WazuhЧÀÍÆ÷³ÉΪMirai½©Ê¬ÍøÂçµÄ¹¥»÷Ä¿µÄ

Ðû²¼Ê±¼ä 2025-06-12

1. WazuhЧÀÍÆ÷³ÉΪMirai½©Ê¬ÍøÂçµÄ¹¥»÷Ä¿µÄ


6ÔÂ10ÈÕ£¬£¬£¬ £¬£¬£¬AkamaiÇå¾²Ç鱨ºÍÏìÓ¦ÍŶӣ¨SIRT£©¿ËÈÕ·¢Ã÷£¬£¬£¬ £¬£¬£¬Mirai½©Ê¬ÍøÂç±äÖÖÕýÔÚʹÓÃWazuhЧÀÍÆ÷ÖеÄÒ»¸öÒªº¦Ô¶³Ì´úÂëÖ´ÐУ¨RCE£©Îó²î£¨CVE-2025-24016£©¾ÙÐй¥»÷»î¶¯¡£¡£¡£¡£¸ÃÎó²î×î³õÓÚ½ñÄê2Ô·ݱ»Åû¶£¬£¬£¬ £¬£¬£¬µ«ÖÁ½ñÉÐδ±»Ìí¼Óµ½ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©µÄÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼ÖС£¡£¡£¡£WazuhÊÇÒ»¸öÓÃÓÚÍþвԤ·À¡¢¼ì²âºÍÏìÓ¦µÄÃâ·Ñ¿ªÔ´Æ½Ì¨£¬£¬£¬ £¬£¬£¬¶ø´Ë´ÎÊÜÓ°ÏìµÄ°æ±¾ÎªWazuh 4.4.0ÖÁ4.9.0£¬£¬£¬ £¬£¬£¬²¹¶¡ÒÑÔÚ4.9.1°æ±¾ÖÐÐû²¼¡£¡£¡£¡£¸ÃÎó²îÔÊÐí¾ßÓÐAPI»á¼ûȨÏÞµÄÔ¶³Ì¹¥»÷Õßͨ¹ýÉÏ´«¶ñÒâJSONÎļþÀ´Ö´ÐÐí§Òâ´úÂë¡£¡£¡£¡£ÏêϸÀ´Ëµ£¬£¬£¬ £¬£¬£¬ÔÚWazuh APIÖУ¬£¬£¬ £¬£¬£¬DistributedAPIµÄ²ÎÊý»á±»ÐòÁл¯ÎªJSON£¬£¬£¬ £¬£¬£¬²¢Ê¹ÓÃÌØ¶¨ÎļþÖеÄas_Wazuh_object¾ÙÐз´ÐòÁл¯¡£¡£¡£¡£¹¥»÷Õß¿ÉÒÔͨ¹ýÔÚDAPIÇëÇóÖÐ×¢Èëδ¾­´¦Öóͷ£µÄ×ÖµäÀ´Ê¹ÓôËÎó²î£¬£¬£¬ £¬£¬£¬½ø¶øµ¼ÖÂí§ÒâPython´úÂëµÄÖ´ÐУ¬£¬£¬ £¬£¬£¬»òÕ߸üͨË×µØËµ£¬£¬£¬ £¬£¬£¬ÓÕÆ­ÏµÍ³ÔËÐжñÒâPython´úÂë¡£¡£¡£¡£Ñо¿Ö°Ô±Ç¿µ÷£¬£¬£¬ £¬£¬£¬¸ÃÎó²î½öÓ°ÏìÔËÐйýʱ°æ±¾µÄ»î¶¯WazuhЧÀÍÆ÷£¬£¬£¬ £¬£¬£¬Òò´Ë±Þ²ßÓû§¾¡¿ì¸üе½Wazuh 4.9.1»ò¸ü¸ß°æ±¾£¬£¬£¬ £¬£¬£¬ÒÔÌá·ÀDZÔÚµÄÇå¾²Íþв¡£¡£¡£¡£


