ºÚ¿ÍʹÓÃSitecoreÁãÈÕÎó²îCVE-2025-53690°²ÅźóÃÅ
Ðû²¼Ê±¼ä 2025-09-081. ºÚ¿ÍʹÓÃSitecoreÁãÈÕÎó²îCVE-2025-53690°²ÅźóÃÅ
9ÔÂ4ÈÕ£¬£¬£¬£¬£¬ÍþвÐÐΪÕßͨ¹ý¾É°æSitecore°²ÅÅÖеÄÁãÈÕÎó²îCVE-2025-53690Ìᳫ¹¥»÷£¬£¬£¬£¬£¬¸ÃÎó²îÔ´ÓÚ2017ÄêǰSitecoreÖ¸ÄÏÖйûÕæµÄʾÀýASP.NET»úеÃÜÔ¿±»Éú²úÇéÐÎÖØ¸´Ê¹Ó㬣¬£¬£¬£¬µ¼ÖÂViewState·´ÐòÁл¯Îó²îÒý·¢Ô¶³Ì´úÂëÖ´ÐУ¨RCE£©¡£¡£¡£¹¥»÷ÕßÕë¶Ôº¬Î´ÂÄÀúÖ¤ViewState×ֶεġ°/sitecore/blocked.aspx¡±¶Ëµã£¬£¬£¬£¬£¬ÔÚIISÍøÂçЧÀÍÕË»§ÏÂÖ´ÐжñÒâ¡°_VIEWSTATE¡±¸ºÔØ£¬£¬£¬£¬£¬°²ÅÅWeepSteelÕì̽ºóÃÅ¡£¡£¡£¸Ã¶ñÒâÈí¼þ¿ÉÇÔȡϵͳ¡¢Àú³Ì¡¢´ÅÅ̼°ÍøÂçÐÅÏ¢£¬£¬£¬£¬£¬Î±×°³É±ê×¼ViewStateÏìÓ¦Íâ´«£¬£¬£¬£¬£¬²¢Ö´ÐÐwhoami¡¢ipconfigµÈÕì̽ÏÂÁî¡£¡£¡£¹¥»÷½øÈë¶à½×¶ÎÀ©Õ¹£ººÚ¿Í°²ÅÅEarthwormÍøÂçËíµÀ¡¢DwagentÔ¶³Ì»á¼û¹¤¾ß¼°7-ZipѹËõ¹¤¾ß£¬£¬£¬£¬£¬½¨ÉèÍâµØÖÎÀíÔ±ÕË»§£¨Èç¡°asp$¡±£©¡¢×ª´¢SAM/SYSTEMƾ֤£¬£¬£¬£¬£¬²¢Í¨¹ýGoTokenTheft¾ÙÐÐÁîÅÆÄ£ÄâÌáÉýȨÏÞ¡£¡£¡£ÎªÎ¬³Ö³¤ÆÚÐÔ£¬£¬£¬£¬£¬¹¥»÷Õß½ûÓÃÕË»§ÃÜÂëÓâÆÚ¡¢ÊÚÓèRDPȨÏÞ£¬£¬£¬£¬£¬²¢½«Dwagent×¢²áΪϵͳЧÀÍ¡£¡£¡£SitecoreÁªºÏMandiantÐû²¼Ç徲ͨ¸æ£¬£¬£¬£¬£¬½¨ÒéÖÎÀíÔ±Á¬Ã¦Ìæ»»web.configÖÐËùÓо²Ì¬ÖµÎªÎ¨Ò»ÐÂÃÜÔ¿£¬£¬£¬£¬£¬²¢¼ÓÃÜÔªËØ£¬£¬£¬£¬£¬Í¬Ê±Ç¿µ÷°´ÆÚÂÖ»»¾²Ì¬»úеÃÜÔ¿×÷Ϊºã¾ÃÇå¾²²½·¥¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-exploited-sitecore-zero-day-flaw-to-deploy-backdoors/
2. ·ÆÂɱö¶«ÄÏ´óѧÊý¾Ý¿âÉæÏÓй¶£¬£¬£¬£¬£¬Ñ§ÉúÊý¾Ý±»³öÊÛ
