CrossBarking¹¥»÷£ºOperaä¯ÀÀÆ÷˽ÓÐAPIÔâÐ®ÖÆ

Ðû²¼Ê±¼ä 2024-11-01

1. CrossBarking¹¥»÷£ºOperaä¯ÀÀÆ÷˽ÓÐAPIÔâÐ®ÖÆ


10ÔÂ30ÈÕ£¬£¬£¬£¬£¬ £¬ £¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖеÄä¯ÀÀÆ÷¹¥»÷·½·¨£¬£¬£¬£¬£¬ £¬ £¬Í¨¹ýʹÓÃÏÖÒÑÐÞ¸´µÄÎó²î£¬£¬£¬£¬£¬ £¬ £¬½«×Ô½ç˵´úÂë×¢ÈëÊܺ¦ÕßµÄ Opera ä¯ÀÀÆ÷£¬£¬£¬£¬£¬ £¬ £¬´Ó¶ø¿ØÖÆÆä¡°Ë½ÓС±Ó¦ÓóÌÐò±à³Ì½Ó¿Ú (API)£¬£¬£¬£¬£¬ £¬ £¬ÕâЩ API ͨ³£½öΪ×îÊÜÐÅÈεÄÍøÕ¾±£´æ¡£¡£¡£¡£¡£¡£¡£ÕâЩ˽ÓÐ API ¿ÉΪ¿ª·¢Ö°Ô±Ìá¹©ÌØÊâȨÏÞ£¬£¬£¬£¬£¬ £¬ £¬µ«Ò²¿ÉÄܱ»ºÚ¿ÍʹÓ㬣¬£¬£¬£¬ £¬ £¬ÒÔ»ñµÃ¶Ôä¯ÀÀÆ÷µÄȫȨ¿ØÖÆ£¬£¬£¬£¬£¬ £¬ £¬°üÀ¨¸ü¸ÄÉèÖá¢Ð®ÖÆÕË»§¡¢½ûÓÃÇå¾²À©Õ¹µÈ¡£¡£¡£¡£¡£¡£¡£ÎªÁËչʾÕâÖÖ¹¥»÷·½·¨£¬£¬£¬£¬£¬ £¬ £¬Guardio Ñо¿Ö°Ô±¿ª·¢ÁËÒ»¸ö¶ñÒâµÄ Chrome À©Õ¹³ÌÐò£¬£¬£¬£¬£¬ £¬ £¬¸ÃÀ©Õ¹³ÌÐò±»Éè¼ÆÎªÔÚ¾ßÓÐ˽ÓÐ API »á¼ûȨÏÞµÄÍøÕ¾ÇéÐÎÖÐÔËÐжñÒâ´úÂë¡£¡£¡£¡£¡£¡£¡£ËûÃÇͨ¹ý¸ÃÀ©Õ¹³ÌÐò£¬£¬£¬£¬£¬ £¬ £¬½«¶ñÒâ´úÂë×¢Èëµ½ Opera ä¯ÀÀÆ÷ÖУ¬£¬£¬£¬£¬ £¬ £¬²¢Ê¹Óà settingsPrivate API ¸ü¸ÄÁËÊܺ¦ÕßµÄÓòÃûϵͳ (DNS) ÉèÖ㬣¬£¬£¬£¬ £¬ £¬´Ó¶øÖÜÈ«Éó²éºÍʹÓÃÆää¯ÀÀ»î¶¯¡£¡£¡£¡£¡£¡£¡£ÎªÏàʶ¾öÕâ¸öÎÊÌ⣬£¬£¬£¬£¬ £¬ £¬Opera ½ÓÄÉÁË Chrome ÖÐÒѾ­ÊµÏÖµÄÒ»ÖÖ¿ìËÙ½â¾ö¼Æ»®£º×èÖ¹ÈκÎÀ©Õ¹³ÌÐòÔÚ¾ßÓÐ˽ÓÐ API »á¼ûȨÏÞµÄÓòÉÏÔËÐо籾µÄÄÜÁ¦¡£¡£¡£¡£¡£¡£¡£


https://www.darkreading.com/vulnerabilities-threats/crossbarking-attack-secret-apis-expose-opera-browser-users


