ºÚ¿ÍʹÓÃSitecoreÁãÈÕÎó²îCVE-2025-53690°²ÅźóÃÅ

Ðû²¼Ê±¼ä 2025-09-08

1. ºÚ¿ÍʹÓÃSitecoreÁãÈÕÎó²îCVE-2025-53690°²ÅźóÃÅ


9ÔÂ4ÈÕ£¬£¬£¬£¬ £¬ÍþвÐÐΪÕßͨ¹ý¾É°æSitecore°²ÅÅÖеÄÁãÈÕÎó²îCVE-2025-53690Ìᳫ¹¥»÷£¬£¬£¬£¬ £¬¸ÃÎó²îÔ´ÓÚ2017ÄêǰSitecoreÖ¸ÄÏÖйûÕæµÄʾÀýASP.NET»úеÃÜÔ¿±»Éú²úÇéÐÎÖØ¸´Ê¹Ó㬣¬£¬£¬ £¬µ¼ÖÂViewState·´ÐòÁл¯Îó²îÒý·¢Ô¶³Ì´úÂëÖ´ÐУ¨RCE£©¡£¡£¡£¹¥»÷ÕßÕë¶Ôº¬Î´ÂÄÀúÖ¤ViewState×ֶεġ°/sitecore/blocked.aspx¡±¶Ëµã£¬£¬£¬£¬ £¬ÔÚIISÍøÂçЧÀÍÕË»§ÏÂÖ´ÐжñÒâ¡°_VIEWSTATE¡±¸ºÔØ£¬£¬£¬£¬ £¬°²ÅÅWeepSteelÕì̽ºóÃÅ¡£¡£¡£¸Ã¶ñÒâÈí¼þ¿ÉÇÔȡϵͳ¡¢Àú³Ì¡¢´ÅÅ̼°ÍøÂçÐÅÏ¢£¬£¬£¬£¬ £¬Î±×°³É±ê×¼ViewStateÏìÓ¦Íâ´«£¬£¬£¬£¬ £¬²¢Ö´ÐÐwhoami¡¢ipconfigµÈÕì̽ÏÂÁî¡£¡£¡£¹¥»÷½øÈë¶à½×¶ÎÀ©Õ¹£ººÚ¿Í°²ÅÅEarthwormÍøÂçËíµÀ¡¢DwagentÔ¶³Ì»á¼û¹¤¾ß¼°7-ZipѹËõ¹¤¾ß£¬£¬£¬£¬ £¬½¨ÉèÍâµØÖÎÀíÔ±ÕË»§£¨Èç¡°asp$¡±£©¡¢×ª´¢SAM/SYSTEMƾ֤£¬£¬£¬£¬ £¬²¢Í¨¹ýGoTokenTheft¾ÙÐÐÁîÅÆÄ£ÄâÌáÉýȨÏÞ¡£¡£¡£ÎªÎ¬³Ö³¤ÆÚÐÔ£¬£¬£¬£¬ £¬¹¥»÷Õß½ûÓÃÕË»§ÃÜÂëÓâÆÚ¡¢ÊÚÓèRDPȨÏÞ£¬£¬£¬£¬ £¬²¢½«Dwagent×¢²áΪϵͳЧÀÍ¡£¡£¡£SitecoreÁªºÏMandiantÐû²¼Ç徲ͨ¸æ£¬£¬£¬£¬ £¬½¨ÒéÖÎÀíÔ±Á¬Ã¦Ìæ»»web.configÖÐËùÓо²Ì¬ÖµÎªÎ¨Ò»ÐÂÃÜÔ¿£¬£¬£¬£¬ £¬²¢¼ÓÃÜÔªËØ£¬£¬£¬£¬ £¬Í¬Ê±Ç¿µ÷°´ÆÚÂÖ»»¾²Ì¬»úеÃÜÔ¿×÷Ϊºã¾ÃÇå¾²²½·¥¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-exploited-sitecore-zero-day-flaw-to-deploy-backdoors/


