Checkmarx¼ì²âµ½¶àÆðÕë¶ÔÒøÐеĿªÔ´Èí¼þ¹©Ó¦Á´¹¥»÷

Ðû²¼Ê±¼ä 2023-07-25

1¡¢Checkmarx¼ì²âµ½¶àÆðÕë¶ÔÒøÐеĿªÔ´Èí¼þ¹©Ó¦Á´¹¥»÷


CheckmarxÔÚ7ÔÂ21ÈÕ³ÆÆä¼ì²âµ½¶àÆðÕë¶ÔÒøÐеĿªÔ´Èí¼þ¹©Ó¦Á´£¨OSS£©¹¥»÷¡£µÚÒ»´Î¹¥»÷·¢ÉúÓÚ4ÔÂÉÏÑ® £¬¹¥»÷Õßð³äÄ¿±êÒøÐÐÔ±¹¤ £¬ÀûÓÃNPMƽ̨ÉÏ´«Á˼¸¸öÈí¼þ°ü £¬ÆäÖаüÂÞÔ¤°²×°½Å±¾ £¬¿ÉÔÚ°²×°Ê±Ö´ÐжñÒâ»î¶¯¡£»¹ÀûÓÃAzureµÄCDN×ÓÓòÀ´·Ö·¢µÚ¶þ½×¶ÎµÄpayload Havoc £¬ÕâÊÇÒ»¸öC2¿ò¼Ü¡£ÔÚ2Ô·ݼì²âµ½µÄÕë¶ÔÒøÐеÄÁíÒ»´Î¹¥»÷ÖÐ £¬¹¥»÷ÕßÒ²ÉÏ´«ÁËÒ»¸ö¶ñÒânpm°ü £¬Ö¼ÔÚÀ¹½ØµÇ¼Êý¾Ý²¢½«Æä·¢Ë͸ø¹¥»÷Õß¡£Ä¿Ç° £¬Ñо¿ÈËÔ±ÒѾ­³ÂËß²¢É¾³ýÁËÕâЩ¶ñÒ⿪ԴÈí¼þ°ü¡£


https://checkmarx.com/blog/first-known-targeted-oss-supply-chain-attacks-against-the-banking-sector/


2¡¢Apple¸üÐÂÐÞ¸´Òѱ»ÀûÓõÄÄں˩¶´CVE-2023-38606 


¾ÝýÌå7ÔÂ24ÈÕ±¨µÀ £¬AppleÐû²¼ÁËÄþ¾²¸üР£¬ÒÔÐÞ¸´Õë¶ÔiPhone¡¢MacºÍiPadµÄ¹¥»÷Öб»ÀûÓõÄ©¶´¡£ÕâÊÇÒ»¸öÄں˩¶´£¨CVE-2023-38606£© £¬Äܹ»±»ÓÃÀ´¸Ä¶¯Ãô¸ÐµÄÄÚºË״̬ £¬¿ÉÄÜÒÑÔÚiOS 15.7.1֮ǰÐû²¼µÄiOS°æ±¾Öб»»ý¼«ÀûÓá£KasperskyÌåÏÖ £¬CVE-2023-38606ÊÇÁãµã»÷©¶´ÀûÓÃÁ´µÄÒ»²¿ÃÅ £¬ÓÃÓÚͨ¹ýiMessage©¶´ÔÚiPhoneÉϰ²×°¼äµýÈí¼þTriangulation¡£ÕâÊÇAppleÔÚ½ñÄêÐÞ¸´µÄµÚʮһ¸öÒѱ»ÀûÓõÄÁãÈÕ©¶´¡£


https://www.bleepingcomputer.com/news/apple/apple-fixes-new-zero-day-used-in-attacks-against-iphones-macs/


3¡¢ClopÀûÓÃMOVEit©¶´µÄ¹¥»÷Ô¤¹À»ñÀû7500ÍòÖÁ1ÒÚÃÀÔª


CovewareÔÚ7ÔÂ21ÈÕ͸¶ £¬ClopÀûÓÃMOVEit©¶´µÄ´ó¹æÄ£Êý¾ÝÇÔÈ¡»î¶¯Ô¤¼Æ»ñÀû¸ß´ï7500ÍòÖÁ1ÒÚÃÀÔª¡£ÔÚ2023ÄêQ2 £¬½»Êê½ðµÄ±»¹¥»÷Ä¿±êµÄÊýÁ¿ÒѽµÖÁ34% £¬´´ÏÂÀúʷеÍ £¬µ¼ÖÂÀÕË÷ÍÅ»ï¸Ä±ä¼ÆÄ±ÒÔıÇó¸ü¸ßµÄÀûÈó¡£CovewareÌåÏÖ £¬ClopÒѾ­¸Ä±äÁ˼ÆÄ± £¬ÀÕË÷¸ü¸ßµÄÊê½ð £¬Ï£Íûͨ¹ý¼¸±Ê´ó¶î¸¶¿îÀ´¿Ë·þÕûÌåϽµµÄÇé¿ö¡£´ËÍâ £¬ÅÓ´óÐÔºÍ×Ô¶¯»¯Ë®Æ½µÍµÄÀÕË÷¹¥»÷µÄÓ°ÏìºÍ³É±¾×îС¡£


https://www.coveware.com/blog/2023/7/21/ransom-monetization-rates-fall-to-record-low-despite-jump-in-average-ransom-payments


