ºÚ¿ÍʹÓÃSitecoreÁãÈÕÎó²îCVE-2025-53690°²ÅźóÃÅ
Ðû²¼Ê±¼ä 2025-09-081. ºÚ¿ÍʹÓÃSitecoreÁãÈÕÎó²îCVE-2025-53690°²ÅźóÃÅ
9ÔÂ4ÈÕ£¬£¬£¬£¬ÍþвÐÐΪÕßͨ¹ý¾É°æSitecore°²ÅÅÖеÄÁãÈÕÎó²îCVE-2025-53690Ìᳫ¹¥»÷£¬£¬£¬£¬¸ÃÎó²îÔ´ÓÚ2017ÄêǰSitecoreÖ¸ÄÏÖйûÕæµÄʾÀýASP.NET»úеÃÜÔ¿±»Éú²úÇéÐÎÖØ¸´Ê¹Ó㬣¬£¬£¬µ¼ÖÂViewState·´ÐòÁл¯Îó²îÒý·¢Ô¶³Ì´úÂëÖ´ÐУ¨RCE£©¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÕë¶Ôº¬Î´ÂÄÀúÖ¤ViewState×ֶεġ°/sitecore/blocked.aspx¡±¶Ëµã£¬£¬£¬£¬ÔÚIISÍøÂçЧÀÍÕË»§ÏÂÖ´ÐжñÒâ¡°_VIEWSTATE¡±¸ºÔØ£¬£¬£¬£¬°²ÅÅWeepSteelÕì̽ºóÃÅ¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ¿ÉÇÔȡϵͳ¡¢Àú³Ì¡¢´ÅÅ̼°ÍøÂçÐÅÏ¢£¬£¬£¬£¬Î±×°³É±ê×¼ViewStateÏìÓ¦Íâ´«£¬£¬£¬£¬²¢Ö´ÐÐwhoami¡¢ipconfigµÈÕì̽ÏÂÁî¡£¡£¡£¡£¡£¡£¹¥»÷½øÈë¶à½×¶ÎÀ©Õ¹£ººÚ¿Í°²ÅÅEarthwormÍøÂçËíµÀ¡¢DwagentÔ¶³Ì»á¼û¹¤¾ß¼°7-ZipѹËõ¹¤¾ß£¬£¬£¬£¬½¨ÉèÍâµØÖÎÀíÔ±ÕË»§£¨Èç¡°asp$¡±£©¡¢×ª´¢SAM/SYSTEMƾ֤£¬£¬£¬£¬²¢Í¨¹ýGoTokenTheft¾ÙÐÐÁîÅÆÄ£ÄâÌáÉýȨÏÞ¡£¡£¡£¡£¡£¡£ÎªÎ¬³Ö³¤ÆÚÐÔ£¬£¬£¬£¬¹¥»÷Õß½ûÓÃÕË»§ÃÜÂëÓâÆÚ¡¢ÊÚÓèRDPȨÏÞ£¬£¬£¬£¬²¢½«Dwagent×¢²áΪϵͳЧÀÍ¡£¡£¡£¡£¡£¡£SitecoreÁªºÏMandiantÐû²¼Ç徲ͨ¸æ£¬£¬£¬£¬½¨ÒéÖÎÀíÔ±Á¬Ã¦Ìæ»»web.configÖÐËùÓо²Ì¬ÖµÎªÎ¨Ò»ÐÂÃÜÔ¿£¬£¬£¬£¬²¢¼ÓÃÜÔªËØ£¬£¬£¬£¬Í¬Ê±Ç¿µ÷°´ÆÚÂÖ»»¾²Ì¬»úеÃÜÔ¿×÷Ϊºã¾ÃÇå¾²²½·¥¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-exploited-sitecore-zero-day-flaw-to-deploy-backdoors/
2. ·ÆÂɱö¶«ÄÏ´óѧÊý¾Ý¿âÉæÏÓй¶£¬£¬£¬£¬Ñ§ÉúÊý¾Ý±»³öÊÛ