2. ·ÆÂɱö¶«ÄÏ´óѧÊý¾Ý¿âÉæÏÓй¶£¬£¬£¬£¬ £¬Ñ§ÉúÊý¾Ý±»³öÊÛ


9ÔÂ3ÈÕ£¬£¬£¬£¬ £¬Ò»ÃûÍþвÐÐΪÕßÈëÇÖÁË·ÆÂɱö¶«ÄÏ´óѧ (USeP)£¬£¬£¬£¬ £¬²¢ÔÚ°µÍøÂÛ̳ÉϳöÊÛÆäÊý¾Ý¿â¡£¡£¡£USeP ÊÇÒ»ËùÖøÃûµÄÖÝÁ¢´óѧ£¬£¬£¬£¬ £¬Î»ÓÚ·ÆÂɱöÃÞÀ¼ÀϵºµÄ´ïÎÖÊС£¡£¡£×÷Ϊ¸ÃµØÇøÖ÷ÒªµÄ¹«¹²Ñо¿ºÍ½ÌÓý»ú¹¹£¬£¬£¬£¬ £¬¸ÃÐ£ÕÆÎÕ×Å´ó×ÚʦÉúÊý¾Ý¡£¡£¡£´Ë´ÎÈëÇÖÊÂÎñй¶ÁËÃô¸ÐÐÅÏ¢£¬£¬£¬£¬ £¬¶ÔÉæ°¸Ö°Ô±×é³ÉΣº¦¡£¡£¡£ÍþвÐÐΪÕßÉù³Æ£¬£¬£¬£¬ £¬±»ÈëÇÖµÄÊý¾Ý¿â¾ÞϸÁè¼Ý 20MB£¬£¬£¬£¬ £¬°üÀ¨Ò»¸ö SQL Îļþ£¬£¬£¬£¬ £¬°üÀ¨Áè¼Ý 175,000 ÐÐÊý¾Ý¡£¡£¡£¾Ý³Æ£¬£¬£¬£¬ £¬Ð¹Â¶µÄÐÅÏ¢°üÀ¨´ó×ÚѧÉúµÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢ (PII)£¬£¬£¬£¬ £¬ÀýÈçÈ«Ãû¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¡¢¼ÒͥסַºÍѧҵÏêÇé¡£¡£¡£ÂÛ̳Ìû×ÓÁгöÁËÐí¶à¾Ý³Æ±»Ð¹Â¶µÄÊý¾Ý¿â±í£¬£¬£¬£¬ £¬Åú×¢±¬·¢ÁËÖÜÈ«µÄÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¾Ý³Æ£¬£¬£¬£¬ £¬±»ÈëÇֵıí°üÀ¨£º±à¼­ÇëÇó¡¢ÒÑ×¢²á¡¢È«ÇòµÄ¡¢Í¼Æ¬¡¢¼à¿Ø¡¢Î»Öá¢ÇëÇó±í¡¢ÇëÇó±í12¡¢ÇëÇó±í¾É¡¢studrecords¡¢ÏµÍ³ÈÕÖ¾¡¢ÉúÒ⡢ʵÑé¡¢Óû§¡£¡£¡£


https://dailydarkweb.net/university-of-southeastern-philippines-database-allegedly-breached-student-data-for-sale/