4¡¢Ñо¿ÈËÔ±Åû¶OpenMeetings¿É½Ù³Ö¹ÜÀíÔ±ÕÊ»§µÄ©¶´


¾Ý7ÔÂ21ÈÕ±¨µÀ £¬Ñо¿ÈËÔ±Åû¶ÁËApache OpenMeetingsÖеÄ3¸ö©¶´µÄϸ½Ú¡£ÕâЩ©¶´·Ö±ðΪÈõ¹þÏ£±ÈÁ¦Â©¶´£¨CVE-2023-28936£©¡¢Í¨¹ýÑûÇë¹þÏ£½øÐÐÎÞÏÞÖÆ·ÃÎʵÄ©¶´£¨CVE-2023-29023£©ÒÔ¼°¿Õ×Ö½Ú×¢Èë©¶´(CVE-2023-29246£© £¬¿É±»×ÔÐÐ×¢²áÓû§£¨Ä¬ÈÏÆôÓã©ÓÃÀ´½Ù³Ö¹ÜÀíÔ±ÕÊ»§²¢Ô¶³ÌÖ´ÐÐÈÎÒâ´úÂ롣Ŀǰ £¬ÕâЩ©¶´ÒÑÔÚApache OpenMeetings 7.1.0°æ±¾ÖÐÐÞ¸´¡£


https://www.securityweek.com/openmeetings-flaws-allow-hackers-to-hijack-instances-execute-code-on-servers/


5¡¢AhnLab·¢ÏÖͨ¹ýMS-SQL·þÎñÆ÷·Ö·¢PurpleFoxµÄ»î¶¯


7ÔÂ24ÈÕ £¬AhnLab³ÆÆä·¢ÏÖÁËͨ¹ý¹ÜÀí²»ÉÆµÄMS-SQL·þÎñÆ÷·Ö·¢PurpleFoxµÄ»î¶¯¡£¹¥»÷Ê×ÏÈͨ¹ýsqlservr.exeÖ´ÐÐPowerShell £¬ÕâÊÇÒ»¸öÓëMS-SQL·þÎñÆ÷Ïà¹ØµÄ½ø³Ì¡£µ±Ö´ÐÐÉÏÊöPowerShellʱ £¬½«ÏÂÔØ²¢¼ÓÔØÁíÒ»¸ö¾­¹ý»ìÏýµÄPowerShell¡£ÆäÖаüÂÞÒ»¸ö¹¥»÷Õß¿ª·¢µÄº¯ÊýMsiMake £¬¿ÉÏÂÔØÒ»¸öMSIÎļþ¡£MSI°ü¸ü¸Ä×¢²á±íÏîÒÔʵÏÖ³Ö¾ÃÐÔºÍȨÏÞÌáÉý¡£×îºó £¬MSI°ü»áʵÑéÖØÆôϵͳ £¬½Ó×ÅSENS·þÎñ»á±»Ö´ÐÐ £¬´Ó¶ø¼¤»î¶ñÒâÈí¼þ¡£


https://asec.ahnlab.com/en/55492/


6¡¢IBMÐû²¼¹ØÓÚ2023ÄêÊý¾Ýй¶³É±¾µÄ·ÖÎö³ÂËß


7ÔÂ24ÈÕ £¬IBMÐû²¼¹ØÓÚ2023ÄêÊý¾Ýй¶³É±¾µÄ·ÖÎö³ÂËß¡£¸Ã³ÂËß¶Ô553¸ö×éÖ¯µÄÊý¾Ýй¶Çé¿ö½øÐÐÁË·ÖÎö £¬Ñо¿µÄÎ¥¹æÊ¼þ·¢ÉúÔÚ2022Äê3ÔÂÖÁ2023Äê3Ô¡£×îÐÂÑо¿ÏÔʾ £¬Êý¾Ýй¶³É±¾Á¬ÐøÔö³¤ £¬È«Çòƽ¾ù³É±¾¸ß´ï445ÍòÃÀÔª £¬ÈýÄêÄÚÔö³¤ÁË15%¡£Ò½ÁƱ£½¡ÐÐÒµµÄ³É±¾Î»¾Ó°ñÊ× £¬Á¬Ðø13Äê³ÉΪ³É±¾×î¸ßµÄÐÐÒµ¡£³ÂËßÖ¸³ö £¬Äþ¾²È˹¤ÖÇÄܺÍ×Ô¶¯»¯¡¢DevSecOpsÒªÁìºÍIR¼Æ»®ÔÚ½ÚÊ¡³É±¾·½Ãæ·¢»ÓÁËÖ÷µ¼×÷Óã»È˹¤ÖÇÄܺÍASM¼ÓËÙÁËÎ¥¹æÊ¼þµÄʶ±ðºÍÍ£Ö¹£»µ±Êý¾Ý´æ´¢ÔÚ¶à¸ö»·¾³ÖÐʱ £¬³É±¾ºÜ¸ß £¬¶øÇÒÐèÒª¸ü³¤Ê±¼ä²ÅÆøÍ£Ö¹Î¥¹æÊ¼þ£»ÓµÓз¢ÏÖÎ¥¹æÊ¼þµÄÄÚ²¿ÍŶӵÄ×éÖ¯ÔÚ¿ØÖƳɱ¾·½ÃæÌåÏֵøüºÃ¡£


https://securityintelligence.com/posts/whats-new-2023-cost-of-a-data-breach-report/