ºÚ¿ÍʹÓÃSitecoreÁãÈÕÎó²îCVE-2025-53690°²ÅźóÃÅ

Ðû²¼Ê±¼ä 2025-09-08

1. ºÚ¿ÍʹÓÃSitecoreÁãÈÕÎó²îCVE-2025-53690°²ÅźóÃÅ


9ÔÂ4ÈÕ£¬£¬£¬£¬ÍþвÐÐΪÕßͨ¹ý¾É°æSitecore°²ÅÅÖеÄÁãÈÕÎó²îCVE-2025-53690Ìᳫ¹¥»÷£¬£¬£¬£¬¸ÃÎó²îÔ´ÓÚ2017ÄêǰSitecoreÖ¸ÄÏÖйûÕæµÄʾÀýASP.NET»úеÃÜÔ¿±»Éú²úÇéÐÎÖØ¸´Ê¹Ó㬣¬£¬£¬µ¼ÖÂViewState·´ÐòÁл¯Îó²îÒý·¢Ô¶³Ì´úÂëÖ´ÐУ¨RCE£©¡£¡£¡£¹¥»÷ÕßÕë¶Ôº¬Î´ÂÄÀúÖ¤ViewState×ֶεġ°/sitecore/blocked.aspx¡±¶Ëµã£¬£¬£¬£¬ÔÚIISÍøÂçЧÀÍÕË»§ÏÂÖ´ÐжñÒâ¡°_VIEWSTATE¡±¸ºÔØ£¬£¬£¬£¬°²ÅÅWeepSteelÕì̽ºóÃÅ¡£¡£¡£¸Ã¶ñÒâÈí¼þ¿ÉÇÔȡϵͳ¡¢Àú³Ì¡¢´ÅÅ̼°ÍøÂçÐÅÏ¢£¬£¬£¬£¬Î±×°³É±ê×¼ViewStateÏìÓ¦Íâ´«£¬£¬£¬£¬²¢Ö´ÐÐwhoami¡¢ipconfigµÈÕì̽ÏÂÁî¡£¡£¡£¹¥»÷½øÈë¶à½×¶ÎÀ©Õ¹£ººÚ¿Í°²ÅÅEarthwormÍøÂçËíµÀ¡¢DwagentÔ¶³Ì»á¼û¹¤¾ß¼°7-ZipѹËõ¹¤¾ß£¬£¬£¬£¬½¨ÉèÍâµØÖÎÀíÔ±ÕË»§£¨Èç¡°asp$¡±£©¡¢×ª´¢SAM/SYSTEMƾ֤£¬£¬£¬£¬²¢Í¨¹ýGoTokenTheft¾ÙÐÐÁîÅÆÄ£ÄâÌáÉýȨÏÞ¡£¡£¡£ÎªÎ¬³Ö³¤ÆÚÐÔ£¬£¬£¬£¬¹¥»÷Õß½ûÓÃÕË»§ÃÜÂëÓâÆÚ¡¢ÊÚÓèRDPȨÏÞ£¬£¬£¬£¬²¢½«Dwagent×¢²áΪϵͳЧÀÍ¡£¡£¡£SitecoreÁªºÏMandiantÐû²¼Ç徲ͨ¸æ£¬£¬£¬£¬½¨ÒéÖÎÀíÔ±Á¬Ã¦Ìæ»»web.configÖÐËùÓо²Ì¬ÖµÎªÎ¨Ò»ÐÂÃÜÔ¿£¬£¬£¬£¬²¢¼ÓÃÜÔªËØ£¬£¬£¬£¬Í¬Ê±Ç¿µ÷°´ÆÚÂÖ»»¾²Ì¬»úеÃÜÔ¿×÷Ϊºã¾ÃÇå¾²²½·¥¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-exploited-sitecore-zero-day-flaw-to-deploy-backdoors/