3. SAP S/4HANA¸ßΣÎó²îCVE-2025-42957ÔâÒ°ÍâʹÓÃ


9ÔÂ5ÈÕ£¬£¬£¬£¬ £¬Ñо¿Ö°Ô±ÖÒÑԳƣ¬£¬£¬£¬ £¬SAP S/4HANA±£´æÒ»¸öÑÏÖØµÄ´úÂë×¢ÈëÎó²îCVE-2025-42957£¬£¬£¬£¬ £¬¸ÃÎó²îÕýÔÚ±»Ò°Íâ¹¥»÷ʹÓ㬣¬£¬£¬ £¬ÒÔ¹¥ÆÆÌ»Â¶µÄЧÀÍÆ÷¡£¡£¡£¸ÃÎó²îÔ´ÓÚSAP S/4HANAÖÐRFC¹ûÕæ¹¦Ð§Ä£¿£¿£¿£¿éµÄABAP´úÂë×¢ÈëÎÊÌ⣬£¬£¬£¬ £¬ÔÊÐíµÍȨÏÞÉí·ÝÑéÖ¤Óû§×¢Èëí§Òâ´úÂë¡¢ÈÆ¹ýÊÚȨ²¢ÍêÈ«½ÓÊÜSAPϵͳ¡£¡£¡£¹©Ó¦ÉÌSAPÒÑÓÚ2025Äê8ÔÂ11ÈÕÐÞ¸´´ËÎó²î£¬£¬£¬£¬ £¬²¢½«ÆäÆÀ¶¨ÎªÑÏÖØÎó²î£¬£¬£¬£¬ £¬CVSSÆÀ·Ö¸ß´ï9.9·Ö¡£¡£¡£È»¶ø£¬£¬£¬£¬ £¬²¿·ÖϵͳÉÐδӦÓøÃÇå¾²¸üУ¬£¬£¬£¬ £¬ÕâЩδÐÞ²¹µÄϵͳÒѳÉΪºÚ¿Í¹¥»÷µÄÄ¿µÄ¡£¡£¡£¾ÝSecurityBridge±¨¸æ£¬£¬£¬£¬ £¬CVE-2025-42957ÏÖÔÚÈÔÔÚÒ°Íâ±»Æð¾¢Ê¹Ó㬣¬£¬£¬ £¬Ö»¹ÜʹÓÃˮƽÓÐÏÞ¡£¡£¡£SecurityBridgeÓÚ2025Äê6ÔÂ27ÈÕ·¢Ã÷¸ÃÎó²î²¢ÈÏÕæÈεØÏòSAP±¨¸æ£¬£¬£¬£¬ £¬»¹Ð­Öú¿ª·¢Á˲¹¶¡¡£¡£¡£µ«ÓÉÓÚÊÜÓ°Ïì×é¼þµÄ¿ª·ÅÐÔÒÔ¼°ABAP´úÂëµÄ¹ûÕæÐÔ£¬£¬£¬£¬ £¬ÊÖÒÕ¸ßÃ÷µÄÍþвÐÐΪÕßÄܹ»ÇáËÉÄæÏò¹¤³Ì²¹¶¡£¬£¬£¬£¬ £¬×ÔÐз¢Ã÷Îó²î¡£¡£¡£¸ÃÎó²îµÄDZÔÚЧ¹û°üÀ¨Êý¾Ý͵ÇÔ¡¢Êý¾ÝʹÓᢴúÂë×¢È롢ͨ¹ý½¨ÉèºóÃÅÕË»§ÌáÉýȨÏÞ¡¢Æ¾Ö¤ÍµÇÔÒÔ¼°Í¨¹ý¶ñÒâÈí¼þ¡¢ÀÕË÷Èí¼þµÈ·½·¨ÖÐÖ¹ÔËÓª¡£¡£¡£SecurityBridge»¹ÖÆ×÷ÁËÊÓÆµÑÝʾÔõÑùʹÓøÃÎó²îÔÚSAPЧÀÍÆ÷ÉÏÔËÐÐϵͳÏÂÁî¡£¡£¡£


https://www.bleepingcomputer.com/news/security/critical-sap-s-4hana-vulnerability-now-exploited-in-attacks/


