Nginx UIÉí·ÝÑéÖ¤ÈÆ¹ýÎó²îÒѱ»¶ñÒâʹÓÃ
Ðû²¼Ê±¼ä 2026-04-161. Nginx UIÉí·ÝÑéÖ¤ÈÆ¹ýÎó²îÒѱ»¶ñÒâʹÓÃ
4ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬Nginx UI ÖÐÒ»¸öÖ§³ÖÄ£×ÓÉÏÏÂÎÄÐÒ飨MCP£©µÄÑÏÖØÇå¾²Îó²î£¨±àºÅCVE-2026-33032£©ÏÖÔÚÕýÔâµ½¶ñÒâʹÓ㬣¬£¬£¬£¬£¬¹¥»÷ÕßÎÞÐèÈκÎÉí·ÝÑéÖ¤¼´¿ÉÍêÈ«¿ØÖÆÄ¿µÄЧÀÍÆ÷¡£¡£¡£¡£¸ÃÎó²îµÄ»ù´¡Ôµ¹ÊÔÓÉÔÚÓÚnginx-uiδÄܶÔ/mcp_message¶ËµãʵÑéÓÐÓñ£»£»£»£»£»¤£¬£¬£¬£¬£¬£¬Ê¹µÃÔ¶³Ì¹¥»÷ÕßÄܹ»ÔÚÎÞÆ¾Ö¤µÄÇéÐÎÏÂŲÓÃÌØÈ¨MCP²Ù×÷¡£¡£¡£¡£ÓÉÓÚÕâЩ²Ù×÷Éæ¼°Ð´Èë¡¢Ð޸ļ°ÖØÐ¼ÓÔØnginxÉèÖÃÎļþ£¬£¬£¬£¬£¬£¬Ò»¸ö¼òÆÓµÄδÈÏÖ¤ÇëÇ󼴿ɸıäЧÀÍÆ÷ÐÐΪ£¬£¬£¬£¬£¬£¬ÊµÏÖWebЧÀÍÆ÷µÄÖÜÈ«½ÓÊÜ¡£¡£¡£¡£ÃÀ¹ú¹ú¼Ò±ê×¼ÓëÊÖÒÕÑо¿Ôº£¨NIST£©ÔÚ¹ú¼ÒÎó²îÊý¾Ý¿â£¨NVD£©ÖÐÃ÷È·Ö¸³ö£¬£¬£¬£¬£¬£¬ÈκÎÍøÂç¹¥»÷Õß¾ù¿Éδ¾ÈÏ֤ŲÓÃËùÓÐMCP¹¤¾ß£¬£¬£¬£¬£¬£¬°üÀ¨ÖØÆônginx¡¢½¨Éè»òÐÞ¸ÄÉèÖÃÎļþÒÔ¼°´¥·¢×Ô¶¯ÖØÔØ¡£¡£¡£¡£Nginx UI¹Ù·½ÓÚ3ÔÂ15ÈÕÐû²¼2.3.4°æ±¾ÐÞ¸´¸ÃÎó²î£¬£¬£¬£¬£¬£¬´ËǰһÌìÓÉPluto Security AIµÄÑо¿Ö°Ô±±¨¸æ¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬Îó²î±êʶ·û¡¢ÊÖÒÕϸ½Ú¼°¿´·¨ÑéÖ¤£¨PoC£©´úÂëÖ±ÖÁÔÂβ²Å¹ûÕæÅû¶¡£¡£¡£¡£±¾ÖÜÔçЩʱ¼ä£¬£¬£¬£¬£¬£¬Recorded FutureÔÚCVE¸ÅÀÀ±¨¸æÖÐÈ·ÈϸÃÎó²îÕý±»Æð¾¢Ê¹Óᣡ£¡£¡£Pluto Securityͨ¹ýShodanɨÃè·¢Ã÷£¬£¬£¬£¬£¬£¬ÏÖÔÚÔ¼ÓÐ2600¸ö¹ûÕæÌ»Â¶µÄʵÀý¿ÉÄܱ£´æÎó²î£¬£¬£¬£¬£¬£¬Ö÷ÒªÂþÑÜÔÚÖйú¡¢ÃÀ¹ú¡¢Ó¡¶ÈÄáÎ÷ÑÇ¡¢µÂ¹úºÍÏã¸Û¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/critical-nginx-ui-auth-bypass-flaw-now-actively-exploited-in-the-wild/
2. ÐÂÐͶñÒâÈí¼þAgingFlyÕý¹¥»÷Õþ¸®ÓëÒ½Ôº
4ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬Ò»ÖÖÃûΪ¡°AgingFly¡±µÄÐÂÐͶñÒâÈí¼þ¼Ò×åÕý±»ÓÃÓÚ¹¥»÷µØ·½Õþ¸®¡¢Ò½ÔºÒÔÖ¹ú·À²½¶Ó³ÉÔ±£¬£¬£¬£¬£¬£¬¸ÃÈí¼þרÃÅ´Ó»ùÓÚChromiumµÄä¯ÀÀÆ÷ºÍWindows°æWhatsAppÖÐÇÔÈ¡Éí·ÝÑéÖ¤Êý¾Ý¡£¡£¡£¡£CERT-UAÒѽ«¹¥»÷Ðж¯¹éÒòÓÚÆä×·×ÙµÄÍøÂçÍþв¼¯ÈºUAC-0247¡£¡£¡£¡£¹¥»÷Á´Ê¼ÓÚÄ¿µÄÊÕµ½Î±×°³ÉÈËÐÔÖ÷ÒåÔ®ÖúµÄµç×ÓÓʼþ£¬£¬£¬£¬£¬£¬ÓÕµ¼µã»÷ǶÈëÁ´½Ó£¬£¬£¬£¬£¬£¬¸ÃÁ´½Ó»áÖØ¶¨Ïòµ½Òò¿çÕ¾¾ç±¾£¨XSS£©Îó²îÔâÈëÇÖµÄÕýµ±ÍøÕ¾£¬£¬£¬£¬£¬£¬»òʹÓÃAI¹¤¾ßÌìÉúµÄÐéÎ±ÍøÕ¾¡£¡£¡£¡£Ëæºó£¬£¬£¬£¬£¬£¬Êܺ¦ÕßÊÕµ½°üÀ¨¿ì½Ý·½·¨Îļþ£¨LNK£©µÄ¹éµµÎļþ£¬£¬£¬£¬£¬£¬¸ÃÎļþÆô¶¯ÄÚÖõÄHTA´¦Öóͷ£³ÌÐò£¬£¬£¬£¬£¬£¬ÅþÁ¬Ô¶³Ì×ÊÔ´¼ìË÷²¢Ö´ÐÐHTAÎļþ¡£¡£¡£¡£HTAÏÔʾÓÕ¶ü±íµ¥ÒÔÊèÉ¢×¢ÖØÁ¦£¬£¬£¬£¬£¬£¬Í¬Ê±½¨ÉèÍýÏëʹÃüÏÂÔØ²¢ÔËÐÐEXEÓÐÓÃÔØºÉ£¬£¬£¬£¬£¬£¬½«shellcode×¢ÈëÕýµ±Àú³Ì¡£¡£¡£¡£½Ó׏¥»÷Õß°²ÅÅÁ½½×¶Î¼ÓÔØÆ÷£¬£¬£¬£¬£¬£¬×îÖÕÓÐÓÃÔØºÉ¾Ñ¹ËõºÍ¼ÓÃܺóÊÍ·Å¡£¡£¡£¡£µä·¶µÄTCP·´Ïòshell»òÀàËÆRAVENSHELLµÄ¹¤¾ß±»ÓÃ×÷Ìø°å£¬£¬£¬£¬£¬£¬½¨ÉèÓëÖÎÀíЧÀÍÆ÷µÄTCPÅþÁ¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃXORÃÜÂë¼ÓÃܵÄTCPͨµÀÓëC2ЧÀÍÆ÷ͨѶ£¬£¬£¬£¬£¬£¬Í¨¹ýWindowsÏÂÁîÌáÐÑ·ûÖ´ÐÐÏÂÁî¡£¡£¡£¡£Ö®ºóAgingFly±»½»¸¶°²ÅÅ£¬£¬£¬£¬£¬£¬Í¬Ê±Ê¹ÓÃPowerShell¾ç±¾£¨SILENTLOOP£©Ö´ÐÐÏÂÁî¡¢¸üÐÂÉèÖò¢´ÓTelegramƵµÀ»ñÈ¡C2µØµã¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-agingfly-malware-used-in-attacks-on-ukraine-govt-hospitals/
3. EssentialPluginÈýÊ®Óà¿î²å¼þÔâºóÃÅÈëÇÖ
4ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬EssentialPluginÈí¼þ°üÖеÄ30¶à¿îWordPress²å¼þÒѱ»¶ñÒâ´úÂëÈëÇÖ£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÔÚδ¾ÊÚȨµÄÇéÐÎÏ»á¼û²¢¿ØÖÆÔËÐÐÕâЩ²å¼þµÄÍøÕ¾¡£¡£¡£¡£¸ÃÊÂÎñÓÉÍйÜWordPressÖ÷»úÌṩÉÌAnchor HostingµÄÊ×´´ÈËAustin