ºÚ¿ÍÀûÓÃSitecoreÁãÈÕ·ì϶CVE-2025-53690²¿ÊðºóÃÅ
°ä²¼¹¦·ò 2025-09-081. ºÚ¿ÍÀûÓÃSitecoreÁãÈÕ·ì϶CVE-2025-53690²¿ÊðºóÃÅ
9ÔÂ4ÈÕ£¬ÍþвÐÐΪÕßͨ¹ý¾É°æSitecore²¿ÊðÖеÄÁãÈÕ·ì϶CVE-2025-53690ÌáÒé¹¥»÷£¬¸Ã·ì϶ԴÓÚ2017ÄêǰSitecoreÖ¸ÄÏÖй«¿ªµÄʾÀýASP.NET»úеÃÜÔ¿±»³ö²ú»·¾³³Á¸´Ê¹Ó㬵¼ÖÂViewState·´ÐòÁл¯·ì϶Òý·¢Ô¶³Ì´úÂëÖ´ÐУ¨RCE£©¡£¹¥»÷ÕßÕë¶Ôº¬Î´¾ÑéÖ¤ViewState×ֶεġ°/sitecore/blocked.aspx¡±¶Ëµã£¬ÔÚIISÍøÂç·þÎñÕË»§ÏÂÖ´ÐжñÒâ¡°_VIEWSTATE¡±¸ºÔØ£¬²¿ÊðWeepSteel¿úËźóÃÅ¡£¸Ã¶ñÒâÈí¼þ¿ÉÇÔȡϵͳ¡¢¹ý³Ì¡¢´ÅÅ̼°ÍøÂçÐÅÏ¢£¬¼Ù×°³É³ß¶ÈViewStateÏìÓ¦±í´«£¬²¢Ö´ÐÐwhoami¡¢ipconfigµÈ¿úËźÅÁî¡£¹¥»÷½øÈë¶à½×¶ÎÀ©´ó£ººÚ¿Í²¿ÊðEarthwormÍøÂçËí·¡¢DwagentÔ¶³Ì½Ó¼û¹¤¾ß¼°7-ZipѹËõ¹¤¾ß£¬´´½¨±¾µØÖÎÀíÔ¹ØË»§£¨Èç¡°asp$¡±£©¡¢×ª´¢SAM/SYSTEMÍ´´¦£¬²¢Í¨¹ýGoTokenTheft½øÐÐÁîÅÆ·ÂÕÕÌáÉýȨÏÞ¡£ÎªÎ¬³ÖÓÆ¾ÃÐÔ£¬¹¥»÷Õß½ûÓÃÕË»§ÃÜÂë¹ýÆÚ¡¢ÊÚÓèRDPȨÏÞ£¬²¢½«Dwagent×¢²áΪϵͳ·þÎñ¡£Sitecore½áºÏMandiant°ä²¼°²È«²¼¸æ£¬½¨ÒéÖÎÀíÔ±µ±¼´´úÌæweb.configÖÐËùÓо²Ì¬ÖµÎªÎ¨Ò»ÐÂÃÜÔ¿£¬²¢¼ÓÃÜÔªËØ£¬Í¬Ê±Ç¿µ÷¶¨ÆÚÂÖ»»¾²Ì¬»úеÃÜÔ¿×÷Ϊ³Ö¾Ã°²È«´ëÊ©¡£
https://www.bleepingcomputer.com/news/security/hackers-exploited-sitecore-zero-day-flaw-to-deploy-backdoors/
2. ·ÆÂɱö¶«ÄÏ´óѧÊý¾Ý¿âÉæÏÓй¶£¬Ñ§ÉúÊý¾Ý±»ÏúÊÛ
