React Native Metro·þÎñÆ÷·ì϶ÔâºÚ¿ÍÀûÓÃ

°ä²¼¹¦·ò 2026-02-05

1. React Native Metro·þÎñÆ÷·ì϶ÔâºÚ¿ÍÀûÓÃ


2ÔÂ3ÈÕ£¬ºÚ¿ÍÕýÀûÓÃReact NativeĬÈÏ´ò°ü¹¤¾ßMetro·þÎñÆ÷ÖеÄÑÏÖØ·ì϶CVE-2025-11953ÌáÒé¹¥»÷£¬ÔÚWindowsºÍLinuxϵͳִÐжñÒâ´úÂë¡£¡£¡£¸Ã·ì϶ÓÉÈí¼þ¹©¸øÁ´°²È«¹«Ë¾JFrogÓÚ2025Äê11Ô·¢ÏÖ²¢¹«¿ª£¬Ó°Ïì@react-native-community/cli-server-api°æ±¾4.8.0ÖÁ20.0.0-alpha.2£¬20.0.0¼°ÒÔÉϰ汾ÒÑÐÞ¸´¡£¡£¡£¹¥»÷Õßͨ¹ýÏò¶³öµÄ/open-url HTTP¶Ëµã·¢ËÍÔ̺¬¶ñÒâURLµÄPOSTÒªÇóÖ´Ðй¥»÷¡£¡£¡£ÔÚWindowsϵͳÖУ¬Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÖ±½ÓÖ´ÐÐËÁÒâ²Ù×÷ϵͳºÅÁLinuxºÍmacOSϵͳÔò¿ÉÄÜÔËÐÐÊÜÏÞ²ÎÊýµÄËÁÒâ¿ÉÖ´ÐÐÎļþ¡£¡£¡£·ì϶ÀûÓõÄÖ÷ÌâÔÚÓڶ˵ãδ¶ÔÓû§ÌṩµÄURLÖµ½øÐÐËãÕÊ£¬Ö±½Ó´«µÝ¸ø'open()'º¯Êý£¬µ¼ÖºÅÁî×¢Èë·çÏÕ¡£¡£¡£2025Äê12ÔÂ21ÈÕÆð£¬·ì϶µý±¨¹«Ë¾VulnCheck¼à²âµ½ÃûΪ"Metro4Shell"µÄ¹¥»÷Ðж¯£¬¹¥»÷ÕßÓÚ1ÔÂ4ÈÕºÍ21ÈÕ³ÖÐøÊ¹ÓÃÒ»ÑùÔØºÉ¹¥»÷¡£¡£¡£¹¥»÷ÔØºÉΪbase-64±àÂëµÄPowerShell¾ç±¾£¬½âÂëºóÖ´ÐÐÒÔϲÙ×÷£º½ûÓÃMicrosoft Defender¶Ô¹¤×÷Ŀ¼ºÍһʱĿ¼µÄ·À»¤£¬³ÉÁ¢Óë¹¥»÷Õß½ÚÀñ·þÎñÆ÷µÄTCPÏνÓ£¬ÏÂÔØ²¢Ö´Ðжþ½øÖÆÎļþ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-react-native-metro-bug-to-breach-dev-systems/