Ginder·¢Ã÷£¬£¬£¬£¬£¬£¬ËûÔÚÊÕµ½Ä³²å¼þ°üÀ¨ÔÊÐíµÚÈý·½»á¼û´úÂëµÄÏßË÷ºóÕö¿ªÊӲ죬£¬£¬£¬£¬£¬Ð§¹ûÏÔʾ£º×Ô2025Äê8Ô¸ÃÏîÄ¿±»ÐµêÖ÷ÒÔÁùλÊý¼ÛÇ®ÊÕ¹ºÒÔÀ´£¬£¬£¬£¬£¬£¬EssentialPluginÈí¼þ°üÖеÄËùÓвå¼þ¾ù±£´æºóÃÅ¡£¡£¡£¡£ºóÃÅ×î³õ´¦ÓÚ²»»î¶¯×´Ì¬£¬£¬£¬£¬£¬£¬Ö±µ½½üÆÚ²Å±»¼¤»î£¬£¬£¬£¬£¬£¬Ëü¾²Ä¬ÅþÁ¬Íⲿ»ù´¡ÉèÊ©»ñȡһ¸öÃûΪ¡°wp-comments-posts.php¡±µÄÎļþ£¬£¬£¬£¬£¬£¬½ø¶ø½«¶ñÒâÈí¼þ×¢Èë½¹µãÉèÖÃÎļþ¡°wp-config.php¡±¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ¶ÔÍøÕ¾ËùÓÐÕß²»¿É¼û£¬£¬£¬£¬£¬£¬²¢Ê¹ÓûùÓÚÒÔÌ«·»µÄC2µØµãÆÊÎö¾ÙÐйæ±Ü£¬£¬£¬£¬£¬£¬¿Éƾָ֤Áî»ñÈ¡À¬»øÁ´½Ó¡¢Öض¨ÏòºÍÐéÎ±Ò³Ãæ¡£¡£¡£¡£WordPress.orgѸËÙÏìÓ¦£¬£¬£¬£¬£¬£¬¹Ø±ÕÁËÏà¹Ø²å¼þ²¢Ç¿ÖÆÍøÕ¾¸üУ¬£¬£¬£¬£¬£¬ÒÔÇжϺóÃÅͨѶ²¢½ûÓÃÆäÖ´Ðз¾¶¡£¡£¡£¡£½¨ÒéʹÓÃÊÜÓ°Ïì²å¼þµÄÍøÕ¾ÖÎÀíÔ±Á¬Ã¦¼ì²é²¢ÊÖ¶¯ÕûÀíÉèÖÃÎļþÖеĶñÒâ´úÂë¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/wordpress-plugin-suite-hacked-to-push-malware-to-thousands-of-sites/
4. Mirax¶ñÒâÈí¼þ¹¥»÷»î¶¯²¨¼°22ÍòÕË»§
4ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬Ò»ÖÖÃûΪMiraxµÄÐÂÐͰ²×¿Ô¶³Ì»á¼ûľÂí£¨RAT£©Õýͨ¹ýMetaƽ̨£¨FacebookºÍInstagram£©ÉÏµÄ¹ã¸æ´ó¹æÄ£Èö²¥£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÎ÷°àÑÀÓïÓû§£¬£¬£¬£¬£¬£¬ÏÖÔÚÒÑÓÐÁè¼Ý22Íò¸öÕË»§±»Ñ¬È¾¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ²»µ«ÔÊÐí¹¥»÷ÕßʵʱÍêÈ«¿ØÖÆÊÜѬȾװ±¸£¬£¬£¬£¬£¬£¬»¹Äܽ«×°±¸×ª»¯ÎªSOCKS5ÊðÀí½Úµã£¬£¬£¬£¬£¬£¬Í¨¹ýÊܺ¦ÕßµÄIPµØµã·ÓɶñÒâÁ÷Á¿¡£¡£¡£¡£MiraxÒÔ¶ñÒâÈí¼þ¼´Ð§ÀÍ£¨MaaS£©ÐÎʽ³öÊÛ£¬£¬£¬£¬£¬£¬µ«½ÓÄɸ߶ȹܿصĶÀ¼Ò·Ö·¢Ä£Ê½£¬£¬£¬£¬£¬£¬½öÏÞÉÙÊýͬÃ˳ÉÔ±»á¼û£¬£¬£¬£¬£¬£¬Õâ±ê¼Ç×ÅÒÆ¶¯ÍþвÕý´ÓÆÕ±éµÄMaaSÏò¸üÒþ²ØµÄ¡°Ë½ÓÐMaaS¡±Ñݱ䡣¡£¡£¡£×Ô2025Äê12ÔÂ19ÈÕÆð£¬£¬£¬£¬£¬£¬Mirax×îÏÈÔÚµØÏÂÂÛ̳¹ûÕæÍÆ¹ã£¬£¬£¬