9ÔÂ3ÈÕ£¬£¬£¬£¬Ò»ÃûÍþвÐÐΪÕßÈëÇÖÁË·ÆÂɱö¶«ÄÏ´óѧ (USeP)£¬£¬£¬£¬²¢ÔÚ°µÍøÂÛ̳ÉϳöÊÛÆäÊý¾Ý¿â¡£¡£¡£¡£¡£¡£USeP ÊÇÒ»ËùÖøÃûµÄÖÝÁ¢´óѧ£¬£¬£¬£¬Î»ÓÚ·ÆÂɱöÃÞÀ¼ÀϵºµÄ´ïÎÖÊС£¡£¡£¡£¡£¡£×÷Ϊ¸ÃµØÇøÖ÷ÒªµÄ¹«¹²Ñо¿ºÍ½ÌÓý»ú¹¹£¬£¬£¬£¬¸ÃÐ£ÕÆÎÕ×Å´ó×ÚʦÉúÊý¾Ý¡£¡£¡£¡£¡£¡£´Ë´ÎÈëÇÖÊÂÎñй¶ÁËÃô¸ÐÐÅÏ¢£¬£¬£¬£¬¶ÔÉæ°¸Ö°Ô±×é³ÉΣº¦¡£¡£¡£¡£¡£¡£ÍþвÐÐΪÕßÉù³Æ£¬£¬£¬£¬±»ÈëÇÖµÄÊý¾Ý¿â¾ÞϸÁè¼Ý 20MB£¬£¬£¬£¬°üÀ¨Ò»¸ö SQL Îļþ£¬£¬£¬£¬°üÀ¨Áè¼Ý 175,000 ÐÐÊý¾Ý¡£¡£¡£¡£¡£¡£¾Ý³Æ£¬£¬£¬£¬Ð¹Â¶µÄÐÅÏ¢°üÀ¨´ó×ÚѧÉúµÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢ (PII)£¬£¬£¬£¬ÀýÈçÈ«Ãû¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¡¢¼ÒͥסַºÍѧҵÏêÇé¡£¡£¡£¡£¡£¡£ÂÛ̳Ìû×ÓÁгöÁËÐí¶à¾Ý³Æ±»Ð¹Â¶µÄÊý¾Ý¿â±í£¬£¬£¬£¬Åú×¢±¬·¢ÁËÖÜÈ«µÄÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£¾Ý³Æ£¬£¬£¬£¬±»ÈëÇֵıí°üÀ¨£º±à¼ÇëÇó¡¢ÒÑ×¢²á¡¢È«ÇòµÄ¡¢Í¼Æ¬¡¢¼à¿Ø¡¢Î»Öá¢ÇëÇó±í¡¢ÇëÇó±í12¡¢ÇëÇó±í¾É¡¢studrecords¡¢ÏµÍ³ÈÕÖ¾¡¢ÉúÒ⡢ʵÑé¡¢Óû§¡£¡£¡£¡£¡£¡£
https://dailydarkweb.net/university-of-southeastern-philippines-database-allegedly-breached-student-data-for-sale/
3. SAP S/4HANA¸ßΣÎó²îCVE-2025-42957ÔâÒ°ÍâʹÓÃ
9ÔÂ5ÈÕ£¬£¬£¬£¬Ñо¿Ö°Ô±ÖÒÑԳƣ¬£¬£¬£¬SAP S/4HANA±£´æÒ»¸öÑÏÖØµÄ´úÂë×¢ÈëÎó²îCVE-2025-42957£¬£¬£¬£¬¸ÃÎó²îÕýÔÚ±»Ò°Íâ¹¥»÷ʹÓ㬣¬£¬£¬ÒÔ¹¥ÆÆÌ»Â¶µÄЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¸ÃÎó²îÔ´ÓÚSAP S/4HANAÖÐRFC¹ûÕæ¹¦Ð§Ä£¿£¿£¿£¿éµÄABAP´úÂë×¢ÈëÎÊÌ⣬£¬£¬£¬ÔÊÐíµÍȨÏÞÉí·ÝÑéÖ¤Óû§×¢Èëí§Òâ´úÂë¡¢ÈÆ¹ýÊÚȨ²¢ÍêÈ«½ÓÊÜSAPϵͳ¡£¡£¡£¡£¡£¡£¹©Ó¦ÉÌSAPÒÑÓÚ2025Äê8ÔÂ11ÈÕÐÞ¸´´ËÎó²î£¬£¬£¬£¬²¢½«ÆäÆÀ¶¨ÎªÑÏÖØÎó²î£¬£¬£¬£¬CVSSÆÀ·Ö¸ß´ï9.9·Ö¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬²¿·ÖϵͳÉÐδӦÓøÃÇå¾²¸üУ¬£¬£¬£¬ÕâЩδÐÞ²¹µÄϵͳÒѳÉΪºÚ¿Í¹¥»÷µÄÄ¿µÄ¡£¡£¡£¡£¡£¡£¾ÝSecurityBridge±¨¸