2. ÍøÂç´¹ÂÚµç×ÓÓʼþÃé׼ѧÉú´û¿î³ÖÓÐÈË


10ÔÂ30ÈÕ£¬£¬£¬£¬£¬ £¬ £¬½ü4300ÍòÃÀ¹úÈ˱³¸º×ÅÆ½¾ùÿÈË37,000ÃÀÔªµÄѧÉú´û¿îÕ®Îñ¡£¡£¡£¡£¡£¡£¡£°ÝµÇ×ÜÍ³ÔøÌá³öÒ»ÏîÖ¼ÔÚÃâÈ¥²¿·ÖÆò´ûÈËÕ®ÎñµÄÍýÏ룬£¬£¬£¬£¬ £¬ £¬µ«¸ÃÍýÏëÃæÁÙÖØÖØÕϰ­¡£¡£¡£¡£¡£¡£¡£ÔÚ´ËÅä¾°Ï£¬£¬£¬£¬£¬ £¬ £¬ÍøÂç·¸·¨·Ö×ӳûúÕë¶ÔѧÉú´û¿î³ÖÓÐÈËÌá³«ÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£¡£Harmony Email & CollaborationµÄÍøÂçÇå¾²²¿·Ö·¢Ã÷£¬£¬£¬£¬£¬ £¬ £¬ÕâÀ๥»÷ÔÚÒÑÍùÁ½ÖÜÄÚ¼¤Ôö£¬£¬£¬£¬£¬ £¬ £¬ÇÒ¹¥»÷ÕßʹÓÃÁËÌØÊâµÄÎı¾»ìÏýÊÖÒÕ£¬£¬£¬£¬£¬ £¬ £¬ÈçUnicode´Ó×óµ½ÓÒ±ê¼Ç (LRM) ºÍÈíÁ¬×Ö·û£¬£¬£¬£¬£¬ £¬ £¬ÒÔ¹æ±Ü×ÔÈ»ÓïÑÔ´¦Öóͷ£¼ì²âÆ÷µÄ¼ì²â¡£¡£¡£¡£¡£¡£¡£ÕâЩÓʼþÄÚÈÝ¿´ËƽôÆÈÇÒ¿ÉÐÅ£¬£¬£¬£¬£¬ £¬ £¬ÊµÔòÖ¼ÔÚÓÕÆ­Êܺ¦Õßй¶Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£´ËÀ๥»÷²»µ«ÍþвСÎÒ˽¼ÒÐÅÏ¢Çå¾²£¬£¬£¬£¬£¬ £¬ £¬»¹¿ÉÄÜ¶ÔÆóÒµ×é³ÉΣº¦¡£¡£¡£¡£¡£¡£¡£Ô±¹¤ÈôÔÚ¹«Ë¾×°±¸ÉÏ´¦Öóͷ£ÕâЩÓʼþ£¬£¬£¬£¬£¬ £¬ £¬¿ÉÄܵ¼Ö¶ñÒâÈí¼þÈëÇÖ¹«Ë¾ÏµÍ³£¬£¬£¬£¬£¬ £¬ £¬½ø¶øÒý·¢Êý¾Ýй¶»òÓªÒµÐÅÏ¢Íâй¡£¡£¡£¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬ £¬ £¬ÆóÒµÐè½ÓÄÉÇÐʵ¿ÉÐеIJ½·¥À´Ìá·À´ËÀ๥»÷£¬£¬£¬£¬£¬ £¬ £¬°üÀ¨Ìá¸ßÔ±¹¤Çå¾²Òâʶ¡¢Ê¹ÓÃÏȽøµÄµç×ÓÓʼþ¹ýÂ˺ÍÇå¾²¹¤¾ß¡¢ÊµÑé¶àÒòËØÉí·ÝÑéÖ¤ÒÔ¼°Öƶ©ÍêÉÆµÄÊÂÎñÏìÓ¦ÍýÏë¡£¡£¡£¡£¡£¡£¡£


https://blog.checkpoint.com/harmony-email/7500-phishing-emails-use-interesting-obfuscation-method-to-target-student-loan-holders/


