ºÚ¿ÍÀûÓÃSitecoreÁãÈÕ·ì϶CVE-2025-53690²¿ÊðºóÃÅ
°ä²¼¹¦·ò 2025-09-081. ºÚ¿ÍÀûÓÃSitecoreÁãÈÕ·ì϶CVE-2025-53690²¿ÊðºóÃÅ
9ÔÂ4ÈÕ£¬£¬ÍþвÐÐΪÕßͨ¹ý¾É°æSitecore²¿ÊðÖеÄÁãÈÕ·ì϶CVE-2025-53690ÌáÒé¹¥»÷£¬£¬¸Ã·ì϶ԴÓÚ2017ÄêǰSitecoreÖ¸ÄÏÖй«¿ªµÄʾÀýASP.NET»úеÃÜÔ¿±»³ö²ú»·¾³·´¸´Ê¹Ó㬣¬µ¼ÖÂViewState·´ÐòÁл¯·ì϶Òý·¢Ô¶³Ì´úÂëÖ´ÐУ¨RCE£©¡£¹¥»÷ÕßÕë¶Ôº¬Î´¾ÑéÖ¤ViewState×ֶεġ°/sitecore/blocked.aspx¡±¶Ëµã£¬£¬ÔÚIISÍøÂç·þÎñÕË»§ÏÂÖ´ÐжñÒâ¡°_VIEWSTATE¡±¸ºÔØ£¬£¬²¿ÊðWeepSteel¿úËźóÃÅ¡£¸Ã¶ñÒâÈí¼þ¿ÉÇÔȡϵͳ¡¢¡¢¹ý³Ì¡¢¡¢´ÅÅ̼°ÍøÂçÐÅÏ¢£¬£¬¼Ù×°³É³ß¶ÈViewStateÏìÓ¦±ð´«£¬£¬²¢Ö´ÐÐwhoami¡¢¡¢ipconfigµÈ¿úËźÅÁî¡£¹¥»÷½øÈë¶à½×¶ÎÀ©´ó£º£ººÚ¿Í²¿ÊðEarthwormÍøÂçËíµÀ¡¢¡¢DwagentÔ¶³Ì½Ó¼û¹¤¾ß¼°7-ZipѹËõ¹¤¾ß£¬£¬´´½¨±¾µØÖÎÀíÔ±ÕË»§£¨Èç¡°asp$¡±£©¡¢¡¢×ª´¢SAM/SYSTEMÍ´´¦£¬£¬²¢Í¨¹ýGoTokenTheft½øÐÐÁîÅÆ·ÂÕÕÌáÉýȨÏÞ¡£ÎªÎ¬³ÖÓÆ¾ÃÐÔ£¬£¬¹¥»÷Õß½ûÓÃÕË»§ÃÜÂë¹ýÆÚ¡¢¡¢ÊÚÓèRDPȨÏÞ£¬£¬²¢½«Dwagent×¢²áΪϵͳ·þÎñ¡£Sitecore½áºÏMandiant°ä²¼°²È«²¼¸æ£¬£¬½¨ÒéÖÎÀíÔ±Á¢¼´´úÌæweb.configÖÐËùÓо²Ì¬ÖµÎªÎ¨Ò»ÐÂÃÜÔ¿£¬£¬²¢¼ÓÃÜÔªËØ£¬£¬Í¬Ê±Ç¿µ÷¶¨ÆÚÂÖ»»¾²Ì¬»úеÃÜÔ¿×÷Ϊ³Ö¾Ã°²È«´ëÊ©¡£
https://www.bleepingcomputer.com/news/security/hackers-exploited-sitecore-zero-day-flaw-to-deploy-backdoors/
2. ·ÆÂɱö¶«ÄÏ´óѧÊý¾Ý¿âÉæÏÓй¶£¬£¬Ñ§ÉúÊý¾Ý±»ÏúÊÛ
9ÔÂ3ÈÕ£¬£¬Ò»ÃûÍþвÐÐΪÕßÈëÇÖÁË·ÆÂɱö¶«ÄÏ´óѧ (USeP)£¬£¬²¢ÔÚ°µÍøÂÛ̳ÉÏÏúÊÛÆäÊý¾Ý¿â¡£USeP ÊÇÒ»Ëù³ÛÃûµÄÖÝÁ¢´óѧ£¬£¬Î»ÓÚ·ÆÂɱöÃÞÀ¼ÀϵºµÄ´ïÎÖÊС£×÷Ϊ¸ÃµØÓòÖØÒªµÄ¹«¹²×êÑкͽÌÓý»ú¹¹£¬£¬¸ÃУ°ÑÎÕ×Å´óÁ¿Ê¦ÉúÊý¾Ý¡£Õâ´ÎÈëÇÖÊÂÎñй¶ÁËÃô¸ÐÐÅÏ¢£¬£¬¶ÔÉæ°¸ÈËÔ±×é³É·çÏÕ¡£ÍþвÐÐΪÕßÐû³Æ£¬£¬±»ÈëÇÖµÄÊý¾Ý¿â¾Þϸ³¬¹ý 20MB£¬£¬Ô̺¬Ò»¸ö SQL Îļþ£¬£¬Ô̺¬³¬¹ý 175,000 ÐÐÊý¾Ý¡£¾Ý³Æ£¬£¬Ð¹Â¶µÄÐÅÏ¢Ô̺¬´óÁ¿Ñ§ÉúµÄСÎÒÉí·ÝÐÅÏ¢ (PII)£¬£¬ÀýÈçÈ«Ãû¡¢¡¢µç×ÓÓʼþµØÖ·¡¢¡¢µç»°ºÅÂë¡¢¡¢¼ÒͥסַºÍѧҵÏêÇé¡£ÂÛ̳Ìû×ÓÁгöÁ˺ܶà¾Ý³Æ±»Ð¹Â¶µÄÊý¾Ý¿â±í£¬£¬Åú×¢²úÉúÁËÈ«ÃæµÄÊý¾Ýй¶ÊÂÎñ¡£¾Ý³Æ£¬£¬±»ÈëÇֵıíÔ̺¬£º£º±à×ëÒªÇ󡢡¢ÒÑ×¢²á¡¢¡¢È«ÇòµÄ¡¢¡¢Í¼Æ¬¡¢¡¢¼à¿Ø¡¢¡¢µØÎ»¡¢¡¢ÒªÇó±í¡¢¡¢ÒªÇó±í12¡¢¡¢ÒªÇó±í¾É¡¢¡¢studrecords¡¢¡¢ÏµÍ³ÈÕÖ¾¡¢¡¢ÂòÂô¡¢¡¢³¢ÊÔ¡¢¡¢Óû§¡£
https://dailydarkweb.net/university-of-southeastern-philippines-database-allegedly-breached-student-data-for-sale/
3. SAP S/4HANA¸ßΣ·ì϶CVE-2025-42957ÔâÒ°ÍâÀûÓÃ
9ÔÂ5ÈÕ£¬£¬×êÑÐÈËÔ±ÖÒ¸æ³Æ£¬£¬SAP S/4HANA´æÔÚÒ»¸öÑÏÖØµÄ´úÂë×¢Èë·ì϶CVE-2025-42957£¬£¬¸Ã·ì϶ÕýÔÚ±»Ò°Íâ¹¥»÷ÀûÓ㬣¬ÒÔ¹¥ÆÆÂ¶³öµÄ·þÎñÆ÷¡£¸Ã·ì϶ԴÓÚSAP S/4HANAÖÐRFC¹«¿ªÖ°ÄÜÄ£¿éµÄABAP´úÂë×¢ÈëÎÊÌ⣬£¬ÔÊÐíµÍȨÏÞÉí·ÝÑéÖ¤Óû§×¢ÈëËÁÒâ´úÂë¡¢¡¢ÈƹýÊÚȨ²¢ÆëÈ«ÊÕÊÜSAPϵͳ¡£¹©¸øÉÌSAPÒÑÓÚ2025Äê8ÔÂ11ÈÕÐÞ¸´´Ë·ì϶£¬£¬²¢½«ÆäÆÀ¶¨ÎªÑÏÖØ·ì϶£¬£¬CVSSÆÀ·Ö¸ß´ï9.9·Ö¡£È»¶ø£¬£¬²¿ÃÅϵͳÉÐδÀûÓøð²È«¸üУ¬£¬ÕâЩδÐÞ²¹µÄϵͳÒѳÉΪºÚ¿Í¹¥»÷µÄÖ¸±ê¡£¾ÝSecurityBridge»ã±¨£¬£¬CVE-2025-42957