±µ½10ÔÂÖÐÑ®£¬£¬ £¬£¬£¬£¬¹¥»÷Õß²Å×îÏÈʹÓÃMSBuild¼¯³É¡£¡£¡£¡£ÔçÆÚ°æ±¾Ê¹ÓÃPowerShell¾ç±¾£¨init.ps1£©´ÓGitHub´æ´¢¿â»ñÈ¡¶ñÒâÈí¼þpayload¡£¡£¡£¡£


https://www.reversinglabs.com/blog/iamreboot-malicious-nuget-packages-exploit-msbuild-loophole


6¡¢CiscoÐû²¼¹ØÓÚArid Viper¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ


10ÔÂ31ÈÕ£¬£¬ £¬£¬£¬£¬Cisco TalosÐû²¼Á˹ØÓÚArid Viper¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¸Ã»î¶¯×Ô2022Äê4ÔÂ×îÏÈ»îÔ¾£¬£¬ £¬£¬£¬£¬Ò»Ö±Õë¶Ô°¢À­²®ÓïµØÇø¡£¡£¡£¡£¹¥»÷ÕßʹÓÃαÔìµÄ¶ñÒâAndroidÓ¦Ó㬣¬ £¬£¬£¬£¬Ö¼ÔÚ´ÓÄ¿µÄÊÖ»úÖÐÍøÂçÊý¾Ý¡£¡£¡£¡£ÓÐȤµÄÊÇ£¬£¬ £¬£¬£¬£¬¸Ã¶ñÒâÈí¼þÓëÔ¼»áÈí¼þSkippedµÄÔ´´úÂëÏàËÆ£¬£¬ £¬£¬£¬£¬ÕâÅú×¢ÔËÓªÍÅ»ïҪôÓëSkippedµÄ¿ª·¢Ö°Ô±ÓÐÁªÏµ£¬£¬ £¬£¬£¬£¬ÒªÃ´²»·¨»ñµÃÁËÏîÄ¿µÄ»á¼ûȨÏÞ¡£¡£¡£¡£¹¥»÷Õß»á·Ö·¢Î±×°³ÉÔ¼»áÓ¦ÓøüеĶñÒâÁ´½Ó£¬£¬ £¬£¬£¬£¬´Ó¶ø½«¶ñÒâÈí¼þ×°Öõ½Óû§µÄ×°±¸¡£¡£¡£¡£


https://blog.talosintelligence.com/arid-viper-mobile-spyware/