3. LottieFiles npm°üÏÖ¶ñÒâ´úÂ룬£¬£¬£¬£¬ £¬ £¬Óû§Ðè½ôÆÈÉý¼¶


10ÔÂ31ÈÕ£¬£¬£¬£¬£¬ £¬ £¬LottieFiles ×òÈÕÐû²¼£¬£¬£¬£¬£¬ £¬ £¬Æä npm °üÖеÄÌØ¶¨°æ±¾£¬£¬£¬£¬£¬ £¬ £¬¼´ Lottie Web Player£¨¡°lottie-player¡±£©µÄ 2.0.5¡¢2.0.6 ºÍ 2.0.7 °æ±¾£¬£¬£¬£¬£¬ £¬ £¬±»·¢Ã÷Я´ø¶ñÒâ´úÂë¡£¡£¡£¡£¡£¡£¡£ÕâЩ°æ±¾»áÌáÐÑÓû§ÅþÁ¬¼ÓÃÜÇ®±ÒÇ®°ü£¬£¬£¬£¬£¬ £¬ £¬ÒâͼÇå¿ÕÇ®°üÖеÄ×ʲú¡£¡£¡£¡£¡£¡£¡£·¢Ã÷ÎÊÌâºó£¬£¬£¬£¬£¬ £¬ £¬LottieFiles ѸËÙÐû²¼ÁË´¿¾»µÄ 2.0.8 °æ±¾£¬£¬£¬£¬£¬ £¬ £¬½¨ÒéÓû§¾¡¿ìÉý¼¶ÒÔ×èֹΣº¦¡£¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬ £¬ £¬LottieFiles Ö¸³ö£¬£¬£¬£¬£¬ £¬ £¬Í¨¹ýµÚÈý·½ CDN ʹÓøÿâÇÒδÀο¿°æ±¾µÄÓû§»á×Ô¶¯ÊÕµ½ÊÜËð°æ±¾£¬£¬£¬£¬£¬ £¬ £¬µ«Ëæ×ÅÇå¾²°æ±¾µÄÐû²¼£¬£¬£¬£¬£¬ £¬ £¬ÕâЩÓû§½«×Ô¶¯ÊÕµ½ÐÞ¸´¡£¡£¡£¡£¡£¡£¡£¹ØÓÚÎÞ·¨Éý¼¶µÄÓû§£¬£¬£¬£¬£¬ £¬ £¬LottieFiles ½¨ÒéÏò×îÖÕÓû§×ª´ïΣº¦£¬£¬£¬£¬£¬ £¬ £¬²¢ÖÒÑÔËûÃÇÓйØÚ²Æ­ÐÔ¼ÓÃÜÇ®±ÒÇ®°üÅþÁ¬ÇëÇ󣬣¬£¬£¬£¬ £¬ £¬»ò¼ÌÐøÊ¹ÓÃδÊÜÓ°ÏìµÄ 2.0.4 °æ±¾¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ £¬ £¬LottieFiles Ðû²¼Í¨¸æ³Æ£¬£¬£¬£¬£¬ £¬ £¬´Ë´ÎÊÂÎñ½öÓ°ÏìÆä npm °ü£¬£¬£¬£¬£¬ £¬ £¬²»Ó°ÏìÆä SaaS ЧÀÍ£¬£¬£¬£¬£¬ £¬ £¬²¢È·ÈÏÆäËû¿ªÔ´¿â¡¢´úÂëºÍ´æ´¢¿â¾ùδÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£¡£¸Ãƽ̨ÒѰþ¶á¸Ä¶¯°æ±¾ÉÏ´«ÕßµÄ npm ÕÊ»§»á¼ûȨÏÞ£¬£¬£¬£¬£¬ £¬ £¬²¢×÷·ÏÏà¹ØÁîÅÆ£¬£¬£¬£¬£¬ £¬ £¬Í¬Ê±¼ÌÐø¶Ô´Ë´ÎÈëÇÖÊÂÎñ¾ÙÐÐÄÚ²¿ÊӲ졣¡£¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎú¸ÃÊÂÎñÊÇ·ñÓÐÊܺ¦ÕßÒÔ¼°ÏêϸËðʧ½ð¶î¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/lottiefiles-hit-in-npm-supply-chain-attack-targeting-users-crypto/