ĿǰÈÔÔÚÒ°Íâ±»»ý¼«ÀûÓ㬣¬Ö»¹ÜÀûÓÃˮƽÓÐÏÞ¡£SecurityBridgeÓÚ2025Äê6ÔÂ27ÈÕ·¢Ïָ÷ì϶²¢ÕƹÜÈεØÏòSAP»ã±¨£¬£¬»¹ÐÖú¿ª·¢Á˲¹¶¡¡£µ«ÓÉÓÚÊÜÓ°Ïì×é¼þµÄÊ¢¿ªÐÔÒÔ¼°ABAP´úÂëµÄ¹«¿ªÐÔ£¬£¬¼¼Êõ¸ßÃ÷µÄÍþвÐÐΪÕß¿ÉÄÜÇáËÉÄæÏò¹¤³Ì²¹¶¡£¬£¬×ÔÐз¢ÏÖ·ì϶¡£¸Ã·ì϶µÄDZÔÚºó¹ûÔ̺¬Êý¾Ý͵ÇÔ¡¢¡¢Êý¾Ý°Ñ³Ö¡¢¡¢´úÂë×¢Èë¡¢¡¢Í¨¹ý´´½¨ºóÃÅÕË»§ÌáÉýȨÏÞ¡¢¡¢Æ¾Ö¤ÍµÇÔÒÔ¼°Í¨¹ý¶ñÒâÈí¼þ¡¢¡¢ÀÕË÷Èí¼þµÈ·½Ê½ÖжÏÔËÓª¡£SecurityBridge»¹ÖÆ×÷ÁËÊÓÆµÑÝʾÈôºÎÀûÓø÷ì϶ÔÚSAP·þÎñÆ÷ÉÏÔËÐÐϵͳºÅÁî¡£
https://www.bleepingcomputer.com/news/security/critical-sap-s-4hana-vulnerability-now-exploited-in-attacks/
4. WealthsimpleÅû¶Êý¾Ýй¶ÊÂÎñ£¬£¬³¬300Íò¿Í»§ÊÜÓ°Ïì
9ÔÂ5ÈÕ£¬£¬¼ÓÄôóÔÚÏßͶ×ÊÖÎÀí¾ÞÍ·WealthsimpleÅû¶һ·Êý¾Ýй¶ÊÂÎñ£¬£¬¹¥»÷Õßͨ¹ýÈëÇÖµÚÈý·½±àдµÄÈí¼þ°ü£¬£¬Î´¾ÊÚȨ½Ó¼ûÁ˲»µ½1%¿Í»§µÄСÎÒÐÅÏ¢¡£¸Ã¹«Ë¾³ÉÁ¢ÓÚ2014Ä꣬£¬×ܲ¿Î»ÓÚ¶àÂ׶࣬£¬ÖÎÀí×ʲú³¬845ÒÚ¼ÓÔª£¬£¬·þÎñ³¬300Íò¼ÓÄôóÈË£¬£¬º¸ÇͶ×Ê¡¢¡¢ÂòÂô¡¢¡¢¼ÓÃÜÇ®±Ò¡¢¡¢±¨Ë°¡¢¡¢Ïû·ÑºÍ´¢ÐîµÈ½ðÈÚ²úÆ·£¬£¬ÆäAndroidÀûÓÃÏÂÔØÁ¿³¬100Íò´Î£¬£¬iOSÀûÓûñ³¬12.6ÍòÌõÆÀ·Ö¡£¾Ý¹«Ë¾ÉêÃ÷¼°Ïò¿Í»§·¢Ë͵ÄÎ¥¹æÍ¨ÖªÏÔʾ£¬£¬Ð¹Â¶Êý¾ÝÔ̺¬ÁªÏµ·½Ê½¡¢¡¢µ±¾ÖÉí·ÝÖ¤ÐÅÏ¢¡¢¡¢²ÆÕþÏêÇ飨ÈçÕ˺𢡢IPµØÖ·¡¢¡¢Éç»á±£Ïպ𢡢µ®ÉúÈÕÆÚ£©£¬£¬µ«Î´Éæ¼°×ʽðÇÔÈ¡»òÃÜÂëй¶¡£¹«Ë¾Ç¿µ÷ËùÓпͻ§ÕË»§°²È«£¬£¬²¢ÒÑͨ¹ýµç×ÓÓʼþ֪ͨÊÜÓ°ÏìÓû§£¬£¬ÌṩÁ½ÄêÃâ·ÑÐÅÓþ¼à¿Ø¡¢¡¢°µÍø¼à¿Ø¡¢¡¢Éí·Ý͵ÇÔ±£»¤ºÍ±£ÏÕ·þÎñ£¬£¬Í¬Ê±½¨ÒéÆôÓÃË«³É·ÖÈÏÖ¤¡¢¡¢Ô¤·ÀÃÜÂë·´¸´Ê¹Ó㬣¬²¢¾¯ÌèÍøÂç´¹µö¹¥»÷¡£Wealthsimple½²»°È˰µÊ¾¡°¸ÃÊÂÎñÓëSalesforceÎ޹ء±¡£¹«Ë¾Î´Åû¶¹¥»÷Õß¾ßÌåÈëÇÖ¼¿Á©£¬£¬½öÖ¸³ö·ì϶ԴÓÚµÚÈý·½Èí¼þ°ü¡£