æ£¬£¬£¬£¬CVE-2025-42957ÏÖÔÚÈÔÔÚÒ°Íâ±»Æð¾¢Ê¹Ó㬣¬£¬£¬Ö»¹ÜʹÓÃˮƽÓÐÏÞ¡£¡£¡£¡£¡£¡£SecurityBridgeÓÚ2025Äê6ÔÂ27ÈÕ·¢Ã÷¸ÃÎó²î²¢ÈÏÕæÈεØÏòSAP±¨¸æ£¬£¬£¬£¬»¹ÐÖú¿ª·¢Á˲¹¶¡¡£¡£¡£¡£¡£¡£µ«ÓÉÓÚÊÜÓ°Ïì×é¼þµÄ¿ª·ÅÐÔÒÔ¼°ABAP´úÂëµÄ¹ûÕæÐÔ£¬£¬£¬£¬ÊÖÒÕ¸ßÃ÷µÄÍþвÐÐΪÕßÄܹ»ÇáËÉÄæÏò¹¤³Ì²¹¶¡£¡£¡£¡£¡£¡£¬£¬£¬£¬×ÔÐз¢Ã÷Îó²î¡£¡£¡£¡£¡£¡£¸ÃÎó²îµÄDZÔÚЧ¹û°üÀ¨Êý¾Ý͵ÇÔ¡¢Êý¾ÝʹÓᢴúÂë×¢È롢ͨ¹ý½¨ÉèºóÃÅÕË»§ÌáÉýȨÏÞ¡¢Æ¾Ö¤ÍµÇÔÒÔ¼°Í¨¹ý¶ñÒâÈí¼þ¡¢ÀÕË÷Èí¼þµÈ·½·¨ÖÐÖ¹ÔËÓª¡£¡£¡£¡£¡£¡£SecurityBridge»¹ÖÆ×÷ÁËÊÓÆµÑÝʾÔõÑùʹÓøÃÎó²îÔÚSAPЧÀÍÆ÷ÉÏÔËÐÐϵͳÏÂÁî¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/critical-sap-s-4hana-vulnerability-now-exploited-in-attacks/
4. WealthsimpleÅû¶Êý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬³¬300Íò¿Í»§ÊÜÓ°Ïì
9ÔÂ5ÈÕ£¬£¬£¬£¬¼ÓÄôóÔÚÏßͶ×ÊÖÎÀí¾ÞÍ·WealthsimpleÅû¶һÆðÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÈëÇÖµÚÈý·½±àдµÄÈí¼þ°ü£¬£¬£¬£¬Î´¾ÊÚȨ»á¼ûÁ˲»µ½1%¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾½¨ÉèÓÚ2014Ä꣬£¬£¬£¬×ܲ¿Î»ÓÚ¶àÂ׶࣬£¬£¬£¬ÖÎÀí×ʲú³¬845ÒÚ¼ÓÔª£¬£¬£¬£¬Ð§Àͳ¬300Íò¼ÓÄôóÈË£¬£¬£¬£¬º¸ÇͶ×Ê¡¢ÉúÒâ¡¢¼ÓÃÜÇ®±Ò¡¢±¨Ë°¡¢ÏûºÄºÍ´¢±¸µÈ½ðÈÚ²úÆ·£¬£¬£¬£¬ÆäAndroidÓ¦ÓÃÏÂÔØÁ¿³¬100Íò´Î£¬£¬£¬£¬iOSÓ¦Óûñ³¬12.6ÍòÌõÆÀ·Ö¡£¡£¡£¡£¡£¡£¾Ý¹«Ë¾ÉùÃ÷¼°Ïò¿Í»§·¢Ë͵ÄÎ¥¹æÍ¨ÖªÏÔʾ£¬£¬£¬£¬Ð¹Â¶Êý¾Ý°üÀ¨ÁªÏµ·½·¨¡¢Õþ¸®Éí·ÝÖ¤ÐÅÏ¢¡¢²ÆÎñÏêÇ飨ÈçÕ˺š¢IPµØµã¡¢Éç»á°ü¹ÜºÅ¡¢³öÉúÈÕÆÚ£©£¬£¬£¬£¬µ«Î´Éæ¼°×ʽðÇÔÈ¡»òÃÜÂëй¶¡£¡£¡£¡£¡£¡£¹«Ë¾Ç¿µ÷ËùÓпͻ§ÕË»§Çå¾²£¬£¬£¬£¬²¢ÒÑͨ¹ýµç×ÓÓʼþ֪ͨÊÜÓ°ÏìÓû§£¬£¬£¬£¬ÌṩÁ½ÄêÃâ·ÑÐÅÓÃ¼à¿Ø¡¢°µÍø¼à¿Ø¡¢Éí·Ý͵ÇÔ±£»£»£»£»£»£»¤ºÍ°ü¹ÜЧÀÍ£¬£¬£¬£¬Í¬Ê±½¨ÒéÆôÓÃË«ÒòËØÈÏÖ¤¡¢×èÖ¹ÃÜÂëÖØ¸´Ê¹Ó㬣¬£¬£¬²¢Ð¡ÐÄÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£Wealthsimple½²»°ÈËÌåÏÖ¡°¸ÃÊÂÎñÓëSalesforceÎ޹ء±¡£¡£¡£¡£¡£¡£¹«Ë¾Î´Åû¶¹¥»÷ÕßÏêϸÈëÇÖÊֶΣ¬£¬£¬£¬½öÖ¸³öÎó²îÔ´ÓÚµÚÈý·½Èí¼þ°ü¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/financial-services-firm-wealthsimple-discloses-data-breach/
5. Nx¡°s1ngularity¡±¹©Ó¦Á´¹¥»÷£ºAI¹¤¾ßÀÄÓÃÖÂÊýǧÉñÃØÐ¹Â¶
9ÔÂ6ÈÕ£¬£¬£¬£¬½üÆÚÕë¶Ô¿ªÔ´¹¹½¨¹¤¾ßNxµÄ¡°s1ngularity¡±¹©Ó¦Á´¹¥»÷±¬·¢£¬£¬£¬£¬¹¥»÷Õßͨ¹ý¸Ä¶¯GitHub ActionsÊÂÇéÁ÷ÔÚNPMÐû²¼º¬¡°telemetry.js¡±¶ñÒâÈí¼þµÄNx°ü¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÕë¶ÔLinux/macOSϵͳ£¬£¬£¬£¬Ê¹ÓÃClaude¡¢Q¡¢GeminiµÈAI¹¤¾ßµÄLLMÌáÐÑÇÔÈ¡GitHubÁîÅÆ¡¢npmÁîÅÆ¡¢SSHÃÜÔ¿µÈÃô¸ÐÐÅÏ¢£¬£¬£¬£¬²¢ÉÏ´«ÖÁ¡°s1ngularity-repository¡±¹«¹²´æ´¢¿â¡£¡£¡£¡£¡£¡£WizʺóÆÀ¹ÀÏÔʾ£¬£¬£¬£¬ÊÂÎñ·ÖÈý½×¶Îµ¼ÖÂ2,180¸öÕË»§¡¢7,200¸ö´æ´¢¿âй¶£¬£¬£¬£¬³¬2,000¸öΨһÉñÃØ¼°20,000¸öÎļþ̻¶£¬£¬£¬£¬ÇÒ´ó×ÚÉñÃØÈÔÓÐÓ㬣¬£¬£¬Ó°ÏìÒ»Á¬À©´ó¡£¡£¡£¡£¡£¡£¹¥»÷·ÖÈý½×¶Î£ºÊ׽׶Σ¨8ÔÂ26-27ÈÕ£©Ö±½ÓÓ°Ïì1,700Óû§£¬£¬£¬£¬Ð¹Â¶³¬2,000ÉñÃØ£»£»£»£»£»£»´Î½×¶Î£¨8ÔÂ28-29ÈÕ£©¹¥»÷ÕßʹÓÃй¶µÄGitHubÁîÅÆ½«Ë½ÓпâתΪ¹«¹²¿â²¢ÖØÃüÃû£¬£¬£¬£¬µ¼ÖÂ480¸öÕË»§£¨¶àΪ×éÖ¯£©¼°6,700¸ö´æ´¢¿âÊÜË𣻣»£»£»£»£»Ä©½×¶Î£¨8ÔÂ31ÈÕ£©¹¥»÷ÕßÕë¶ÔÌØ¶¨×éÖ¯£¬£¬£¬£¬Í¨¹ý±»¿ØÕË»§Ðû²¼500¸ö˽ÈË´æ´¢¿â¡£¡£¡£¡£¡£¡£GitHubËäÔÚ°ËСʱÄÚɾ³ý¹¥»÷Õ߿⣬£¬£¬£¬µ«Êý¾ÝÒѱ»¸´ÖÆ¡£¡£¡£¡£¡£¡£NxÍŶÓʺóÆÊÎöÖ¸³ö£¬£¬£¬£¬ÈëÇÖÔ´ÓÚÀÈ¡ÇëÇóÎÊÌâ×¢Èë¼°pull_request_targetµÄ²»Ç徲ʹÓ㬣¬£¬£¬Ê¹¹¥»÷ÕßÒÔÌáÉýȨÏÞÔËÐдúÂ룬£¬£¬£¬´¥·¢Ðû²¼¹ÜµÀ²¢Ð¹Â¶npmÁîÅÆ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/ai-powered-malware-hit-2-180-github-accounts-in-s1ngularity-attack/