4. PTZOpticsÉãÏñ»úÏÖÁãÈÕÎó²î£¬£¬£¬£¬£¬ £¬ £¬ºÚ¿ÍÊÔͼʹÓÃÌᳫ¹¥»÷


10ÔÂ31ÈÕ£¬£¬£¬£¬£¬ £¬ £¬ºÚ¿ÍÕýÔÚʹÓÃPTZOpticsÔÆÌ¨±ä½¹ÊµÊ±Á÷ýÌåÉãÏñ»úÖеÄÁ½¸öз¢Ã÷µÄÁãÈÕÎó²îCVE-2024-8956ºÍCVE-2024-8957¡£¡£¡£¡£¡£¡£¡£ÕâЩÎó²îÓÚ2024Äê4Ô±»GreyNoiseµÄSift¹¤¾ßÔÚÆäÃÛ¹ÞÍøÂçÉϼì²âµ½¡£¡£¡£¡£¡£¡£¡£CVE-2024-8956Éæ¼°ÉãÏñ»ú¡°lighthttpd¡±ÍøÂçЧÀÍÆ÷ÖеÄÈõÉí·ÝÑéÖ¤ÎÊÌ⣬£¬£¬£¬£¬ £¬ £¬ÔÊÐíδ¾­ÊÚȨµÄÓû§»á¼ûCGI API£¬£¬£¬£¬£¬ £¬ £¬Ì»Â¶Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¶øCVE-2024-8957ÔòÊÇÓÉÓÚ¡°ntp_client¡±¶þ½øÖÆÎļþÖеÄÊäÈëÕûÀíȱ·¦£¬£¬£¬£¬£¬ £¬ £¬ÔÊÐíÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£¡£¡£ÕâÁ½¸öÎó²î¿ÉÄܵ¼ÖÂÉãÏñÍ·±»ÍêÈ«½ÓÊÜ¡¢Ñ¬È¾¶ñÒâÈí¼þ¡¢¹¥»÷Í³Ò»ÍøÂçµÄÆäËû×°±¸»òÖÐÖ¹ÊÓÆµÁ÷¡£¡£¡£¡£¡£¡£¡£Ö»¹Ü³õʼ¹¥»÷»î¶¯ÔÚ·¢Ã÷ºó²»¾ÃÏûÊÅ£¬£¬£¬£¬£¬ £¬ £¬µ«6Ô·ºÆðÁËʹÓÃwgetÏÂÔØshell¾ç±¾¾ÙÐз´Ïò»á¼ûµÄʵÑé¡£¡£¡£¡£¡£¡£¡£GreyNoiseÒÑÏòÊÜÓ°Ï칩ӦÉ̾ÙÐÐÈÏÕæÈεÄÅû¶£¬£¬£¬£¬£¬ £¬ £¬PTZOpticsµÈ³§ÉÌÒÑÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬ £¬ £¬µ«²¿·Ö¾ÉÐͺźÍз¢Ã÷µÄÊÜÓ°ÏìÐͺÅÉÐδÊÕµ½²¹¶¡¡£¡£¡£¡£¡£¡£¡£GreyNoiseÒÔΪ¿ÉÄÜÓиüÆÕ±éµÄ×°±¸Êܵ½Ó°Ï죬£¬£¬£¬£¬ £¬ £¬½¨ÒéÓû§×Éѯװ±¸¹©Ó¦ÉÌÏàʶ×îй̼þ¸üÐÂÇéÐΡ£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-target-critical-zero-day-vulnerability-in-ptz-cameras/