2. CISAÖÒ¸æÀÕË÷Èí¼þÍÅ»ïÀûÓÃVMware ESXi·ì϶


2ÔÂ4ÈÕ£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©½üÈÕ֤ʵ£¬ÀÕË÷Èí¼þÍÅ»ïÒÑÆðÍ·ÀûÓÃVMware ESXiɳÏäÌÓÒݸßΣ·ì϶£¨CVE-2025-22225£©ÌáÒé¹¥»÷£¬¸Ã·ì϶´ËÇ°Ôø±»ÓÃÓÚÁãÈÕ¹¥»÷¡£¡£¡£²©Í¨¹«Ë¾ÓÚ2025Äê3ÔÂÐÞ¸´ÁËÕâÒ»ËÁÒâдÈë·ì϶£¬Í¬Ê±ÐÞ¸´ÁËÄÚ´æÐ¹Â©·ì϶£¨CVE-2025-22226£©ºÍTOCTOU·ì϶£¨CVE-2025-22224£©£¬²¢ÏóÕ÷ΪÕýÔÚ±»»ý¼«ÀûÓõÄÁãÈÕ·ì϶¡£¡£¡£¾Ý²©Í¨¹«Ë¾Åû¶£¬ÔÚVMX¹ý³ÌÖÐÕ¼ÓÐÌØÈ¨µÄ¶ñÒâÐÐΪÕ߿ɴ¥·¢ËÁÒâÄÚºËдÈ룬µ¼ÖÂɳÏäÌÓÒÝ¡£¡£¡£ÕâЩ·ì϶ӰÏìVMware ESXi¡¢¡¢Fusion¡¢¡¢Cloud Foundation¡¢¡¢vSphere¡¢¡¢Workstation¼°Telco Cloud PlatformµÈ²úÆ·£¬¹¥»÷Õ߿ɴ®Áª·ì϶ÌÓÀëÐé¹¹»úɳÏä¡£¡£¡£ÍøÂ簲ȫ¹«Ë¾HuntressµÄ»ã±¨Ö¸³ö£¬½²ÖÐÎĵÄÍþвÐÐΪÕß¿ÉÄÜ×Ô2024Äê2ÔÂÆð¾ÍÀûÓÃÕâЩ·ì϶ÌáÒ鸴ÔÓÁãÈÕ¹¥»÷¡£¡£¡£CISAÒѽ«CVE-2025-22225²ÎÓëÒÑÖªÀûÓ÷ì϶£¨KEV£©Ä¿Â¼£¬²¢ÒªÇóÁª°î»ú¹¹ÔÚ2025Äê3ÔÂ25ÈÕǰ±£»¤ÏµÍ³¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cisa-vmware-esxi-flaw-now-exploited-in-ransomware-attacks/


3. ÑÇÖÞ¶¥¼¶ÓòÃû¼°µ±¾Ö½ÌÓýÍøÕ¾ÔâNGINXÅäÖÃ×¢Èë¹¥»÷


2ÔÂ4ÈÕ£¬DataDog°²È«³¢ÊÔÊÒ½üÈÕÅû¶£¬¹¥»÷ÕßÕýÕë¶ÔÑÇÖÞ¶¥¼¶ÓòÃû£¨Èç.in¡¢¡¢.id¡¢¡¢.pe¡¢¡¢.bd¡¢¡¢.th£©¼°µ±¾Ö½ÌÓýÍøÕ¾£¨.edu¡¢¡¢.gov£©Ê¹ÓõÄNGINX·þÎñÆ÷£¬ÒÔ¼°BaotaÖ÷»úÖÎÀíÃæ°å²¿ÊðµÄNGINX×°Öã¬ÌáÒéÒñ±ÎµÄÁ÷Á¿½Ù³Ö¹¥»÷¡£¡£¡£¸Ã¹¥»÷ͨ¹ý×¢Èë¶ñÒâ"location"¿éÅú¸ÄNGINXÅäÖÃÎļþ£¬²¶»ñÌØ¶¨URLõè¾¶µÄ´«ÈëÒªÇó£¬ÖØÐ´URLºó¾­"proxy_pass"Ö¸ÁÁ÷Á¿×ª·¢ÖÁ¹¥»÷Õß½ÚÖÆµÄÓòÃû£¬×îÖÕ·ÓÉÖÁºó¶Ë»ù´¡ÉèÊ©¡£¡£¡£¹¥»÷ÕßÀûÓÃNGINXµÄ¸ºÔØÆ½ºâ¸öÐÔ£¬"proxy_pass"Ö¸Áî³£ÓÃÓÚ·ÓÉÒªÇóÖÁ±¸Ó÷þÎñÆ÷ÒÔÌáÉý»úÄÜ»ò¿¿µÃסÐÔ£¬Òò¶ø¸ÃÀÄÓÃÐÐΪ²»»á´¥·¢°²È«¾¯±¨¡£¡£¡£Îª¼Ù×°ºÏ·¨Á÷Á¿£¬¹¥»÷±£ÁôÁËÒªÇóÍ·£¨ÈçHost¡¢¡¢X-Real-IP¡¢¡¢User-Agent¡¢¡¢Referer£©¡£¡£¡£¸Ã¹¥»÷¼«¾ßÒñ±ÎÐÔ£º²»ÒÀÀµNGINX·ì϶£¬¶ñÒâÖ¸ÁîÖ±½ÓǶÈëÅäÖÃÎļþ£¬ÇÒÓû§Á÷Á¿ÈÔ¿É´ïÔ¤ÆÚÖ÷ÕŵØ£¬½öͨ¹ýרÃÅ¼à¿Ø·½Äܾõ²ì¹¥»÷Õß»ù´¡ÉèÊ©ºÛ¼£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-compromise-nginx-servers-to-redirect-user-traffic/