£¬£¬£¬CleafyÍþвÇ鱨ÍŶÓ×Ô2026Äê3ÔÂÆð¶ÔÆä¾ÙÐÐÆð¾¢¼à¿Ø¡£¡£¡£¡£¹¥»÷ͨ¹ý¶à½×¶ÎÓªÏú»î¶¯ÊµÑ飬£¬£¬£¬£¬£¬Ê¹ÓÃMeta¹ã¸æÓÕÆÓû§ÏÂÔØ¶ñÒâÓ¦ÓóÌÐò¡£¡£¡£¡£Êܺ¦Õß±»Öض¨Ïòµ½ÌṩÐéαЧÀÍ£¨Èç²»·¨ÌåÓýÖ±²¥Ó¦Ó㩵Ĵ¹ÂÚÍøÕ¾£¬£¬£¬£¬£¬£¬Ê¹ÓÃÓû§²àÔØAPKÎļþµÄϰ¹ß¾ÙÐй¥»÷¡£¡£¡£¡£¶ñÒâÈí¼þͨ¹ýÍйÜÔÚGitHub ReleasesÉϵÄͶ·ÅÆ÷Èö²¥£¬£¬£¬£¬£¬£¬ÕâЩͶ·ÅÆ÷ƵÈÔ¸üкÍÖØÐ´ò°üÒÔÈÆ¹ýÇå¾²¼ì²é¡£¡£¡£¡£×°Öú󣬣¬£¬£¬£¬£¬Í¶·ÅÆ÷½âѹÓÐÓÃÔØºÉ²¢Ó¦ÓÃÇ¿»ìÏýÊÖÒÕ£¬£¬£¬£¬£¬£¬Í¨¹ýWebSocket½¨ÉèÅþÁ¬¡£¡£¡£¡£
https://securityaffairs.com/190842/uncategorized/mirax-malware-campaign-hits-220k-accounts-enables-full-remote-control.html
5. CISA¸üÐÂKEVĿ¼£ºÐÂÔöSharePoint¼°ExcelÎó²î
4ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«Ó°ÏìMicrosoft SharePoint ServerºÍMicrosoft Office ExcelµÄÎó²îÌí¼Óµ½ÆäÒÑÖª¿ÉʹÓÃÎó²î£¨KEV£©Ä¿Â¼ÖУ¬£¬£¬£¬£¬£¬ÒªÇóÁª°î»ú¹¹ÔÚ2026Äê4ÔÂ28ÈÕǰÍê³ÉÐÞ¸´¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬£¬±àºÅΪCVE-2009-0238£¨CVSSÆÀ·Ö9.3£©µÄÎó²îÓ°Ïì¶à¸ö°æ±¾µÄMicrosoft Excel¼°Ïà¹ØÉó²éÆ÷¡£¡£¡£¡£µ±Óû§·¿ªÌØÖƵÄExcelÎļþʱ£¬£¬£¬£¬£¬£¬¸ÃÎó²î»áµ¼ÖÂÓ¦ÓóÌÐò»á¼ûÄÚ´æÖеÄÎÞЧ¹¤¾ß£¬£¬£¬£¬£¬£¬Ôì³ÉÄÚ´æË𻵣¬£¬£¬£¬£¬£¬´Ó¶øÊ¹Ô¶³Ì¹¥»÷ÕßÄܹ»ÒÔÄ¿½ñÓû§È¨ÏÞÔÚÊÜÓ°ÏìϵͳÉÏÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¸ÃÎó²îÔçÔÚ2009Äê2Ô¾ͱ»Æð¾¢Ê¹Ó㬣¬£¬£¬£¬£¬ÌØÊâÊÇͨ¹ýTrojan.Mdropper.AC¶ñÒâÈí¼þÈö²¥£¬£¬£¬£¬£¬£¬ÊÇÆäÊ±ÖØ´óÏÖʵÍþв֮һ¡£¡£¡£¡£µÚ¶þ¸ö±»¼ÓÈëĿ¼µÄÎó²î±àºÅΪCVE-2026-32201£¨CVSSÆÀ·Ö6.5£©£¬£¬£¬£¬£¬£¬Éæ¼°Microsoft SharePoint ServerÖеÄÓÕÆÎó²î£¬£¬£¬£¬£¬£¬¿ÉÄÜÓë¿çÕ¾¾ç±¾¹¥»÷£¨XSS£©Ïà¹Ø¡£¡£¡£¡£Î¢Èí±¨¸æ³Æ¸ÃÁãÈÕÎó²îÒѱ»Æð¾¢ÓÃÓÚÏÖʵ¹¥»÷ÖС£¡£¡£¡£Ç徲ͨ¸æÖ¸³ö£¬£¬£¬£¬£¬£¬SharePointÖв»×¼È·µÄÊäÈëÑéÖ¤ÔÊÐíδ¾ÊÚȨµÄ¹¥»÷Õßͨ¹ýÍøÂçÖ´ÐÐÓÕÆ²Ù×÷£¬£¬£¬£¬£¬£¬ÀÖ³ÉʹÓúó¿ÉÉó²é²¿·ÖÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬»ò¸ü¸ÄÒÑÅû¶ÐÅÏ¢¡£¡£¡£¡£