2. ·ÆÂɱö¶«ÄÏ´óѧÊý¾Ý¿âÉæÏÓй¶£¬£¬£¬£¬Ñ§ÉúÊý¾Ý±»³öÊÛ


9ÔÂ3ÈÕ£¬£¬£¬£¬Ò»ÃûÍþвÐÐΪÕßÈëÇÖÁË·ÆÂɱö¶«ÄÏ´óѧ (USeP)£¬£¬£¬£¬²¢ÔÚ°µÍøÂÛ̳ÉϳöÊÛÆäÊý¾Ý¿â¡£¡£¡£USeP ÊÇÒ»ËùÖøÃûµÄÖÝÁ¢´óѧ£¬£¬£¬£¬Î»ÓÚ·ÆÂɱöÃÞÀ¼ÀϵºµÄ´ïÎÖÊС£¡£¡£×÷Ϊ¸ÃµØÇøÖ÷ÒªµÄ¹«¹²Ñо¿ºÍ½ÌÓý»ú¹¹£¬£¬£¬£¬¸ÃÐ£ÕÆÎÕ×Å´ó×ÚʦÉúÊý¾Ý¡£¡£¡£´Ë´ÎÈëÇÖÊÂÎñй¶ÁËÃô¸ÐÐÅÏ¢£¬£¬£¬£¬¶ÔÉæ°¸Ö°Ô±×é³ÉΣº¦¡£¡£¡£ÍþвÐÐΪÕßÉù³Æ£¬£¬£¬£¬±»ÈëÇÖµÄÊý¾Ý¿â¾ÞϸÁè¼Ý 20MB£¬£¬£¬£¬°üÀ¨Ò»¸ö SQL Îļþ£¬£¬£¬£¬°üÀ¨Áè¼Ý 175,000 ÐÐÊý¾Ý¡£¡£¡£¾Ý³Æ£¬£¬£¬£¬Ð¹Â¶µÄÐÅÏ¢°üÀ¨´ó×ÚѧÉúµÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢ (PII)£¬£¬£¬£¬ÀýÈçÈ«Ãû¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¡¢¼ÒͥסַºÍѧҵÏêÇé¡£¡£¡£ÂÛ̳Ìû×ÓÁгöÁËÐí¶à¾Ý³Æ±»Ð¹Â¶µÄÊý¾Ý¿â±í£¬£¬£¬£¬Åú×¢±¬·¢ÁËÖÜÈ«µÄÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¾Ý³Æ£¬£¬£¬£¬±»ÈëÇֵıí°üÀ¨£º±à¼­ÇëÇó¡¢ÒÑ×¢²á¡¢È«ÇòµÄ¡¢Í¼Æ¬¡¢¼à¿Ø¡¢Î»Öá¢ÇëÇó±í¡¢ÇëÇó±í12¡¢ÇëÇó±í¾É¡¢studrecords¡¢ÏµÍ³ÈÕÖ¾¡¢ÉúÒ⡢ʵÑé¡¢Óû§¡£¡£¡£


https://dailydarkweb.net/university-of-southeastern-philippines-database-allegedly-breached-student-data-for-sale/


3. SAP S/4HANA¸ßΣÎó²îCVE-2025-42957ÔâÒ°ÍâʹÓÃ


9ÔÂ5ÈÕ£¬£¬£¬£¬Ñо¿Ö°Ô±ÖÒÑԳƣ¬£¬£¬£¬SAP S/4HANA±£´æÒ»¸öÑÏÖØµÄ´úÂë×¢ÈëÎó²îCVE-2025-42957£¬£¬£¬£¬¸ÃÎó²îÕýÔÚ±»Ò°Íâ¹¥»÷ʹÓ㬣¬£¬£¬ÒÔ¹¥ÆÆÌ»Â¶µÄЧÀÍÆ÷¡£¡£¡£¸ÃÎó²îÔ´ÓÚSAP S/4HANAÖÐRFC¹ûÕæ¹¦Ð§Ä£¿£¿£¿ £¿£¿£¿£¿éµÄABAP´úÂë×¢ÈëÎÊÌ⣬£¬£¬£¬ÔÊÐíµÍȨÏÞÉí·ÝÑéÖ¤Óû§×¢Èëí§Òâ´úÂë¡¢ÈÆ¹ýÊÚȨ²¢ÍêÈ«½ÓÊÜSAPϵͳ¡£¡£¡£¹©Ó¦ÉÌSAPÒÑÓÚ2025Äê8ÔÂ11ÈÕÐÞ¸´´ËÎó²î£¬£¬£¬£¬²¢½«ÆäÆÀ¶¨ÎªÑÏÖØÎó²î£¬£¬£¬£¬CVSSÆÀ·Ö¸ß´ï9.9·Ö¡£¡£¡£È»¶ø£¬£¬£¬£¬²¿·ÖϵͳÉÐδӦÓøÃÇå¾²¸üУ¬£¬£¬£¬ÕâЩδÐÞ²¹µÄϵͳÒѳÉΪºÚ¿Í¹¥»÷µÄÄ¿µÄ¡£¡£¡£¾ÝSecurityBridge±¨¸æ£¬£¬£¬£¬CVE-2025-42957ÏÖÔÚÈÔÔÚÒ°Íâ±»Æð¾¢Ê¹Ó㬣¬£¬£¬Ö»¹ÜʹÓÃˮƽÓÐÏÞ¡£¡£¡£SecurityBridgeÓÚ2025Äê6ÔÂ27ÈÕ·¢Ã÷¸ÃÎó²î²¢ÈÏÕæÈεØÏòSAP±¨¸æ£¬£¬£¬£¬»¹Ð­Öú¿ª·¢Á˲¹¶¡¡£¡£¡£µ«ÓÉÓÚÊÜÓ°Ïì×é¼þµÄ¿ª·ÅÐÔÒÔ¼°ABAP´úÂëµÄ¹ûÕæÐÔ£¬£¬£¬£¬ÊÖÒÕ¸ßÃ÷µÄÍþвÐÐΪÕßÄܹ»ÇáËÉÄæÏò¹¤³Ì²¹¶¡£¡£¡£¬£¬£¬£¬×ÔÐз¢Ã÷Îó²î¡£¡£¡£¸ÃÎó²îµÄDZÔÚЧ¹û°üÀ¨Êý¾Ý͵ÇÔ¡¢Êý¾ÝʹÓᢴúÂë×¢È롢ͨ¹ý½¨ÉèºóÃÅÕË»§ÌáÉýȨÏÞ¡¢Æ¾Ö¤ÍµÇÔÒÔ¼°Í¨¹ý¶ñÒâÈí¼þ¡¢ÀÕË÷Èí¼þµÈ·½·¨ÖÐÖ¹ÔËÓª¡£¡£¡£SecurityBridge»¹ÖÆ×÷ÁËÊÓÆµÑÝʾÔõÑùʹÓøÃÎó²îÔÚSAPЧÀÍÆ÷ÉÏÔËÐÐϵͳÏÂÁî¡£¡£¡£