9ÔÂ3ÈÕ£¬Ò»ÃûÍþвÐÐΪÕßÈëÇÖÁË·ÆÂɱö¶«ÄÏ´óѧ (USeP)£¬²¢ÔÚ°µÍøÂÛ̳ÉÏÏúÊÛÆäÊý¾Ý¿â¡£USeP ÊÇÒ»Ëù³ÛÃûµÄÖÝÁ¢´óѧ£¬Î»ÓÚ·ÆÂɱöÃÞÀ¼ÀϵºµÄ´ïÎÖÊС£×÷Ϊ¸ÃµØÓò³ÁÒªµÄ¹«¹²×êÑкͽÌÓý»ú¹¹£¬¸ÃУ°ÑÎÕ×Å´óÁ¿Ê¦ÉúÊý¾Ý¡£Õâ´ÎÈëÇÖÊÂÎñй¶ÁËÃô¸ÐÐÅÏ¢£¬¶ÔÉæ°¸ÈËÔ±×é³É·çÏÕ¡£ÍþвÐÐΪÕßÐû³Æ£¬±»ÈëÇÖµÄÊý¾Ý¿â´óÓ׳¬¹ý 20MB£¬Ô̺¬Ò»¸ö SQL Îļþ£¬Ô̺¬³¬¹ý 175,000 ÐÐÊý¾Ý¡£¾Ý³Æ£¬Ð¹Â¶µÄÐÅÏ¢Ô̺¬´óÁ¿Ñ§ÉúµÄÓ×ÎÒÉí·ÝÐÅÏ¢ (PII)£¬ÀýÈçÈ«Ãû¡¢µç×ÓÓʼþµØÖ·¡¢µç»°ºÅÂë¡¢¼ÒͥסַºÍѧҵÏêÇé¡£ÂÛ̳Ìû×ÓÁгöÁ˺ܶà¾Ý³Æ±»Ð¹Â¶µÄÊý¾Ý¿â±í£¬Åú×¢²úÉúÁËÈ«ÃæµÄÊý¾Ýй¶ÊÂÎñ¡£¾Ý³Æ£¬±»ÈëÇֵıíÔ̺¬£º±à×ëÒªÇó¡¢ÒÑ×¢²á¡¢È«ÇòµÄ¡¢Í¼Æ¬¡¢¼à¿Ø¡¢µØÎ»¡¢ÒªÇó±í¡¢ÒªÇó±í12¡¢ÒªÇó±í¾É¡¢studrecords¡¢ÏµÍ³ÈÕÖ¾¡¢ÂòÂô¡¢³¢ÊÔ¡¢Óû§¡£
https://dailydarkweb.net/university-of-southeastern-philippines-database-allegedly-breached-student-data-for-sale/
3. SAP S/4HANA¸ßΣ·ì϶CVE-2025-42957ÔâÒ°±íÀûÓÃ
9ÔÂ5ÈÕ£¬×êÑÐÈËÔ±ÖÒ¸æ³Æ£¬SAP S/4HANA´æÔÚÒ»¸öÑϳÁµÄ´úÂë×¢Èë·ì϶CVE-2025-42957£¬¸Ã·ì϶ÔÚ±»Ò°±í¹¥»÷ÀûÓã¬ÒÔ¹¥ÆÆÂ¶³öµÄ·þÎñÆ÷¡£¸Ã·ì϶ԴÓÚSAP S/4HANAÖÐRFC¹«¿ªÖ°ÄÜÄ£¿éµÄABAP´úÂë×¢ÈëÎÊÌ⣬ÔÊÐíµÍȨÏÞÉí·ÝÑéÖ¤Óû§×¢ÈëËÁÒâ´úÂë¡¢ÈÆ¹ýÊÚȨ²¢ÆëÈ«ÊÕÊÜSAPϵͳ¡£¹©¸øÉÌSAPÒÑÓÚ2025Äê8ÔÂ11ÈÕ½¨¸´´Ë·ì϶£¬²¢½«ÆäÆÀ¶¨ÎªÑϳÁ·ì϶£¬CVSSÆÀ·Ö¸ß´ï9.9·Ö¡£È»¶ø£¬²¿ÃÅϵͳÉÐδÀûÓøð²È«¸üУ¬ÕâЩ佨²¹µÄϵͳÒѳÉΪºÚ¿Í¹¥»÷µÄÖ¸±ê¡£¾ÝSecurityBridge»ã±¨£¬CVE-2025-42957ĿǰÈÔÔÚÒ°±í±