5. ÒÉËÆÎÚ¿ËÀ¼ÍøÂç¹¥»÷µ¼ÖÂÌØÎ¬¶ûÍ£³µÏµÍ³Ì±»¾


10ÔÂ31ÈÕ£¬£¬£¬£¬£¬ £¬ £¬¶íÂÞ˹Î÷±±²¿¶¼»áÌØÎ¬¶ûµÄסÃñÒòÕþ¸®Ëù³ÆµÄÊý×ÖÍ£³µÖ§¸¶ÏµÍ³¡°ÊÖÒÕ¹ÊÕÏ¡±¶øµÃÒÔÃâ·ÑÍ£³µ½üÁ½Ìì¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬ £¬ £¬Ò»¸öÃûΪ¡°ÎÚ¿ËÀ¼ÍøÂçͬÃË¡±µÄºÚ¿Í×éÖ¯Éù³ÆÕâ¿ÉÄÜÊÇÕë¶Ô¸ÃÊÐÖÎÀíÍøÂçµÄÍøÂç¹¥»÷ËùÖ£¬£¬£¬£¬£¬ £¬ £¬²¢Éù³Æ´Ý»ÙÁËÊýʮ̨ÐéÄâ»ú¡¢±¸·Ý´æ´¢¡¢ÍøÕ¾¡¢µç×ÓÓʼþºÍÊý°Ù¸öÊÂÇéÕ¾¡£¡£¡£¡£¡£¡£¡£ÌØÎ¬¶ûÊÐÕþ¸®×î³õδ¶Ô´Ë½ÒÏþ̸ÂÛ£¬£¬£¬£¬£¬ £¬ £¬µ«Ëæºó½ÒÏþÉùÃ÷³ÆÍøÕ¾ºÍÔÚÏßÍ£³µÖ§¸¶Æ½Ì¨ÕýÔÚ¾ÙÐÐÊÖÒÕάÐÞ¡£¡£¡£¡£¡£¡£¡£ÍâµØ×¡ÃñÔÚʵÑ鸶¿îʱÓöµ½¹ýʧÐÂÎÅ»òÓ¦ÓóÌÐò¼ÓÔØÊ§°Ü¡£¡£¡£¡£¡£¡£¡£ÊÐÕþ¸®¹ÙÔ±ØÊºóÐû²¼Í£³µ¸¶·ÑЧÀÍÒѻָ´£¬£¬£¬£¬£¬ £¬ £¬µ«Î´È·ÈÏÊÇ·ñ±¬·¢ÁËÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£¡£Õâ²¢·ÇÇ×ÎÚ¿ËÀ¼ºÚ¿ÍÊ×´ÎÉù³Æ¶Ô¶íÂÞ˹ЧÀÍÌᳫ¹¥»÷£¬£¬£¬£¬£¬ £¬ £¬´ËǰҲÓÐÀàËÆÊÂÎñ±»¹é×ïΪ¡°ÊÖÒÕ¹ÊÕÏ¡±¡£¡£¡£¡£¡£¡£¡£ÎÚ¿ËÀ¼ÍøÂçͬÃËÊÇÒ»¸öÇ×ÎÚ¿ËÀ¼ÍøÂç»î¸ÐÈËÊ¿ÕûÌ壬£¬£¬£¬£¬ £¬ £¬×Ô¶íÂÞ˹ÈëÇÖÎÚ¿ËÀ¼ÒÔÀ´Æð¾¢¼ÓÈë·´¶í¶·Õù£¬£¬£¬£¬£¬ £¬ £¬²¢ÔøÉù³ÆÈëÇÖ¶íÂÞ˹¹ú¼ÒÐÅÓÿ¨Ö§¸¶ÏµÍ³µÈÐж¯¡£¡£¡£¡£¡£¡£¡£