9ÔÂ3ÈÕ£¬£¬£¬£¬£¬Ò»ÃûÍþвÐÐΪÕßÈëÇÖÁË·ÆÂɱö¶«ÄÏ´óѧ (USeP)£¬£¬£¬£¬£¬²¢ÔÚ°µÍøÂÛ̳ÉϳöÊÛÆäÊý¾Ý¿â¡£¡£¡£USeP ÊÇÒ»ËùÖøÃûµÄÖÝÁ¢´óѧ£¬£¬£¬£¬£¬Î»ÓÚ·ÆÂɱöÃÞÀ¼ÀϵºµÄ´ïÎÖÊС£¡£¡£×÷Ϊ¸ÃµØÇøÖ÷ÒªµÄ¹«¹²Ñо¿ºÍ½ÌÓý»ú¹¹£¬£¬£¬£¬£¬¸ÃÐ£ÕÆÎÕ×Å´ó×ÚʦÉúÊý¾Ý¡£¡£¡£´Ë´ÎÈëÇÖÊÂÎñй¶ÁËÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬¶ÔÉæ°¸Ö°Ô±×é³ÉΣº¦¡£¡£¡£ÍþвÐÐΪÕßÉù³Æ£¬£¬£¬£¬£¬±»ÈëÇÖµÄÊý¾Ý¿â¾ÞϸÁè¼Ý 20MB£¬£¬£¬£¬£¬°üÀ¨Ò»¸ö SQL Îļþ£¬£¬£¬£¬£¬°üÀ¨Áè¼Ý 175,000 ÐÐÊý¾Ý¡£¡£¡£¾Ý³Æ£¬£¬£¬£¬£¬Ð¹Â¶µÄÐÅÏ¢°üÀ¨´ó×ÚѧÉúµÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢ (PII)£¬£¬£¬£¬£¬ÀýÈçÈ«Ãû¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¡¢¼ÒͥסַºÍѧҵÏêÇé¡£¡£¡£ÂÛ̳Ìû×ÓÁгöÁËÐí¶à¾Ý³Æ±»Ð¹Â¶µÄÊý¾Ý¿â±í£¬£¬£¬£¬£¬Åú×¢±¬·¢ÁËÖÜÈ«µÄÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¾Ý³Æ£¬£¬£¬£¬£¬±»ÈëÇֵıí°üÀ¨£º±à¼ÇëÇó¡¢ÒÑ×¢²á¡¢È«ÇòµÄ¡¢Í¼Æ¬¡¢¼à¿Ø¡¢Î»Öá¢ÇëÇó±í¡¢ÇëÇó±í12¡¢ÇëÇó±í¾É¡¢studrecords¡¢ÏµÍ³ÈÕÖ¾¡¢ÉúÒ⡢ʵÑé¡¢Óû§¡£¡£¡£
https://dailydarkweb.net/university-of-southeastern-philippines-database-allegedly-breached-student-data-for-sale/
3. SAP S/4HANA¸ßΣÎó²îCVE-2025-42957ÔâÒ°ÍâʹÓÃ
9ÔÂ5ÈÕ£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÖÒÑԳƣ¬£¬£¬£¬£¬SAP S/4HANA±£´æÒ»¸öÑÏÖØµÄ´úÂë×¢ÈëÎó²îCVE-2025-42957£¬£¬£¬£¬£¬¸ÃÎó²îÕýÔÚ±»Ò°Íâ¹¥»÷ʹÓ㬣¬£¬£¬£¬ÒÔ¹¥ÆÆÌ»Â¶µÄЧÀÍÆ÷¡£¡£¡£¸ÃÎó²îÔ´ÓÚSAP S/4HANAÖÐRFC¹ûÕæ¹¦Ð§Ä£¿£¿£¿£¿éµÄABAP´úÂë×¢ÈëÎÊÌ⣬£¬£¬£¬£¬ÔÊÐíµÍȨÏÞÉí·ÝÑéÖ¤Óû§×¢Èëí§Òâ´úÂë¡¢ÈÆ¹ýÊÚȨ²¢ÍêÈ«½ÓÊÜSAPϵͳ¡£¡£¡£¹©Ó¦ÉÌSAPÒÑÓÚ2025Äê8ÔÂ11ÈÕÐÞ¸´´ËÎó²î£¬£¬£¬£¬£¬²¢½«ÆäÆÀ¶¨ÎªÑÏÖØÎó²î£¬£¬£¬£¬£¬CVSSÆÀ·Ö¸ß´ï9.9·Ö¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬²¿·ÖϵͳÉÐδӦÓøÃÇå¾²¸üУ¬£¬£¬£¬£¬ÕâЩδÐÞ²¹µÄϵͳÒѳÉΪºÚ¿Í¹¥»÷µÄÄ¿µÄ¡£¡£¡£¾ÝSecurityBridge±¨