»»ý¼«ÀûÓã¬Ö»¹ÜÀûÓó̶Å×ÐÏÞ¡£SecurityBridgeÓÚ2025Äê6ÔÂ27ÈÕ·¢Ïָ÷ì϶²¢ÕƹÜÈεØÏòSAP»ã±¨£¬»¹ÐÖú¿ª·¢Á˲¹¶¡¡£µ«ÓÉÓÚÊÜÓ°Ïì×é¼þµÄÊ¢¿ªÐÔÒÔ¼°ABAP´úÂëµÄ¹«¿ªÐÔ£¬¼¼Êõ¸ßÃ÷µÄÍþвÐÐΪÕß¿ÉÄÜÇáËÉÄæÏò¹¤³Ì²¹¶¡£¬×ÔÐз¢ÏÖ·ì϶¡£¸Ã·ì϶µÄDZÔÚºó¹ûÔ̺¬Êý¾Ý͵ÇÔ¡¢Êý¾Ý°Ñ³Ö¡¢´úÂë×¢È롢ͨ¹ý´´½¨ºóÃÅÕË»§ÌáÉýȨÏÞ¡¢Æ¾Ö¤ÍµÇÔÒÔ¼°Í¨¹ý¶ñÒâÈí¼þ¡¢ÀÕË÷Èí¼þµÈ·½Ê½ÖжÏÔËÓª¡£SecurityBridge»¹Ôì×÷ÁËÊÓÆµÑÝʾÈôºÎÀûÓø÷ì϶ÔÚSAP·þÎñÆ÷ÉÏÔËÐÐϵͳºÅÁî¡£
https://www.bleepingcomputer.com/news/security/critical-sap-s-4hana-vulnerability-now-exploited-in-attacks/
4. WealthsimpleÅû¶Êý¾Ýй¶ÊÂÎñ£¬³¬300Íò¿Í»§ÊÜÓ°Ïì
9ÔÂ5ÈÕ£¬¼ÓÄôóÔÚÏßͶ×ÊÖÎÀí¾ÞÍ·WealthsimpleÅû¶һ·Êý¾Ýй¶ÊÂÎñ£¬¹¥»÷Õßͨ¹ýÈëÇÖµÚÈý·½±àдµÄÈí¼þ°ü£¬Î´¾ÊÚȨ½Ó¼ûÁ˲»µ½1%¿Í»§µÄÓ×ÎÒÐÅÏ¢¡£¸Ã¹«Ë¾³ÉÁ¢ÓÚ2014Ä꣬×ܲ¿Î»ÓÚ¶àÂ׶࣬ÖÎÀí×ʲú³¬845ÒÚ¼ÓÔª£¬·þÎñ³¬300Íò¼ÓÄôóÈË£¬º¸ÇͶ×Ê¡¢ÂòÂô¡¢¼ÓÃÜÇ®±Ò¡¢±¨Ë°¡¢Ïû·ÑºÍ´¢ÐîµÈ½ðÈÚ²úÆ·£¬ÆäAndroidÀûÓÃÏÂÔØÁ¿³¬100Íò´Î£¬iOSÀûÓûñ³¬12.6ÍòÌõÆÀ·Ö¡£¾Ý¹«Ë¾ÉêÃ÷¼°Ïò¿Í»§·¢Ë͵ÄÎ¥¹æÍ¨ÖªÏÔʾ£¬Ð¹Â¶Êý¾ÝÔ̺¬ÁªÏµ·½Ê½¡¢µ±¾ÖÉí·ÝÖ¤ÐÅÏ¢¡¢²ÆÕþÏêÇ飨ÈçÕ˺š¢IPµØÖ·¡¢Éç»á±£Ïպ𢵮ÉúÈÕÆÚ£©£¬µ«Î´Éæ¼°×ʽðÇÔÈ¡»òÃÜÂëй¶¡£¹«Ë¾Ç¿µ÷ËùÓпͻ§ÕË»§°²È«£¬²¢ÒÑͨ¹ýµç×ÓÓʼþ֪ͨÊÜÓ°ÏìÓû§£¬ÌṩÁ½ÄêÃâ·ÑÐÅÓþ¼à¿Ø¡¢°µÍø¼à¿Ø¡¢Éí·Ý͵ÇÔ±£»¤ºÍ±£ÏÕ·þÎñ£¬Í¬Ê±½¨ÒéÆôÓÃË«³É·ÖÈÏÖ¤¡¢Ô¤·ÀÃÜÂë³Á¸´Ê¹Ó㬲¢¾¯ÌèÍøÂç´¹µö¹¥»÷¡£Wealthsimple½²»°È˰µÊ¾¡°¸ÃÊÂÎñÓëSalesforceÎ޹ء±¡£¹«Ë¾Î´Åû¶¹¥»÷Õß¾ßÌåÈëÇÖ¼¿Á©£¬½öָ¶Âí½ÅÔ´ÓÚµÚÈý·½Èí¼þ°ü¡£