6. VirusTotal½ÒÆÆSVGÎļþÖеÄÍøÂç´¹ÂÚ¹¥»÷
9ÔÂ6ÈÕ£¬£¬£¬£¬VirusTotalͨ¹ýÆäAI Code Insightƽ̨ÐÂÔöSVGÖ§³Öºó£¬£¬£¬£¬·¢Ã÷Ò»ÆðʹÓÃSVGÎļþʵÑéµÄÍøÂç´¹ÂÚ¹¥»÷»î¶¯£¬£¬£¬£¬¸Ã»î¶¯Ã°³ä¸çÂ×±ÈÑÇ˾·¨ÏµÍ³ÃÅ»§ÍøÕ¾Èö²¥¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£SVG×÷Ϊ¿ÉËõ·ÅʸÁ¿Í¼ÐÎÃûÌ㬣¬£¬£¬¿Éͨ¹ýÔªËØÇ¶ÈëHTMLºÍJavaScript£¬£¬£¬£¬ÔÚ¼ÓÔØÊ±Ö´ÐдúÂ룬£¬£¬£¬ÕâÒ»ÌØÕ÷±»ÍþвÐÐΪÕßÀÄÓᣡ£¡£¡£¡£¡£¹¥»÷ÖУ¬£¬£¬£¬SVGÎļþäÖȾÐéαÕþ¸®ÃÅ»§ÍøÕ¾£¬£¬£¬£¬ÏÔʾ±ÆÕæµÄÏÂÔØ½ø¶ÈÌõ¼°°¸Àý±àºÅ¡¢Çå¾²ÁîÅÆµÈÐÅÈÎÌáÐÑ£¬£¬£¬£¬ÓÕµ¼Óû§ÏÂÔØÃÜÂë±£»£»£»£»£»£»¤µÄZIPѹËõ°ü£¬£¬£¬£¬ÃÜÂëÖ±½ÓÏÔʾÔÚÒ³ÃæÉÏ¡£¡£¡£¡£¡£¡£¾ÆÊÎö£¬£¬£¬£¬ÌáÈ¡µÄZIPÎļþ°üÀ¨Î±×°³É¹Ù·½Ë¾·¨ÎļþµÄComodo Dragonä¯ÀÀÆ÷¿ÉÖ´ÐÐÎļþ¡¢¶ñÒâDLL¼°Á½¸ö¼ÓÃÜÎļþ¡£¡£¡£¡£¡£¡£Óû§ÔËÐпÉÖ´ÐÐÎļþʱ£¬£¬£¬£¬¶ñÒâDLL»á±»²àÔØ£¬£¬£¬£¬½ø¶øÔÚϵͳÖÐ×°Öøü¶à¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£VirusTotalÖ¸³ö£¬£¬£¬£¬´ËÀ๥»÷ÒòSVGÖ§³ÖÖØ´ó½»»¥ÇÒ·À²¡¶¾Èí¼þ¼ì²âÂʵͣ¬£¬£¬£¬Ò×ÌӱܹŰåÇå¾²¼ì²â¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÖУ¬£¬£¬£¬AI Code Insightͨ¹ý»úеѧϰÆÊÎöÎļþÐÐΪ£¬£¬£¬£¬Ê¶±ð³öSVGÖÐÒþ²ØµÄJavaScriptÖ´ÐÐHTMLµÄÒì³£ÐÐΪ£¬£¬£¬£¬³ÉΪ½ÒÆÆ¹¥»÷µÄÒªº¦¡£¡£¡£¡£¡£¡£¸Ã¹¤¾ßÌìÉúµÄ¿ÉÒÉÐÐΪժҪ×ÊÖúÑо¿Ö°Ô±¿ìËÙ¶¨Î»¶ñÒâ»î¶¯¡£¡£¡£¡£¡£¡£½øÒ»³ÌÐò²é·¢Ã÷£¬£¬£¬£¬523¸öÏÈǰÉÏ´«µÄSVGÎļþͬÊô¸Ã»î¶¯£¬£¬£¬£¬µ«´Ëǰ¾ùδ±»Çå¾²Èí¼þ±ê¼ÇΪ¶ñÒâ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/virustotal-finds-hidden-malware-phishing-campaign-in-svg-files/


¾©¹«Íø°²±¸11010802024551ºÅ