¸æ£¬£¬£¬£¬£¬CVE-2025-42957ÏÖÔÚÈÔÔÚÒ°Íâ±»Æð¾¢Ê¹Ó㬣¬£¬£¬£¬Ö»¹ÜʹÓÃˮƽÓÐÏÞ¡£¡£¡£SecurityBridgeÓÚ2025Äê6ÔÂ27ÈÕ·¢Ã÷¸ÃÎó²î²¢ÈÏÕæÈεØÏòSAP±¨¸æ£¬£¬£¬£¬£¬»¹ÐÖú¿ª·¢Á˲¹¶¡¡£¡£¡£µ«ÓÉÓÚÊÜÓ°Ïì×é¼þµÄ¿ª·ÅÐÔÒÔ¼°ABAP´úÂëµÄ¹ûÕæÐÔ£¬£¬£¬£¬£¬ÊÖÒÕ¸ßÃ÷µÄÍþвÐÐΪÕßÄܹ»ÇáËÉÄæÏò¹¤³Ì²¹¶¡£¬£¬£¬£¬£¬×ÔÐз¢Ã÷Îó²î¡£¡£¡£¸ÃÎó²îµÄDZÔÚЧ¹û°üÀ¨Êý¾Ý͵ÇÔ¡¢Êý¾ÝʹÓᢴúÂë×¢È롢ͨ¹ý½¨ÉèºóÃÅÕË»§ÌáÉýȨÏÞ¡¢Æ¾Ö¤ÍµÇÔÒÔ¼°Í¨¹ý¶ñÒâÈí¼þ¡¢ÀÕË÷Èí¼þµÈ·½·¨ÖÐÖ¹ÔËÓª¡£¡£¡£SecurityBridge»¹ÖÆ×÷ÁËÊÓÆµÑÝʾÔõÑùʹÓøÃÎó²îÔÚSAPЧÀÍÆ÷ÉÏÔËÐÐϵͳÏÂÁî¡£¡£¡£
https://www.bleepingcomputer.com/news/security/critical-sap-s-4hana-vulnerability-now-exploited-in-attacks/
4. WealthsimpleÅû¶Êý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬³¬300Íò¿Í»§ÊÜÓ°Ïì
9ÔÂ5ÈÕ£¬£¬£¬£¬£¬¼ÓÄôóÔÚÏßͶ×ÊÖÎÀí¾ÞÍ·WealthsimpleÅû¶һÆðÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÈëÇÖµÚÈý·½±àдµÄÈí¼þ°ü£¬£¬£¬£¬£¬Î´¾ÊÚȨ»á¼ûÁ˲»µ½1%¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¸Ã¹«Ë¾½¨ÉèÓÚ2014Ä꣬£¬£¬£¬£¬×ܲ¿Î»ÓÚ¶àÂ׶࣬£¬£¬£¬£¬ÖÎÀí×ʲú³¬845ÒÚ¼ÓÔª£¬£¬£¬£¬£¬Ð§Àͳ¬300Íò¼ÓÄôóÈË£¬£¬£¬£¬£¬º¸ÇͶ×Ê¡¢ÉúÒâ¡¢¼ÓÃÜÇ®±Ò¡¢±¨Ë°¡¢ÏûºÄºÍ´¢±¸µÈ½ðÈÚ²úÆ·£¬£¬£¬£¬£¬ÆäAndroidÓ¦ÓÃÏÂÔØÁ¿³¬100Íò´Î£¬£¬£¬£¬£¬iOSÓ¦Óûñ³¬12.6ÍòÌõÆÀ·Ö¡£¡£¡£¾Ý¹«Ë¾ÉùÃ÷¼°Ïò¿Í»§·¢Ë͵ÄÎ¥¹æÍ¨ÖªÏÔʾ£¬£¬£¬£¬£¬Ð¹Â¶Êý¾Ý°üÀ¨ÁªÏµ·½·¨¡¢Õþ¸®Éí·ÝÖ¤ÐÅÏ¢¡¢²ÆÎñÏêÇ飨ÈçÕ˺š¢IPµØµã¡¢Éç»á°ü¹ÜºÅ¡¢³öÉúÈÕÆÚ£©£¬£¬£¬£¬£¬µ«Î´Éæ¼°×ʽðÇÔÈ¡»òÃÜÂëй¶¡£¡£¡£¹«Ë¾Ç¿µ÷ËùÓпͻ§ÕË»§Çå¾²£¬£¬£¬£¬£¬²¢ÒÑͨ¹ýµç×ÓÓʼþ֪ͨÊÜÓ°ÏìÓû§£¬£¬£¬£¬£¬ÌṩÁ½ÄêÃâ·ÑÐÅÓÃ¼à¿Ø¡¢°µÍø¼à¿Ø¡¢Éí·Ý͵ÇÔ±£»£»£»£»£»£»¤ºÍ°ü¹ÜЧÀÍ£¬£¬£¬£¬£¬Í¬Ê±½¨ÒéÆôÓÃË«ÒòËØÈÏÖ¤¡¢×èÖ¹ÃÜÂëÖØ¸´Ê¹Ó㬣¬£¬£¬£¬²¢Ð¡ÐÄÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£Wealthsimple½²»°ÈËÌåÏÖ¡°¸ÃÊÂÎñÓëSalesforceÎ޹ء±¡£¡£¡£¹«Ë¾Î´Åû¶¹¥»÷ÕßÏêϸÈëÇÖÊֶΣ¬£¬£¬£¬£¬½öÖ¸³öÎó²îÔ´ÓÚµÚÈý·½Èí¼þ°ü¡£¡£¡£
https://www.bleepingcomputer.com/news/security/financial-services-firm-wealthsimple-discloses-data-breach/
5. Nx¡°s1ngularity¡±¹©Ó¦Á´¹¥»÷£ºAI¹¤¾ßÀÄÓÃÖÂÊýǧÉñÃØÐ¹Â¶
9ÔÂ6ÈÕ£¬£¬£¬£¬£¬½üÆÚÕë¶Ô¿ªÔ´¹¹½¨¹¤¾ßNxµÄ¡°s1ngularity¡±¹©Ó¦Á´¹¥»÷±¬·¢£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ý¸Ä¶¯GitHub ActionsÊÂÇéÁ÷ÔÚNPMÐû²¼º¬¡°telemetry.js¡±¶ñÒâÈí¼þµÄNx°ü¡£¡£¡£¸Ã¶ñÒâÈí¼þÕë¶ÔLinux/macOSϵͳ£¬£¬£¬£¬£¬Ê¹ÓÃClaude¡¢Q¡¢GeminiµÈAI¹¤¾ßµÄLLMÌáÐÑÇÔÈ¡GitHubÁîÅÆ¡¢npmÁîÅÆ¡¢SSHÃÜÔ¿µÈÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬²¢ÉÏ´«ÖÁ¡°s1ngularity-repository¡±¹«¹²´æ´¢¿â¡£¡£¡£WizʺóÆÀ¹ÀÏÔʾ£¬£¬£¬£¬£¬ÊÂÎñ·ÖÈý½×¶Îµ¼ÖÂ2,180¸öÕË»§¡¢7,200¸ö´æ´¢¿âй¶£¬£¬£¬£¬£¬³¬2,000¸öΨһÉñÃØ¼°20,000¸öÎļþ̻¶£¬£¬£¬£¬£¬ÇÒ´ó×ÚÉñÃØÈÔÓÐÓ㬣¬£¬£¬£¬Ó°ÏìÒ»Á¬À©´ó¡£¡£¡£¹¥»÷·ÖÈý½×¶Î£ºÊ׽׶Σ¨8ÔÂ26-27ÈÕ£©Ö±½ÓÓ°Ïì1,700Óû§£¬£¬£¬£¬£¬Ð¹Â¶³¬2,000ÉñÃØ£»£»£»£»£»£»´Î½×¶Î£¨8ÔÂ28-29ÈÕ£©¹¥»÷ÕßʹÓÃй¶µÄGitHubÁîÅÆ½«Ë½ÓпâתΪ¹«¹²¿â²¢ÖØÃüÃû£¬£¬£¬£¬£¬µ¼ÖÂ480¸öÕË»§£¨¶àΪ×éÖ¯£©¼°6,700¸ö´æ´¢¿âÊÜË𣻣»£»£»£»£»Ä©½×¶Î£¨8ÔÂ31ÈÕ£©¹¥»÷ÕßÕë¶ÔÌØ¶¨×éÖ¯£¬£¬£¬£¬£¬Í¨¹ý±»¿ØÕË»§Ðû²¼500¸ö˽ÈË´æ´¢¿â¡£¡£¡£GitHubËäÔÚ°ËСʱÄÚɾ³ý¹¥»÷Õ߿⣬£¬£¬£¬£¬µ«Êý¾ÝÒѱ»¸´ÖÆ¡£¡£¡£NxÍŶÓʺóÆÊÎöÖ¸³ö£¬£¬£¬£¬£¬ÈëÇÖÔ´ÓÚÀÈ¡ÇëÇóÎÊÌâ×¢Èë¼°pull_request_targetµÄ²»Ç徲ʹÓ㬣¬£¬£¬£¬Ê¹¹¥»÷ÕßÒÔÌáÉýȨÏÞÔËÐдúÂ룬£¬£¬£¬£¬´¥·¢Ðû²¼¹ÜµÀ²¢Ð¹Â¶npmÁîÅÆ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/ai-powered-malware-hit-2-180-github-accounts-in-s1ngularity-attack/