https://www.bleepingcomputer.com/news/security/critical-sap-s-4hana-vulnerability-now-exploited-in-attacks/


4. WealthsimpleÅû¶Êý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬³¬300Íò¿Í»§ÊÜÓ°Ïì


9ÔÂ5ÈÕ£¬£¬£¬£¬¼ÓÄôóÔÚÏßͶ×ÊÖÎÀí¾ÞÍ·WealthsimpleÅû¶һÆðÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÈëÇÖµÚÈý·½±àдµÄÈí¼þ°ü£¬£¬£¬£¬Î´¾­ÊÚȨ»á¼ûÁ˲»µ½1%¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¸Ã¹«Ë¾½¨ÉèÓÚ2014Ä꣬£¬£¬£¬×ܲ¿Î»ÓÚ¶àÂ׶࣬£¬£¬£¬ÖÎÀí×ʲú³¬845ÒÚ¼ÓÔª£¬£¬£¬£¬Ð§Àͳ¬300Íò¼ÓÄôóÈË£¬£¬£¬£¬º­¸ÇͶ×Ê¡¢ÉúÒâ¡¢¼ÓÃÜÇ®±Ò¡¢±¨Ë°¡¢ÏûºÄºÍ´¢±¸µÈ½ðÈÚ²úÆ·£¬£¬£¬£¬ÆäAndroidÓ¦ÓÃÏÂÔØÁ¿³¬100Íò´Î£¬£¬£¬£¬iOSÓ¦Óûñ³¬12.6ÍòÌõÆÀ·Ö¡£¡£¡£¾Ý¹«Ë¾ÉùÃ÷¼°Ïò¿Í»§·¢Ë͵ÄÎ¥¹æÍ¨ÖªÏÔʾ£¬£¬£¬£¬Ð¹Â¶Êý¾Ý°üÀ¨ÁªÏµ·½·¨¡¢Õþ¸®Éí·ÝÖ¤ÐÅÏ¢¡¢²ÆÎñÏêÇ飨ÈçÕ˺š¢IPµØµã¡¢Éç»á°ü¹ÜºÅ¡¢³öÉúÈÕÆÚ£©£¬£¬£¬£¬µ«Î´Éæ¼°×ʽðÇÔÈ¡»òÃÜÂëй¶¡£¡£¡£¹«Ë¾Ç¿µ÷ËùÓпͻ§ÕË»§Çå¾²£¬£¬£¬£¬²¢ÒÑͨ¹ýµç×ÓÓʼþ֪ͨÊÜÓ°ÏìÓû§£¬£¬£¬£¬ÌṩÁ½ÄêÃâ·ÑÐÅÓÃ¼à¿Ø¡¢°µÍø¼à¿Ø¡¢Éí·Ý͵ÇÔ±£»£»£»£»£» £»£»¤ºÍ°ü¹ÜЧÀÍ£¬£¬£¬£¬Í¬Ê±½¨ÒéÆôÓÃË«ÒòËØÈÏÖ¤¡¢×èÖ¹ÃÜÂëÖØ¸´Ê¹Ó㬣¬£¬£¬²¢Ð¡ÐÄÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£Wealthsimple½²»°ÈËÌåÏÖ¡°¸ÃÊÂÎñÓëSalesforceÎ޹ء±¡£¡£¡£¹«Ë¾Î´Åû¶¹¥»÷ÕßÏêϸÈëÇÖÊֶΣ¬£¬£¬£¬½öÖ¸³öÎó²îÔ´ÓÚµÚÈý·½Èí¼þ°ü¡£¡£¡£