4. WealthsimpleÅû¶Êý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬ £¬³¬300Íò¿Í»§ÊÜÓ°Ïì


9ÔÂ5ÈÕ£¬£¬£¬£¬ £¬¼ÓÄôóÔÚÏßͶ×ÊÖÎÀí¾ÞÍ·WealthsimpleÅû¶һÆðÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬ £¬¹¥»÷Õßͨ¹ýÈëÇÖµÚÈý·½±àдµÄÈí¼þ°ü£¬£¬£¬£¬ £¬Î´¾­ÊÚȨ»á¼ûÁ˲»µ½1%¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¸Ã¹«Ë¾½¨ÉèÓÚ2014Ä꣬£¬£¬£¬ £¬×ܲ¿Î»ÓÚ¶àÂ׶࣬£¬£¬£¬ £¬ÖÎÀí×ʲú³¬845ÒÚ¼ÓÔª£¬£¬£¬£¬ £¬Ð§Àͳ¬300Íò¼ÓÄôóÈË£¬£¬£¬£¬ £¬º­¸ÇͶ×Ê¡¢ÉúÒâ¡¢¼ÓÃÜÇ®±Ò¡¢±¨Ë°¡¢ÏûºÄºÍ´¢±¸µÈ½ðÈÚ²úÆ·£¬£¬£¬£¬ £¬ÆäAndroidÓ¦ÓÃÏÂÔØÁ¿³¬100Íò´Î£¬£¬£¬£¬ £¬iOSÓ¦Óûñ³¬12.6ÍòÌõÆÀ·Ö¡£¡£¡£¾Ý¹«Ë¾ÉùÃ÷¼°Ïò¿Í»§·¢Ë͵ÄÎ¥¹æÍ¨ÖªÏÔʾ£¬£¬£¬£¬ £¬Ð¹Â¶Êý¾Ý°üÀ¨ÁªÏµ·½·¨¡¢Õþ¸®Éí·ÝÖ¤ÐÅÏ¢¡¢²ÆÎñÏêÇ飨ÈçÕ˺š¢IPµØµã¡¢Éç»á°ü¹ÜºÅ¡¢³öÉúÈÕÆÚ£©£¬£¬£¬£¬ £¬µ«Î´Éæ¼°×ʽðÇÔÈ¡»òÃÜÂëй¶¡£¡£¡£¹«Ë¾Ç¿µ÷ËùÓпͻ§ÕË»§Çå¾²£¬£¬£¬£¬ £¬²¢ÒÑͨ¹ýµç×ÓÓʼþ֪ͨÊÜÓ°ÏìÓû§£¬£¬£¬£¬ £¬ÌṩÁ½ÄêÃâ·ÑÐÅÓÃ¼à¿Ø¡¢°µÍø¼à¿Ø¡¢Éí·Ý͵ÇÔ±£»£»£»£»£»£»¤ºÍ°ü¹ÜЧÀÍ£¬£¬£¬£¬ £¬Í¬Ê±½¨ÒéÆôÓÃË«ÒòËØÈÏÖ¤¡¢×èÖ¹ÃÜÂëÖØ¸´Ê¹Ó㬣¬£¬£¬ £¬²¢Ð¡ÐÄÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£Wealthsimple½²»°ÈËÌåÏÖ¡°¸ÃÊÂÎñÓëSalesforceÎ޹ء±¡£¡£¡£¹«Ë¾Î´Åû¶¹¥»÷ÕßÏêϸÈëÇÖÊֶΣ¬£¬£¬£¬ £¬½öÖ¸³öÎó²îÔ´ÓÚµÚÈý·½Èí¼þ°ü¡£¡£¡£


https://www.bleepingcomputer.com/news/security/financial-services-firm-wealthsimple-discloses-data-breach/