https://www.bleepingcomputer.com/news/security/financial-services-firm-wealthsimple-discloses-data-breach/
5. Nx¡°s1ngularity¡±¹©¸øÁ´¹¥»÷£º£ºAI¹¤¾ßÀÄÓÃÖÂÊýǧ»úÃÜй¶
9ÔÂ6ÈÕ£¬£¬½üÆÚÕë¶Ô¿ªÔ´¹¹½¨¹¤¾ßNxµÄ¡°s1ngularity¡±¹©¸øÁ´¹¥»÷·¢×÷£¬£¬¹¥»÷Õßͨ¹ý´Û¸ÄGitHub Actions¹¤×÷Á÷ÔÚNPM°ä²¼º¬¡°telemetry.js¡±¶ñÒâÈí¼þµÄNx°ü¡£¸Ã¶ñÒâÈí¼þÕë¶ÔLinux/macOSϵͳ£¬£¬ÀûÓÃClaude¡¢¡¢Q¡¢¡¢GeminiµÈAI¹¤¾ßµÄLLMÌáÐÑÇÔÈ¡GitHubÁîÅÆ¡¢¡¢npmÁîÅÆ¡¢¡¢SSHÃÜÔ¿µÈÃô¸ÐÐÅÏ¢£¬£¬²¢ÉÏ´«ÖÁ¡°s1ngularity-repository¡±¹«¹²´æ´¢¿â¡£Wiz¹ýºóÆÀ¹ÀÏÔʾ£¬£¬ÊÂÎñ·ÖÈý½×¶Îµ¼ÖÂ2,180¸öÕË»§¡¢¡¢7,200¸ö´æ´¢¿âй¶£¬£¬³¬2,000¸öΨһ»úÃܼ°20,000¸öÎļþ¶³ö£¬£¬ÇÒ´óÁ¿»úÃÜÈÔÓÐЧ£¬£¬Ó°Ïì³ÖÐøÀ©´ó¡£¹¥»÷·ÖÈý½×¶Î£º£ºÊ׽׶Σ¨8ÔÂ26-27ÈÕ£©Ö±½ÓÓ°Ïì1,700Óû§£¬£¬Ð¹Â¶³¬2,000»úÃÜ£»´Î½×¶Î£¨8ÔÂ28-29ÈÕ£©¹¥»÷ÕßÀûÓÃй¶µÄGitHubÁîÅÆ½«Ë½ÓпâתΪ¹«¹²¿â²¢Öض¨Ãû£¬£¬µ¼ÖÂ480¸öÕË»§£¨¶àΪ×éÖ¯£©¼°6,700¸ö´æ´¢¿âÊÜËð£»Ä©½×¶Î£¨8ÔÂ31ÈÕ£©¹¥»÷ÕßÕë¶ÔÌØ¶¨×éÖ¯£¬£¬Í¨¹ý±»¿ØÕË»§°ä²¼500¸ö¸öÈË´æ´¢¿â¡£GitHubËäÔÚ°ËСʱÄÚɾ³ý¹¥»÷Õ߿⣬£¬µ«Êý¾ÝÒѱ»¸´ÖÆ¡£NxÍŶӹýºó·ÖÎöÖ¸³ö£¬£¬ÈëÇÖÔ´ÓÚÀȡҪÇó±êÌâ×¢Èë¼°pull_request_targetµÄ²»°²È«Ê¹Ó㬣¬Ê¹¹¥»÷ÕßÒÔÌáÉýȨÏÞÔËÐдúÂ룬£¬´¥·¢°ä²¼¹ÜµÀ²¢Ð¹Â¶npmÁîÅÆ¡£
https://www.bleepingcomputer.com/news/security/ai-powered-malware-hit-2-180-github-accounts-in-s1ngularity-attack/
6. VirusTotal¸æ·¢SVGÎļþÖеÄÍøÂç´¹µö¹¥»÷
9ÔÂ6ÈÕ£¬£¬VirusTotalͨ¹ýÆäAI Code Insightƽ̨ÐÂÔöSVGÖ§³Öºó£¬£¬·¢ÏÖһ·ÀûÓÃSVGÎļþÖ´ÐеÄÍøÂç´¹µö¹¥»÷»î¶¯£¬£¬¸Ã»î¶¯¼ÙÒâ¸çÂ×±ÈÑÇ˾·¨ÏµÍ³ÃÅ»§ÍøÕ¾´«²¼¶ñÒâÈí¼þ¡£SVG×÷Ϊ¿ÉËõ·ÅʸÁ¿Í¼ÐÎÌåʽ£¬£¬¿Éͨ¹ýÔªËØÇ¶ÈëHTMLºÍJavaScript£¬£¬ÔÚ¼ÓÔØÊ±Ö´ÐдúÂ룬£¬ÕâÒ»¸öÐÔ±»ÍþвÐÐΪÕßÀÄÓ᣹¥»÷ÖУ¬£¬SVGÎļþäÖȾÐéαµ±¾ÖÃÅ»§ÍøÕ¾£¬£¬ÏÔÊ¾ÕæÇеÄÏÂÔØ½ø¶ÈÌõ¼°°¸Àý±àºÅ¡¢¡¢°²È«ÁîÅÆµÈÐÅÀµÌáÐÑ£¬£¬ÓÕµ¼Óû§ÏÂÔØÃÜÂë±£»¤µÄZIPѹËõ°ü£¬£¬ÃÜÂëÖ±½ÓÏÔʾÔÚÒ³ÃæÉÏ¡£¾·ÖÎö£¬£¬ÌáÈ¡µÄZIPÎļþÔ̺¬¼Ù×°³É¹Ù·½Ë¾·¨ÎļþµÄComodo Dragonä¯ÀÀÆ÷¿ÉÖ´ÐÐÎļþ¡¢¡¢¶ñÒâDLL¼°Á½¸ö¼ÓÃÜÎļþ¡£Óû§ÔËÐпÉÖ´ÐÐÎļþʱ£¬£¬¶ñÒâDLL»á±»²àÔØ£¬£¬½ø¶øÔÚϵͳÖÐ×°Öøü¶à¶ñÒâÈí¼þ¡£VirusTotalÖ¸³ö£¬£¬´ËÀ๥»÷ÒòSVGÖ§³Ö¸´ÔÓ½»»¥ÇÒ·À²¡¶¾Èí¼þ¼ì²âÂʵͣ¬£¬Ò×Ìӱܴ«Í³°²È«¼ì²â¡£Õâ´ÎÊÂÎñÖУ¬£¬AI Code Insightͨ¹ý»úеѧϰ·ÖÎöÎļþÐÐΪ£¬£¬¼ø±ð³öSVGÖаµ²ØµÄJavaScriptÖ´ÐÐHTMLµÄÒì³£ÐÐΪ£¬£¬³ÉΪ¸æ·¢¹¥»÷µÄ¹Ø¼ü¡£¸Ã¹¤¾ßÌìÉúµÄ¿ÉÒÉÐÐΪÌáÒªÔ®ÊÖ×êÑÐÈËÔ±¼±¾ç¶¨Î»¶ñÒâ»î¶¯¡£½øÒ»´ëÊ©²é·¢ÏÖ£¬£¬523¸öÏÈǰÉÏ´«µÄSVGÎļþͬÊô¸Ã»î¶¯£¬£¬µ«´Ëǰ¾ùδ±»°²È«Èí¼þÏóÕ÷Ϊ¶ñÒâ¡£
https://www.bleepingcomputer.com/news/security/virustotal-finds-hidden-malware-phishing-campaign-in-svg-files/


¾©¹«Íø°²±¸11010802024551ºÅ