https://therecord.media/ukraine-cyberattack-russia-parking-tver


6. Phish n' ShipsÍøÂç´¹ÂڻѬȾǧ¼ÒÍøµê


10ÔÂ31ÈÕ£¬£¬£¬£¬£¬ £¬ £¬Ò»ÏîÃûΪ¡°Phish n' Ships¡±µÄÍøÂç´¹Âڻ×Ô2019ÄêÆð£¬£¬£¬£¬£¬ £¬ £¬ÒÑѬȾÁè¼Ýһǧ¼ÒÕýµ±ÔÚÏßÊÐËÁ£¬£¬£¬£¬£¬ £¬ £¬Í¨¹ýÍÆ¹ãÐéαÉÌÆ·ÁбíڲƭÊýÊ®ÍòÏûºÄÕߣ¬£¬£¬£¬£¬ £¬ £¬Ôì³ÉÊýÍòÍòÃÀÔªËðʧ¡£¡£¡£¡£¡£¡£¡£¸Ã»î¶¯Ê¹ÓÃÎó²î¡¢¹ýʧÉèÖûòÊÜËðÖÎÀíԱƾ֤ÈëÇÖÍøÕ¾£¬£¬£¬£¬£¬ £¬ £¬ÉÏ´«¶ñÒâ¾ç±¾ºÍÐéα²úÆ·Áбí£¬£¬£¬£¬£¬ £¬ £¬Ê¹ÓÃSEOÓÅ»¯ÎüÒýÊܺ¦Õß¡£¡£¡£¡£¡£¡£¡£Êܺ¦Õßµã»÷Á´½Óºó±»Öض¨ÏòÖÁ¼ÙÊÐËÁ£¬£¬£¬£¬£¬ £¬ £¬ÂÄÀúÐéα½áÕËÁ÷³Ì²¢ÊäÈëСÎÒ˽¼ÒÐÅÏ¢ºÍÐÅÓÿ¨ÏêÇ飬£¬£¬£¬£¬ £¬ £¬µ«¹ºÖõÄÎïÆ·´ÓδËÍ´ï¡£¡£¡£¡£¡£¡£¡£SatoriÍþвÇ鱨ÍŶӷ¢Ã÷ËùÓмÙÊÐËÁÅþÁ¬ÖÁÒ»¸öÓÉ14¸öIPµØµã×é³ÉµÄÍøÂ磬£¬£¬£¬£¬ £¬ £¬²¢ÀÄÓöà¼ÒÖ§¸¶ÌṩÉÌÌ×ÏÖ¡£¡£¡£¡£¡£¡£¡£HUMAN¼°ÆäÏàÖúͬ°éÒÑЭµ÷»ØÓ¦£¬£¬£¬£¬£¬ £¬ £¬Í¨ÖªÊÜÓ°Ïì×éÖ¯²¢ÏòGoogle±¨¸æÐéαÁбí£¬£¬£¬£¬£¬ £¬ £¬´ó´ó¶¼¶ñÒâËÑË÷Ч¹ûÒѱ»ÕûÀí£¬£¬£¬£¬£¬ £¬ £¬µ«ÍþвÐÐΪÕß¿ÉÄÜ»áʵÑ齨ÉèеÄÚ²Æ­ÍøÂç¡£¡£¡£¡£¡£¡£¡£½¨ÒéÏûºÄÕß×¢ÖØ²»Ñ°³£Öض¨Ïò£¬£¬£¬£¬£¬ £¬ £¬È·ÈÏÊÐËÁÍøÖ·£¬£¬£¬£¬£¬ £¬ £¬²¢±¨¸æÚ²Æ­ÐÔÊÕ·Ñ¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/over-a-thousand-online-shops-hacked-to-show-fake-product-listings/