https://cybernews.com/security/wazuh-servers-targeted-by-mirai-botnets/


2. FacebookÉÏ·¢Ã÷4000¶à¸öÐéÎ±ÍøÕ¾Ðû²¼ÐéαÉúÒâ


6ÔÂ10ÈÕ£¬£¬£¬ £¬£¬£¬Silent PushÍþвÆÊÎöʦ¿ËÈÕ·¢Ã÷ÁËÒ»¸öÃûΪ¡°GhostVendors¡±µÄÖØ´óÐéαÊг¡ÍøÂ磬£¬£¬ £¬£¬£¬Éæ¼°Áè¼Ý4000¸öÕ©Æ­ÍøÕ¾£¬£¬£¬ £¬£¬£¬ÕâÐ©ÍøÕ¾Ã°³äÁ˰üÀ¨ÑÇÂíÑ·¡¢Argos¡¢Costco¡¢Nordstrom¡¢ÀÍÁ¦Ê¿¡¢ÃܶûÎÖ»ù¹¤¾ß£¨Milwaukee Tools£¬£¬£¬ £¬£¬£¬ÔÚÕ©Æ­¹ã¸æÖб»¸Ä¶¯Îª¡°Millaeke¡±£©ÒÔ¼°²ª¿Ï£¨Birkenstock£©µÈÔÚÄÚµÄÊýÊ®¸ö×ÅÃûÆ·ÅÆ¡£¡£¡£¡£Õ©Æ­Õßͨ¹ýFacebook MarketplaceͶ·Å´ó×Ú¹ã¸æ¾ÙÐÐÍÆ¹ã£¬£¬£¬ £¬£¬£¬Ê¹Óü«µÍµÄ¼ÛÇ®ÒýÓÕÏûºÄÕß¡£¡£¡£¡£ËûÃÇÇÉÃîµØÊ¹ÓÃMetaµÄ¹ã¸æÊý¾Ý±£´æ¹æÔò£¬£¬£¬ £¬£¬£¬Ôڻ¿¢ÊºóѸËÙɾ³ýËùÓкۼ££¬£¬£¬ £¬£¬£¬Ê¹µÃ·ÀÓùÕßÄÑÒÔ×·×Ù¡£¡£¡£¡£Õ©Æ­Õß²»µ«¿Ë¡×ÅÃûÆ·ÅÆÍøÕ¾Ä£°å£¬£¬£¬ £¬£¬£¬»¹ÖÆ×÷ÁËÊýÊ®¸öÏàËÆµÄð³ä¸±±¾£¬£¬£¬ £¬£¬£¬Í¨¹ý¡°Çå²Ö¡±»ò¡°½ÚÈÕ´ÙÏú¡±µÈÒªº¦´ÊÒÔ¼°ÁîÈËÄÑÒÔÖÃÐŵÄÓÅ»ÝÉúÒâÀ´ÎüÒý»á¼ûÕß¡£¡£¡£¡£Ò»µ©ÏûºÄÕßÖмƣ¬£¬£¬ £¬£¬£¬Õ©Æ­Õß±ã¿ÉÄܲ»½»¸¶¶©¹ºµÄ²úÆ·»òÇÔÈ¡Æä¸¶¿îÏêϸÐÅÏ¢£¬£¬£¬ £¬£¬£¬ÊµÑé½ðÈÚڲƭ¡£¡£¡£¡£ÓÉÓÚMetaµÄ¹ã¸æÊý¾Ý±£´æ¹æÔòÏà¶ÔËÉи£¬£¬£¬ £¬£¬£¬·ÀÓùÕßÔÚ×·×ÙÕâЩ¿ìËÙÆô¶¯ºÍ×èÖ¹µÄÕ©Æ­»î¶¯Ê±ÃæÁÙÖØ´óÌôÕ½¡£¡£¡£¡£Silent PushÖÒÑԳƣ¬£¬£¬ £¬£¬£¬ºÚ¿ÍÕýÔÚʹÓÃÕâÐ©Ú²Æ­ÍøÕ¾¾ÙÐÐÖÖÖÖÀàÐ͵ĽðÈÚڲƭ£¬£¬£¬ £¬£¬£¬ÇÒÏÖÔÚÏÕЩ²»¿ÉÄÜÖÜȫ׷×Ù¸ÃÍøÂçÉϵĶñÒâ¹ã¸æ¡£¡£¡£¡£Òò´Ë£¬£¬£¬ £¬£¬£¬ÏûºÄÕßÐèÌá¸ßСÐÄ£¬£¬£¬ £¬£¬£¬×èÖ¹ÊÜÆ­ÊÜÆ­£¬£¬£¬ £¬£¬£¬Í¬Ê±£¬£¬£¬ £¬£¬£¬Ïà¹ØÆ½Ì¨Ò²Ó¦ÔöÇ¿î¿Ïµ£¬£¬£¬ £¬£¬£¬ÍêÉÆ¹ã¸æÊý¾Ý±£´æ¹æÔò£¬£¬£¬ £¬£¬£¬ÒÔÓÐÓù¥»÷´ËÀàÕ©Æ­»î¶¯¡£¡£¡£¡£