5. Nx¡°s1ngularity¡±¹©Ó¦Á´¹¥»÷£ºAI¹¤¾ßÀÄÓÃÖÂÊýǧÉñÃØÐ¹Â¶


9ÔÂ6ÈÕ£¬£¬£¬£¬ £¬½üÆÚÕë¶Ô¿ªÔ´¹¹½¨¹¤¾ßNxµÄ¡°s1ngularity¡±¹©Ó¦Á´¹¥»÷±¬·¢£¬£¬£¬£¬ £¬¹¥»÷Õßͨ¹ý¸Ä¶¯GitHub ActionsÊÂÇéÁ÷ÔÚNPMÐû²¼º¬¡°telemetry.js¡±¶ñÒâÈí¼þµÄNx°ü¡£¡£¡£¸Ã¶ñÒâÈí¼þÕë¶ÔLinux/macOSϵͳ£¬£¬£¬£¬ £¬Ê¹ÓÃClaude¡¢Q¡¢GeminiµÈAI¹¤¾ßµÄLLMÌáÐÑÇÔÈ¡GitHubÁîÅÆ¡¢npmÁîÅÆ¡¢SSHÃÜÔ¿µÈÃô¸ÐÐÅÏ¢£¬£¬£¬£¬ £¬²¢ÉÏ´«ÖÁ¡°s1ngularity-repository¡±¹«¹²´æ´¢¿â¡£¡£¡£WizʺóÆÀ¹ÀÏÔʾ£¬£¬£¬£¬ £¬ÊÂÎñ·ÖÈý½×¶Îµ¼ÖÂ2,180¸öÕË»§¡¢7,200¸ö´æ´¢¿âй¶£¬£¬£¬£¬ £¬³¬2,000¸öΨһÉñÃØ¼°20,000¸öÎļþ̻¶£¬£¬£¬£¬ £¬ÇÒ´ó×ÚÉñÃØÈÔÓÐÓ㬣¬£¬£¬ £¬Ó°ÏìÒ»Á¬À©´ó¡£¡£¡£¹¥»÷·ÖÈý½×¶Î£ºÊ׽׶Σ¨8ÔÂ26-27ÈÕ£©Ö±½ÓÓ°Ïì1,700Óû§£¬£¬£¬£¬ £¬Ð¹Â¶³¬2,000ÉñÃØ£»£»£»£»£»£»´Î½×¶Î£¨8ÔÂ28-29ÈÕ£©¹¥»÷ÕßʹÓÃй¶µÄGitHubÁîÅÆ½«Ë½ÓпâתΪ¹«¹²¿â²¢ÖØÃüÃû£¬£¬£¬£¬ £¬µ¼ÖÂ480¸öÕË»§£¨¶àΪ×éÖ¯£©¼°6,700¸ö´æ´¢¿âÊÜË𣻣»£»£»£»£»Ä©½×¶Î£¨8ÔÂ31ÈÕ£©¹¥»÷ÕßÕë¶ÔÌØ¶¨×éÖ¯£¬£¬£¬£¬ £¬Í¨¹ý±»¿ØÕË»§Ðû²¼500¸ö˽ÈË´æ´¢¿â¡£¡£¡£GitHubËäÔÚ°ËСʱÄÚɾ³ý¹¥»÷Õ߿⣬£¬£¬£¬ £¬µ«Êý¾ÝÒѱ»¸´ÖÆ¡£¡£¡£NxÍŶÓʺóÆÊÎöÖ¸³ö£¬£¬£¬£¬ £¬ÈëÇÖÔ´ÓÚÀ­È¡ÇëÇóÎÊÌâ×¢Èë¼°pull_request_targetµÄ²»Ç徲ʹÓ㬣¬£¬£¬ £¬Ê¹¹¥»÷ÕßÒÔÌáÉýȨÏÞÔËÐдúÂ룬£¬£¬£¬ £¬´¥·¢Ðû²¼¹ÜµÀ²¢Ð¹Â¶npmÁîÅÆ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ai-powered-malware-hit-2-180-github-accounts-in-s1ngularity-attack/