https://www.bleepingcomputer.com/news/security/financial-services-firm-wealthsimple-discloses-data-breach/
5. Nx¡°s1ngularity¡±¹©¸øÁ´¹¥»÷£ºAI¹¤¾ßÀÄÓÃÖÂÊýǧ»úÃÜй¶
9ÔÂ6ÈÕ£¬½üÆÚÕë¶Ô¿ªÔ´¹¹½¨¹¤¾ßNxµÄ¡°s1ngularity¡±¹©¸øÁ´¹¥»÷·¢×÷£¬¹¥»÷Õßͨ¹ý´Û¸ÄGitHub Actions¹¤×÷Á÷ÔÚNPM°ä²¼º¬¡°telemetry.js¡±¶ñÒâÈí¼þµÄNx°ü¡£¸Ã¶ñÒâÈí¼þÕë¶ÔLinux/macOSϵͳ£¬ÀûÓÃClaude¡¢Q¡¢GeminiµÈAI¹¤¾ßµÄLLMÌáÐÑÇÔÈ¡GitHubÁîÅÆ¡¢npmÁîÅÆ¡¢SSHÃÜÔ¿µÈÃô¸ÐÐÅÏ¢£¬²¢ÉÏ´«ÖÁ¡°s1ngularity-repository¡±¹«¹²´æ´¢¿â¡£Wiz¹ýºóÆÀ¹ÀÏÔʾ£¬ÊÂÎñ·ÖÈý½×¶Îµ¼ÖÂ2,180¸öÕË»§¡¢7,200¸ö´æ´¢¿âй¶£¬³¬2,000¸öΨһ»úÃܼ°20,000¸öÎļþ¶³ö£¬ÇÒ´óÁ¿»úÃÜÈÔÓÐЧ£¬Ó°Ïì³ÖÐøÀ©´ó¡£¹¥»÷·ÖÈý½×¶Î£ºÊ׽׶Σ¨8ÔÂ26-27ÈÕ£©Ö±½ÓÓ°Ïì1,700Óû§£¬Ð¹Â¶³¬2,000»úÃÜ£»´Î½×¶Î£¨8ÔÂ28-29ÈÕ£©¹¥»÷ÕßÀûÓÃй¶µÄGitHubÁîÅÆ½«Ë½ÓпâתΪ¹«¹²¿â²¢³Á¶¨Ãû£¬µ¼ÖÂ480¸öÕË»§£¨¶àΪ×éÖ¯£©¼°6,700¸ö´æ´¢¿âÊÜËð£»Ä©½×¶Î£¨8ÔÂ31ÈÕ£©¹¥»÷ÕßÕë¶ÔÌØ¶¨×éÖ¯£¬Í¨¹ý±»¿ØÕË»§°ä²¼500¸ö¸öÈË´æ´¢¿â¡£GitHubËäÔÚ°ËÓ×ʱÄÚɾ³ý¹¥»÷Õ߿⣬µ«Êý¾ÝÒѱ»¸´Ôì¡£NxÍŶӹýºó·ÖÎöÖ¸³ö£¬ÈëÇÖÔ´ÓÚÀȡҪÇó±êÌâ×¢Èë¼°pull_request_targetµÄ²»°²È«Ê¹Óã¬Ê¹¹¥»÷ÕßÒÔÌáÉýȨÏÞÔËÐдúÂ룬´¥·¢°ä²¼¹Ü·²¢Ð¹Â¶npmÁîÅÆ¡£