https://securityaffairs.com/190852/hacking/u-s-cisa-adds-microsoft-sharepoint-server-and-microsoft-office-excel-flaws-to-its-known-exploited-vulnerabilities-catalog.html
6. CISAÖÒÑÔWindowsʹÃüÖ÷»úȨÏÞÌáÉýÎó²îÕý±»Ê¹ÓÃ
4ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ·¢³öÖÒÑÔ£¬£¬£¬£¬£¬£¬ÒªÇóÃÀ¹úÕþ¸®»ú¹¹¾¡¿ì±£»£»£»£»£»¤ÆäϵͳÃâÊÜWindowsʹÃüÖ÷»úȨÏÞÌáÉýÎó²î£¨CVE-2025-60710£©µÄË𺦡£¡£¡£¡£¸ÃÎó²îÔÊÐíÍâµØ¹¥»÷ÕßÔÚ½ö¾ß±¸»ù±¾Óû§È¨ÏÞµÄÇéÐÎÏ£¬£¬£¬£¬£¬£¬Í¨¹ýµÍÖØÆ¯ºóµÄ¹¥»÷·½·¨»ñµÃSYSTEMȨÏÞ£¬£¬£¬£¬£¬£¬´Ó¶øÍêÈ«¿ØÖÆÊÜѬȾµÄ×°±¸¡£¡£¡£¡£Ê¹ÃüÖ÷»úÊÇWindowsϵͳµÄ½¹µã×é¼þ£¬£¬£¬£¬£¬£¬×÷Ϊ»ùÓÚDLLµÄÀú³ÌµÄÈÝÆ÷£¬£¬£¬£¬£¬£¬ÔÊÐíËüÃÇÔÚºǫ́ÔËÐУ¬£¬£¬£¬£¬£¬²¢È·±£Ôڹػúʱ´ú׼ȷ¹Ø±ÕÒÔ±ÜÃâÊý¾ÝË𻵡£¡£¡£¡£¸ÃÎó²îÔ´ÓÚÓ°ÏìWindows 11ºÍWindows Server 2025×°±¸µÄÁ´½Ó¸ú×ÙÈõµã£¬£¬£¬£¬£¬£¬ÏêϸÌåÏÖΪWindowsʹÃüÖ÷»úÀú³ÌÔÚÎļþ»á¼û֮ǰµÄÁ´½ÓÆÊÎö²»µ±£¬£¬£¬£¬£¬£¬µ¼ÖÂÊÚȨ¹¥»÷ÕßÄܹ»ÔÚÍâµØÌáÉýȨÏÞ¡£¡£¡£¡£Î¢ÈíÒÑÓÚ2025Äê11ÔÂÐû²¼ÁËÕë¶Ô¸ÃÎó²îµÄÇå¾²¸üС£¡£¡£¡£±¾ÖÜÒ»£¬£¬£¬£¬£¬£¬CISA½«CVE-2025-60710ÕýʽÁÐÈëÆä¡°ÒÑÖª¿ÉʹÓÃÎó²î¡±£¨KEV£©Ä¿Â¼¡£¡£¡£¡£Æ¾Ö¤2021Äê11ÔÂÐû²¼µÄ¾ßÓÐÔ¼ÊøÁ¦µÄ²Ù×÷Ö¸ÁBOD£©22-01£¬£¬£¬£¬£¬£¬Áª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹±»¸øÓèÁ½ÖÜʱ¼äÀ´Íê³ÉÎó²îÐÞ¸´£¬£¬£¬£¬£¬£¬ÒÔ±£»£»£»£»£»¤ÆäÍøÂçÃâÊܹ¥»÷¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cisa-flags-windows-task-host-vulnerability-as-exploited-in-attacks/


¾©¹«Íø°²±¸11010802024551ºÅ