https://www.bleepingcomputer.com/news/security/financial-services-firm-wealthsimple-discloses-data-breach/


5. Nx¡°s1ngularity¡±¹©Ó¦Á´¹¥»÷£ºAI¹¤¾ßÀÄÓÃÖÂÊýǧÉñÃØÐ¹Â¶


9ÔÂ6ÈÕ£¬£¬£¬£¬½üÆÚÕë¶Ô¿ªÔ´¹¹½¨¹¤¾ßNxµÄ¡°s1ngularity¡±¹©Ó¦Á´¹¥»÷±¬·¢£¬£¬£¬£¬¹¥»÷Õßͨ¹ý¸Ä¶¯GitHub ActionsÊÂÇéÁ÷ÔÚNPMÐû²¼º¬¡°telemetry.js¡±¶ñÒâÈí¼þµÄNx°ü¡£¡£¡£¸Ã¶ñÒâÈí¼þÕë¶ÔLinux/macOSϵͳ£¬£¬£¬£¬Ê¹ÓÃClaude¡¢Q¡¢GeminiµÈAI¹¤¾ßµÄLLMÌáÐÑÇÔÈ¡GitHubÁîÅÆ¡¢npmÁîÅÆ¡¢SSHÃÜÔ¿µÈÃô¸ÐÐÅÏ¢£¬£¬£¬£¬²¢ÉÏ´«ÖÁ¡°s1ngularity-repository¡±¹«¹²´æ´¢¿â¡£¡£¡£WizʺóÆÀ¹ÀÏÔʾ£¬£¬£¬£¬ÊÂÎñ·ÖÈý½×¶Îµ¼ÖÂ2,180¸öÕË»§¡¢7,200¸ö´æ´¢¿âй¶£¬£¬£¬£¬³¬2,000¸öΨһÉñÃØ¼°20,000¸öÎļþ̻¶£¬£¬£¬£¬ÇÒ´ó×ÚÉñÃØÈÔÓÐÓ㬣¬£¬£¬Ó°ÏìÒ»Á¬À©´ó¡£¡£¡£¹¥»÷·ÖÈý½×¶Î£ºÊ׽׶Σ¨8ÔÂ26-27ÈÕ£©Ö±½ÓÓ°Ïì1,700Óû§£¬£¬£¬£¬Ð¹Â¶³¬2,000ÉñÃØ£»£»£»£»£» £»£»´Î½×¶Î£¨8ÔÂ28-29ÈÕ£©¹¥»÷ÕßʹÓÃй¶µÄGitHubÁîÅÆ½«Ë½ÓпâתΪ¹«¹²¿â²¢ÖØÃüÃû£¬£¬£¬£¬µ¼ÖÂ480¸öÕË»§£¨¶àΪ×éÖ¯£©¼°6,700¸ö´æ´¢¿âÊÜË𣻣»£»£»£» £»£»Ä©½×¶Î£¨8ÔÂ31ÈÕ£©¹¥»÷ÕßÕë¶ÔÌØ¶¨×éÖ¯£¬£¬£¬£¬Í¨¹ý±»¿ØÕË»§Ðû²¼500¸ö˽ÈË´æ´¢¿â¡£¡£¡£GitHubËäÔÚ°ËСʱÄÚɾ³ý¹¥»÷Õ߿⣬£¬£¬£¬µ«Êý¾ÝÒѱ»¸´ÖÆ¡£¡£¡£NxÍŶÓʺóÆÊÎöÖ¸³ö£¬£¬£¬£¬ÈëÇÖÔ´ÓÚÀ­È¡ÇëÇóÎÊÌâ×¢Èë¼°pull_request_targetµÄ²»Ç徲ʹÓ㬣¬£¬£¬Ê¹¹¥»÷ÕßÒÔÌáÉýȨÏÞÔËÐдúÂ룬£¬£¬£¬´¥·¢Ðû²¼¹ÜµÀ²¢Ð¹Â¶npmÁîÅÆ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ai-powered-malware-hit-2-180-github-accounts-in-s1ngularity-attack/