4. CISA´¹Î£¶½´ÙÐÞ²¹ÎåÄêÆÚGitLab¸ßΣ·ì϶


2ÔÂ4ÈÕ£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©½üÈÕ°ä²¼Ç¿ÖÆÐÔÖ¸ÁҪÇóÁª°îÃñÊÂÐÐÕþ²¿ÃÅ£¨FCEB£©»ú¹¹ÔÚ2026Äê2ÔÂ24ÈÕǰÐÞ²¹´æÔÚÎåÄêµÄGitLab·þÎñÆ÷¶ËÒªÇóαÔ죨SSRF£©·ì϶£¨CVE-2021-39935£©£¬¸Ã·ì϶Õý±»»ý¼«ÀûÓýøÐÐÍøÂç¹¥»÷¡£¡£¡£GitLabÓÚ2021Äê12ÔÂÐÞ¸´´Ë·ì϶ʱÅû¶£¬ÆäÓ°Ïì14.3.6֮ǰµÄ10.5°æ±¾¡¢¡¢14.4.4֮ǰµÄ14.4°æ±¾¼°14.5.2֮ǰµÄ14.5°æ±¾£¬ÔÊÐíδ¾­ÊÚȨµÄÍⲿÓû§Í¨¹ýCI Lint APIÖ´ÐзþÎñÆ÷¶ËÒªÇó£¬ÓÈÆäÔÚÓû§×¢²áÊÜÏÞʱ£¬·Ç¿ª·¢ÈËÔ±ÈԿɽӼû¸ÃAPI£¬×é³ÉÑÏÖØ°²È«·çÏÕ¡£¡£¡£CISAÒѽ«¸Ã·ì϶ÄÉÈë"ÒÑÖªÀûÓ÷ì϶£¨KEV£©"Ŀ¼£¬²¢Ô®ÒýÔ¼ÊøÐÔ²Ù×÷Ö¸ÁBOD£©22-01ÒªÇóÁª°î»ú¹¹²ÉÈ¡Ðж¯¡£¡£¡£Ö»¹ÜBOD 22-01½öÕë´ºÁª°î»ú¹¹£¬CISAÇ¿ÁÒ½¨Òé˽Ӫ²¿ÃÅ×éÖ¯ÓÅÏÈ·À»¤É豸£¬Ô¤·ÀÔâ·ê³ÖÐø¹¥»÷¡£¡£¡£»ú¹¹Ðè×ñÑ­¹©¸øÉÌÐÞ¸´Ö¸ÄÏ¡¢¡¢ÔÆ·þÎñBOD 22-01¹æ·¶£¬»òÎÞ·¨ÐÞ¸´Ê±Í£ÓÃÓйزúÆ·¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cisa-warns-of-five-year-old-gitlab-flaw-exploited-in-attacks/


5. ÍøÂç´¹µö»î¶¯¶Ô×¼ÆóÒµDropboxÕËºÅÆ¾Ö¤


2ÔÂ3ÈÕ£¬Forcepoint X-Labs½Òʾһ³¡ÀûÓÃÒñ±Î¼¼Êõ¶ã±Ü°²È«¼ì²âµÄ¶à½×¶ÎÍøÂç´¹µö¹¥»÷ÕýÔÚ³ÖÐø½øÐУ¬ÆäÖ÷ÌâÖ¸±êÊÇÇÔÈ¡³ÛÃûÔÆ´æ´¢·þÎñ£¨ÈçDropbox£©µÄÆóÒµÕËºÅÆ¾Ö¤¡£¡£¡£¸Ã¹¥»÷ÒÔαÔ촹Σ¹«Îñ»òÉÌÎñ²É¹ºÓйش¹µöÓʼþΪÆðµã£¬ÓʼþÄÚÈݼò¶Ìµ«¸ß¶È·ÂÕæÖ¸±êÓû§ÊìϤ»ú¹¹»òÁªÏµÈ˵ÄÐÎ×´£¬Í¨¹ý"´¹Î£ËßÇó"ÓÕµ¼ÊÕ¼þÈË´ò¿ªPDF¸½¼þ¡£¡£¡£ÕâÖÖ¼ò½àÉè¼ÆÊ¹Æä³É¹¦ÈƹýSPF¡¢¡¢DKIM¡¢¡¢DMARCµÈÓʼþÉí·ÝÈÏÖ¤»úÖÆ¡£¡£¡£µ±Óû§´ò¿ªPDFʱ£¬»á±»Êèµ¼µã»÷ÄÚǶµÄ¶ñÒâÁ´½Ó£¬¸ÃÁ´½Ó»ùÓÚAcro±íµ¥±àд£¬´ó·ù½µµÍ°²È«Èí¼þɨÃè¼ì²âÄÜÁ¦¡£¡£¡£Á´½Ó×îÖÕ½«Óû§µ¼Ïò¼Ù×°³É"¿ÉÐÅÔÆ´æ´¢"ƽ̨µÄÒ³Ãæ£¬²¢Ìø×ªÖÁ¼«¾ß¹Æ»óÐÔµÄαÔìDropboxµÇ¼½çÃæ¡£¡£¡£Forcepoint¸ß¼¶°²È«×êÑÐÔ±Hassan FaizanÖ¸³ö£¬¹¥»÷Õßͨ¹ýºÏ·¨ÔÆ»ù´¡ÉèÊ©½µµÍÓû§¾¯ÌèÐÔ£¬Èƹý»ùÓÚŵÑÔÆÀ¼¶ºÍÒÑÖª¶ñÒâÖ¸±êµÄ×Ô¶¯»¯°²È«¼ì²â¡£¡£¡£Ò»µ©Óû§ÊäÈëµÇ¼ƾ֤£¬ÆäÓû§ÃûºÍÃÜÂ뽫±»·¢ËÍÖÁ¹¥»÷Õß½ÚÖÆµÄTelegramƵµÀ¡£¡£¡£


https://www.infosecurity-magazine.com/news/password-stealing-phishing-pdf/


6. ³¬4ÍòWordPressÍøÕ¾ÊÜQuiz²å¼þSQL×¢Èë·ì϶Íþв


2ÔÂ4ÈÕ£¬ÍøÂ簲ȫ»ú¹¹Åû¶£¬³¬40,000¸öʹÓÃQuiz and Survey Master£¨QSM£©²å¼þµÄWordPressÍøÕ¾ÕýÃæ¶ÔCVE-2025-67987 SQL×¢Èë·ì϶·çÏÕ¡£¡£¡£¸Ã·ì϶´æÔÚÓÚ10.3.1¼°¸üÔç°æ±¾ÖУ¬ÔÊÐíÓµÓж©ÔÄÕß¼¶±ð»ò¸ü¸ßȨÏÞµÄÒÑÈÏÖ¤Óû§Í¨¹ýδ¾­ÑéÖ¤µÄREST API²ÎÊýÖ´ÐÐÊý¾Ý¿â×¢Èë¹¥»÷£¬ÎÞÐèÖÎÀíԱȨÏÞ¼´¿É×ÌÈŲéÎÊÂß¼­¡£¡£¡£QSM×÷Ϊ¿í·ºÓÃÓÚ´´½¨¿¼ÊÔ¡¢¡¢µ÷²éµÄ²å¼þ£¬Æä·ì϶ԴÓÚÕÆ¹Ü¼ìË÷¿¼ÊÔÌâÊý¾ÝµÄREST APIº¯Êý¡£¡£¡£¹¥»÷Õß¿ÉÀûÓÃÃûΪ"is_linking"µÄÒªÇó²ÎÊý£¬Í¨¹ý»ú¹ØÔ̺¬¶ñÒâSQLºÅÁîµÄÊäÈëÖµ£¬ÔÚδʹÓÃÔ¤´¦ÖÃÓï¾äµÄÇé¿öÏÂÖ±½ÓÆ´½ÓÖÁ²éÎÊÓï¾äÖС£¡£¡£Êý¾Ý¿â»á½«×¢ÈëÄÚÈÝÊÓΪ²éÎÊÖ¸ÁîÖ´ÐУ¬´Ó¶ø¿ÉÄÜʵÏÖÊý¾Ýй¶¡¢¡¢´Û¸Ä»òÌáȨµÈ¶ñÒâ²Ù×÷¡£¡£¡£ÐÞ¸´°æ±¾10.3.2ÓÚ12ÔÂ4ÈÕ°ä²¼£¬Í¨¹ýÇ¿ÖÆÊ¹ÓÃintvalº¯Êý½«"is_linking"²ÎÊýת»»ÎªÕûÊý£¬È·±£²éÎʽö´¦ÖÃÊýÖµÐÍÊý¾Ý£¬³¹µ××è¶Ï×¢Èëõè¾¶¡£¡£¡£


https://www.infosecurity-magazine.com/news/wordpress-sql-injection-flaw-40000/