https://cybernews.com/security/thousands-domains-pushing-phony-deals-on-facebook/


3. ·Ñ³ÇMastery SchoolsÔâÀÕË÷¹¥»÷£¬£¬£¬ £¬£¬£¬³¬3.7ÍòÈËÊý¾Ýй¶


6ÔÂ10ÈÕ£¬£¬£¬ £¬£¬£¬·Ñ³ÇÌØÐíÑ§Ð£ÍøÂçMastery SchoolsÓÚ2024Äê9ÔÂÔâÓöÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬ £¬£¬£¬µ¼ÖÂ37,031ÈËСÎÒ˽¼ÒÊý¾Ýй¶¡£¡£¡£¡£´Ë´ÎÊÂÎñÉæ¼°¸ÃѧУÔڷѳǼ°¿¨Ä·µÇÔËÓªµÄ23ËùУ԰£¬£¬£¬ £¬£¬£¬Ô¼14,000ÃûѧÉúÊܵ½Ó°Ïì¡£¡£¡£¡£Ð¹Â¶µÄÃô¸ÐÐÅÏ¢ÆÕ±é£¬£¬£¬ £¬£¬£¬°üÀ¨Éç»á°ü¹ÜºÅ¡¢Ò½ÁƼͼ¡¢Ñ§Éúµµ°¸¡¢ÒøÐм°²ÆÎñÐÅÏ¢¡¢ÉúÎïʶ±ðÊý¾ÝµÈ¡£¡£¡£¡£¹¥»÷µ¼ÖÂѧУ½¹µãÓªÒµÖÐÖ¹£¬£¬£¬ £¬£¬£¬ÀÕË÷×éÖ¯DragonForceÐû³Æ¶ÔÊÂÎñÈÏÕæ£¬£¬£¬ £¬£¬£¬²¢Éù³ÆÇÔÈ¡ÁË171GBÊý¾Ý£¬£¬£¬ £¬£¬£¬µ«Mastery Schoolsδ֤ʵ¸Ã˵·¨£¬£¬£¬ £¬£¬£¬Ò²Î´Í¸Â¶ÈëÇÖ·½·¨»òÊÇ·ñÖ§¸¶Êê½ð¡£¡£¡£¡£Ð£·½ÌåÏÖ£¬£¬£¬ £¬£¬£¬ÒÑÈ·¶¨Î´¾­ÊÚȨÕßÏÂÔØÁ˲¿·ÖÊý¾Ý£¬£¬£¬ £¬£¬£¬µ«ÏÖÔÚÉÐÎÞÖ¤¾ÝÅú×¢Êý¾Ý±»ÓÃÓÚÉí·ÝµÁÓûòڲƭ¡£¡£¡£¡£ÎªÐ­ÖúÊÜÓ°ÏìÖ°Ô±£¬£¬£¬ £¬£¬£¬Mastery Schoolsͨ¹ýExperianµÄIdentityWorksЧÀÍÌṩÃâ·ÑÉí·Ý±£»£»£»£»£»¤£¬£¬£¬ £¬£¬£¬²¢ÔöÇ¿Á˶àÒòËØÈÏÖ¤Ó¦Óá¢ÌáÉýÁËÖÕ¶Ë¼à¿ØÄÜÁ¦£¬£¬£¬ £¬£¬£¬Í¬Ê±ÒýÈëÍâ²¿ÍøÂçÇ徲ר¼ÒÍŶӲ¢ÁªºÏÁª°îÖ´·¨²¿·ÖÉîÈëÊӲ졣¡£¡£¡£ComparitechÊý¾ÝÏÔʾ£¬£¬£¬ £¬£¬£¬2024ÄêÃÀ¹úѧУ¼°´óѧ¹²ÔâÓö79ÆðÀÕË÷¹¥»÷£¬£¬£¬ £¬£¬£¬²¨¼°½ü290ÍòÌõ¼Í¼£¬£¬£¬ £¬£¬£¬´ËÀ๥»÷³£µ¼ÖÂÖØ´óÔËÓªÖÐÖ¹£¬£¬£¬ £¬£¬£¬È翼ÊÔÑÓÆÚ¡¢Ð½×Êϵͳ̱»¾µÈ£¬£¬£¬ £¬£¬£¬¶Ô½ÌÓý»ú½á¹¹³ÉÑÏÖØÓ°Ïì¡£¡£¡£¡£