6. VirusTotal½ÒÆÆSVGÎļþÖеÄÍøÂç´¹ÂÚ¹¥»÷


9ÔÂ6ÈÕ£¬£¬£¬£¬VirusTotalͨ¹ýÆäAI Code Insightƽ̨ÐÂÔöSVGÖ§³Öºó£¬£¬£¬£¬·¢Ã÷Ò»ÆðʹÓÃSVGÎļþʵÑéµÄÍøÂç´¹ÂÚ¹¥»÷»î¶¯£¬£¬£¬£¬¸Ã»î¶¯Ã°³ä¸çÂ×±ÈÑÇ˾·¨ÏµÍ³ÃÅ»§ÍøÕ¾Èö²¥¶ñÒâÈí¼þ¡£¡£¡£SVG×÷Ϊ¿ÉËõ·ÅʸÁ¿Í¼ÐÎÃûÌ㬣¬£¬£¬¿Éͨ¹ýÔªËØÇ¶ÈëHTMLºÍJavaScript£¬£¬£¬£¬ÔÚ¼ÓÔØÊ±Ö´ÐдúÂ룬£¬£¬£¬ÕâÒ»ÌØÕ÷±»ÍþвÐÐΪÕßÀÄÓᣡ£¡£¹¥»÷ÖУ¬£¬£¬£¬SVGÎļþäÖȾÐéαÕþ¸®ÃÅ»§ÍøÕ¾£¬£¬£¬£¬ÏÔʾ±ÆÕæµÄÏÂÔØ½ø¶ÈÌõ¼°°¸Àý±àºÅ¡¢Çå¾²ÁîÅÆµÈÐÅÈÎÌáÐÑ£¬£¬£¬£¬ÓÕµ¼Óû§ÏÂÔØÃÜÂë±£»£»£»£»£» £»£»¤µÄZIPѹËõ°ü£¬£¬£¬£¬ÃÜÂëÖ±½ÓÏÔʾÔÚÒ³ÃæÉÏ¡£¡£¡£¾­ÆÊÎö£¬£¬£¬£¬ÌáÈ¡µÄZIPÎļþ°üÀ¨Î±×°³É¹Ù·½Ë¾·¨ÎļþµÄComodo Dragonä¯ÀÀÆ÷¿ÉÖ´ÐÐÎļþ¡¢¶ñÒâDLL¼°Á½¸ö¼ÓÃÜÎļþ¡£¡£¡£Óû§ÔËÐпÉÖ´ÐÐÎļþʱ£¬£¬£¬£¬¶ñÒâDLL»á±»²àÔØ£¬£¬£¬£¬½ø¶øÔÚϵͳÖÐ×°Öøü¶à¶ñÒâÈí¼þ¡£¡£¡£VirusTotalÖ¸³ö£¬£¬£¬£¬´ËÀ๥»÷ÒòSVGÖ§³ÖÖØ´ó½»»¥ÇÒ·À²¡¶¾Èí¼þ¼ì²âÂʵͣ¬£¬£¬£¬Ò×ÌӱܹŰåÇå¾²¼ì²â¡£¡£¡£´Ë´ÎÊÂÎñÖУ¬£¬£¬£¬AI Code Insightͨ¹ý»úеѧϰÆÊÎöÎļþÐÐΪ£¬£¬£¬£¬Ê¶±ð³öSVGÖÐÒþ²ØµÄJavaScriptÖ´ÐÐHTMLµÄÒì³£ÐÐΪ£¬£¬£¬£¬³ÉΪ½ÒÆÆ¹¥»÷µÄÒªº¦¡£¡£¡£¸Ã¹¤¾ßÌìÉúµÄ¿ÉÒÉÐÐΪժҪ×ÊÖúÑо¿Ö°Ô±¿ìËÙ¶¨Î»¶ñÒâ»î¶¯¡£¡£¡£½øÒ»³ÌÐò²é·¢Ã÷£¬£¬£¬£¬523¸öÏÈǰÉÏ´«µÄSVGÎļþͬÊô¸Ã»î¶¯£¬£¬£¬£¬µ«´Ëǰ¾ùδ±»Çå¾²Èí¼þ±ê¼ÇΪ¶ñÒâ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/virustotal-finds-hidden-malware-phishing-campaign-in-svg-files/