6. VirusTotal½ÒÆÆSVGÎļþÖеÄÍøÂç´¹ÂÚ¹¥»÷


9ÔÂ6ÈÕ£¬£¬£¬£¬ £¬VirusTotalͨ¹ýÆäAI Code Insightƽ̨ÐÂÔöSVGÖ§³Öºó£¬£¬£¬£¬ £¬·¢Ã÷Ò»ÆðʹÓÃSVGÎļþʵÑéµÄÍøÂç´¹ÂÚ¹¥»÷»î¶¯£¬£¬£¬£¬ £¬¸Ã»î¶¯Ã°³ä¸çÂ×±ÈÑÇ˾·¨ÏµÍ³ÃÅ»§ÍøÕ¾Èö²¥¶ñÒâÈí¼þ¡£¡£¡£SVG×÷Ϊ¿ÉËõ·ÅʸÁ¿Í¼ÐÎÃûÌ㬣¬£¬£¬ £¬¿Éͨ¹ýÔªËØÇ¶ÈëHTMLºÍJavaScript£¬£¬£¬£¬ £¬ÔÚ¼ÓÔØÊ±Ö´ÐдúÂ룬£¬£¬£¬ £¬ÕâÒ»ÌØÕ÷±»ÍþвÐÐΪÕßÀÄÓᣡ£¡£¹¥»÷ÖУ¬£¬£¬£¬ £¬SVGÎļþäÖȾÐéαÕþ¸®ÃÅ»§ÍøÕ¾£¬£¬£¬£¬ £¬ÏÔʾ±ÆÕæµÄÏÂÔØ½ø¶ÈÌõ¼°°¸Àý±àºÅ¡¢Çå¾²ÁîÅÆµÈÐÅÈÎÌáÐÑ£¬£¬£¬£¬ £¬ÓÕµ¼Óû§ÏÂÔØÃÜÂë±£»£»£»£»£»£»¤µÄZIPѹËõ°ü£¬£¬£¬£¬ £¬ÃÜÂëÖ±½ÓÏÔʾÔÚÒ³ÃæÉÏ¡£¡£¡£¾­ÆÊÎö£¬£¬£¬£¬ £¬ÌáÈ¡µÄZIPÎļþ°üÀ¨Î±×°³É¹Ù·½Ë¾·¨ÎļþµÄComodo Dragonä¯ÀÀÆ÷¿ÉÖ´ÐÐÎļþ¡¢¶ñÒâDLL¼°Á½¸ö¼ÓÃÜÎļþ¡£¡£¡£Óû§ÔËÐпÉÖ´ÐÐÎļþʱ£¬£¬£¬£¬ £¬¶ñÒâDLL»á±»²àÔØ£¬£¬£¬£¬ £¬½ø¶øÔÚϵͳÖÐ×°Öøü¶à¶ñÒâÈí¼þ¡£¡£¡£VirusTotalÖ¸³ö£¬£¬£¬£¬ £¬´ËÀ๥»÷ÒòSVGÖ§³ÖÖØ´ó½»»¥ÇÒ·À²¡¶¾Èí¼þ¼ì²âÂʵÍ£¬£¬£¬£¬ £¬Ò×ÌӱܹŰåÇå¾²¼ì²â¡£¡£¡£´Ë´ÎÊÂÎñÖУ¬£¬£¬£¬ £¬AI Code Insightͨ¹ý»úеѧϰÆÊÎöÎļþÐÐΪ£¬£¬£¬£¬ £¬Ê¶±ð³öSVGÖÐÒþ²ØµÄJavaScriptÖ´ÐÐHTMLµÄÒì³£ÐÐΪ£¬£¬£¬£¬ £¬³ÉΪ½ÒÆÆ¹¥»÷µÄÒªº¦¡£¡£¡£¸Ã¹¤¾ßÌìÉúµÄ¿ÉÒÉÐÐΪժҪ×ÊÖúÑо¿Ö°Ô±¿ìËÙ¶¨Î»¶ñÒâ»î¶¯¡£¡£¡£½øÒ»³ÌÐò²é·¢Ã÷£¬£¬£¬£¬ £¬523¸öÏÈǰÉÏ´«µÄSVGÎļþͬÊô¸Ã»î¶¯£¬£¬£¬£¬ £¬µ«´Ëǰ¾ùδ±»Çå¾²Èí¼þ±ê¼ÇΪ¶ñÒâ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/virustotal-finds-hidden-malware-phishing-campaign-in-svg-files/