6. VirusTotal½ÒÆÆSVGÎļþÖеÄÍøÂç´¹ÂÚ¹¥»÷
9ÔÂ6ÈÕ£¬£¬£¬£¬£¬VirusTotalͨ¹ýÆäAI Code Insightƽ̨ÐÂÔöSVGÖ§³Öºó£¬£¬£¬£¬£¬·¢Ã÷Ò»ÆðʹÓÃSVGÎļþʵÑéµÄÍøÂç´¹ÂÚ¹¥»÷»î¶¯£¬£¬£¬£¬£¬¸Ã»î¶¯Ã°³ä¸çÂ×±ÈÑÇ˾·¨ÏµÍ³ÃÅ»§ÍøÕ¾Èö²¥¶ñÒâÈí¼þ¡£¡£¡£SVG×÷Ϊ¿ÉËõ·ÅʸÁ¿Í¼ÐÎÃûÌ㬣¬£¬£¬£¬¿Éͨ¹ýÔªËØÇ¶ÈëHTMLºÍJavaScript£¬£¬£¬£¬£¬ÔÚ¼ÓÔØÊ±Ö´ÐдúÂ룬£¬£¬£¬£¬ÕâÒ»ÌØÕ÷±»ÍþвÐÐΪÕßÀÄÓᣡ£¡£¹¥»÷ÖУ¬£¬£¬£¬£¬SVGÎļþäÖȾÐéαÕþ¸®ÃÅ»§ÍøÕ¾£¬£¬£¬£¬£¬ÏÔʾ±ÆÕæµÄÏÂÔØ½ø¶ÈÌõ¼°°¸Àý±àºÅ¡¢Çå¾²ÁîÅÆµÈÐÅÈÎÌáÐÑ£¬£¬£¬£¬£¬ÓÕµ¼Óû§ÏÂÔØÃÜÂë±£»£»£»£»£»£»¤µÄZIPѹËõ°ü£¬£¬£¬£¬£¬ÃÜÂëÖ±½ÓÏÔʾÔÚÒ³ÃæÉÏ¡£¡£¡£¾ÆÊÎö£¬£¬£¬£¬£¬ÌáÈ¡µÄZIPÎļþ°üÀ¨Î±×°³É¹Ù·½Ë¾·¨ÎļþµÄComodo Dragonä¯ÀÀÆ÷¿ÉÖ´ÐÐÎļþ¡¢¶ñÒâDLL¼°Á½¸ö¼ÓÃÜÎļþ¡£¡£¡£Óû§ÔËÐпÉÖ´ÐÐÎļþʱ£¬£¬£¬£¬£¬¶ñÒâDLL»á±»²àÔØ£¬£¬£¬£¬£¬½ø¶øÔÚϵͳÖÐ×°Öøü¶à¶ñÒâÈí¼þ¡£¡£¡£VirusTotalÖ¸³ö£¬£¬£¬£¬£¬´ËÀ๥»÷ÒòSVGÖ§³ÖÖØ´ó½»»¥ÇÒ·À²¡¶¾Èí¼þ¼ì²âÂʵͣ¬£¬£¬£¬£¬Ò×ÌӱܹŰåÇå¾²¼ì²â¡£¡£¡£´Ë´ÎÊÂÎñÖУ¬£¬£¬£¬£¬AI Code Insightͨ¹ý»úеѧϰÆÊÎöÎļþÐÐΪ£¬£¬£¬£¬£¬Ê¶±ð³öSVGÖÐÒþ²ØµÄJavaScriptÖ´ÐÐHTMLµÄÒì³£ÐÐΪ£¬£¬£¬£¬£¬³ÉΪ½ÒÆÆ¹¥»÷µÄÒªº¦¡£¡£¡£¸Ã¹¤¾ßÌìÉúµÄ¿ÉÒÉÐÐΪժҪ×ÊÖúÑо¿Ö°Ô±¿ìËÙ¶¨Î»¶ñÒâ»î¶¯¡£¡£¡£½øÒ»³ÌÐò²é·¢Ã÷£¬£¬£¬£¬£¬523¸öÏÈǰÉÏ´«µÄSVGÎļþͬÊô¸Ã»î¶¯£¬£¬£¬£¬£¬µ«´Ëǰ¾ùδ±»Çå¾²Èí¼þ±ê¼ÇΪ¶ñÒâ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/virustotal-finds-hidden-malware-phishing-campaign-in-svg-files/


¾©¹«Íø°²±¸11010802024551ºÅ