https://www.infosecurity-magazine.com/news/mastery-schools-data-breach/


4. ¡°Çå¾²Ðж¯¡±¹ú¼ÊÖ´·¨£º¹¥»÷¶à¹úÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ


6ÔÂ11ÈÕ£¬£¬£¬ £¬£¬£¬´úºÅΪ¡°Çå¾²Ðж¯¡±µÄ¹ú¼ÊÖ´·¨Ðж¯ÓÚ2025Äê1ÔÂÖÁ4Ô¿ªÕ¹£¬£¬£¬ £¬£¬£¬Óɹú¼ÊÐ̾¯×é֯ǣͷ£¬£¬£¬ £¬£¬£¬Õë¶Ô26¸ö¹ú¼ÒµÄÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ»ù´¡ÉèÊ©Õö¿ª´ó¹æÄ£¹¥»÷¡£¡£¡£¡£Ðж¯Öص㹥»÷ͨ¹ýÆÕ±éѬȾÇÔÈ¡²ÆÎñºÍСÎÒ˽¼ÒÊý¾ÝµÄÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÍŻ¡£¡£¡£ÐÅÏ¢ÇÔÈ¡ÕßÇÔÈ¡ÕË»§Æ¾Ö¤¡¢ä¯ÀÀÆ÷CookieºÍ¼ÓÃÜÇ®±ÒÇ®°üÏêÇéµÈÊý¾Ý£¬£¬£¬ £¬£¬£¬»ã±à³É¡°ÈÕÖ¾¡±ÔÚÍøÂç·¸·¨Êг¡³öÊÛ»òÓÃÓÚ¶¨Ïò¹¥»÷¸ß¼ÛÖµÊܺ¦Õß¡£¡£¡£¡£´Ë´ÎÐж¯Ð§¹ûÏÔÖø£º¹Ø±Õ³¬20000¸öÓëÐÅÏ¢ÇÔÈ¡ÕßÏà¹ØµÄ¶ñÒâIP/ÓòÃû£¬£¬£¬ £¬£¬£¬²é»ñ41̨֧³ÖÐÅÏ¢ÇÔÈ¡»î¶¯µÄЧÀÍÆ÷£¬£¬£¬ £¬£¬£¬¾Ð²¶32ÃûÏÓÒÉÈË£¬£¬£¬ £¬£¬£¬Ã»ÊÕ100GBÊý¾Ý£¬£¬£¬ £¬£¬£¬²¢Í¨Öª216000ÃûÊܺ¦Õß¡£¡£¡£¡£Õþ¸®»¹·¢Ã÷Ïã¸ÛÓÐ117̨ЧÀÍÆ÷×é³ÉµÄ´óÐͼ¯Èº£¬£¬£¬ £¬£¬£¬±»ÓÃ×÷ÍøÂç´¹ÂÚ¡¢ÍøÂçڲƭºÍÉ罻ýÌåÕ©Æ­Ðж¯µÄÏÂÁîºÍ¿ØÖÆ£¨C2£©»ù´¡ÉèÊ©¡£¡£¡£¡£Ô½ÄϾ¯·½ÔÚ´Ë´ÎÐж¯ÖÐÌåÏÖÍ»³ö£¬£¬£¬ £¬£¬£¬¾Ð²¶18ÃûÏÓÒÉÈË£¬£¬£¬ £¬£¬£¬ÆäÖаüÀ¨Ò»ÃûרÃųöÊÛ¹«Ë¾ÕË»§µÄÍøÂç·¸·¨¼¯ÍÅÍ·Ä¿¡£¡£¡£¡£Ðж¯»¹»ñµÃ¿¨°Í˹»ù¡¢Group-IBºÍÇ÷ÊÆ¿Æ¼¼µÈ˽ÈËÍøÂçÇå¾²ÏàÖúͬ°éµÄЭÖú¡£¡£¡£¡£Group-IBÖ¸³ö£¬£¬£¬ £¬£¬£¬Ðж¯ÒÑÓ°ÏìÓëLumma¡¢RiseProºÍMETA StealerÏà¹ØµÄ»ù´¡ÉèÊ©£¬£¬£¬ £¬£¬£¬Ñо¿Ö°Ô±ÏòÕþ¸®ÌṩҪº¦Ê¹ÃüÇ鱨£¬£¬£¬ £¬£¬£¬²¢×·×ÙÁËÔËÓªÉÌÓÃÓÚÐû´«¶ñÒâÈí¼þºÍ³öÊÛ±»µÁÊý¾ÝµÄTelegramºÍ°µÍøÕË»§¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/operation-secure-disrupts-global-infostealer-malware-operations/