https://www.bleepingcomputer.com/news/security/ai-powered-malware-hit-2-180-github-accounts-in-s1ngularity-attack/
6. VirusTotal¸æ·¢SVGÎļþÖеÄÍøÂç´¹µö¹¥»÷
9ÔÂ6ÈÕ£¬VirusTotalͨ¹ýÆäAI Code Insightƽ̨ÐÂÔöSVGÖ§³Öºó£¬·¢ÏÖһ·ÀûÓÃSVGÎļþÖ´ÐеÄÍøÂç´¹µö¹¥»÷»î¶¯£¬¸Ã»î¶¯¼ÙÒâ¸çÂ×±ÈÑÇ˾·¨ÏµÍ³ÃÅ»§ÍøÕ¾´«²¼¶ñÒâÈí¼þ¡£SVG×÷Ϊ¿ÉËõ·ÅʸÁ¿Í¼ÐÎÌåʽ£¬¿Éͨ¹ýÔªËØÇ¶ÈëHTMLºÍJavaScript£¬ÔÚ¼ÓÔØÊ±Ö´ÐдúÂ룬ÕâÒ»¸öÐÔ±»ÍþвÐÐΪÕßÀÄÓ᣹¥»÷ÖУ¬SVGÎļþäÖȾÐéαµ±¾ÖÃÅ»§ÍøÕ¾£¬ÏÔÊ¾ÕæÇеÄÏÂÔØ½ø¶ÈÌõ¼°°¸Àý±àºÅ¡¢°²È«ÁîÅÆµÈÐÅÀµÌáÐÑ£¬ÓÕµ¼Óû§ÏÂÔØÃÜÂë±£»¤µÄZIPѹËõ°ü£¬ÃÜÂëÖ±½ÓÏÔʾÔÚÒ³ÃæÉÏ¡£¾·ÖÎö£¬ÌáÈ¡µÄZIPÎļþÔ̺¬¼Ù×°³É¹Ù·½Ë¾·¨ÎļþµÄComodo Dragonä¯ÀÀÆ÷¿ÉÖ´ÐÐÎļþ¡¢¶ñÒâDLL¼°Á½¸ö¼ÓÃÜÎļþ¡£Óû§ÔËÐпÉÖ´ÐÐÎļþʱ£¬¶ñÒâDLL»á±»²àÔØ£¬½ø¶øÔÚϵͳÖÐ×°Öøü¶à¶ñÒâÈí¼þ¡£VirusTotalÖ¸³ö£¬´ËÀ๥»÷ÒòSVGÖ§³Ö¸´ÔÓ½»»¥ÇÒ·À²¡¶¾Èí¼þ¼ì²âÂʵͣ¬Ò×Ìӱܴ«Í³°²È«¼ì²â¡£Õâ´ÎÊÂÎñÖУ¬AI Code Insightͨ¹ý»úе½ø½¨·ÖÎöÎļþÐÐΪ£¬¼ø±ð³öSVGÖаµ²ØµÄJavaScriptÖ´ÐÐHTMLµÄÒì³£ÐÐΪ£¬³ÉΪ¸æ·¢¹¥»÷µÄ¹Ø¼ü¡£¸Ã¹¤¾ßÌìÉúµÄ¿ÉÒÉÐÐΪÌáÒªÔ®ÊÖ×êÑÐÈËÔ±¼±¾ç¶¨Î»¶ñÒâ»î¶¯¡£½øÒ»´ëÊ©²é·¢ÏÖ£¬523¸öÏÈǰÉÏ´«µÄSVGÎļþͬÊô¸Ã»î¶¯£¬µ«´Ëǰ¾ùδ±»°²È«Èí¼þÏóÕ÷Ϊ¶ñÒâ¡£
https://www.bleepingcomputer.com/news/security/virustotal-finds-hidden-malware-phishing-campaign-in-svg-files/


¾©¹«Íø°²±¸11010802024551ºÅ