5. ÒÁÀû°ü¹Ü¼¯ÍÅÔâÍøÂç¹¥»÷µ¼ÖÂÓªÒµÖÐÖ¹


6ÔÂ11ÈÕ£¬£¬£¬ £¬£¬£¬ÒÁÀû°ü¹Ü¹«Ë¾£¨Erie Insurance£©ºÍÒÁÀûÅâ³¥¹«Ë¾¿ËÈÕ͸¶£¬£¬£¬ £¬£¬£¬ÖÜÄ©±¬·¢µÄÍøÂç¹¥»÷Êǵ¼ÖÂÆäÍøÕ¾ÓªÒµÖÐÖ¹Ç徲̨̱»¾µÄÔµ¹ÊÔ­ÓÉ¡£¡£¡£¡£ÒÁÀûÅâ³¥¹«Ë¾×÷ΪÒÁÀû°ü¹Ü¼¯ÍŵÄÖÎÀí¹«Ë¾£¬£¬£¬ £¬£¬£¬¸Ã¼¯ÍÅÊÇÒ»¼ÒÓµÓÐÁè¼Ý600Íò·ÝÓÐÓñ£µ¥µÄ¹¤ÒµºÍÒâÍâÏÕ°ü¹Ü¹«Ë¾£¬£¬£¬ £¬£¬£¬Í¨¹ý×ÔÁ¦ÊðÀíÈËÌṩ¶àÖÖ°ü¹ÜЧÀÍ¡£¡£¡£¡£×Ô6ÔÂ7ÈÕÐÇÆÚÁùÆð£¬£¬£¬ £¬£¬£¬Erie Insurance±ãÔâÊÜ´óÃæ»ýÍ£µçºÍÓªÒµÖÐÖ¹£¬£¬£¬ £¬£¬£¬¿Í»§ÎÞ·¨µÇ¼¿Í»§ÃÅ»§£¬£¬£¬ £¬£¬£¬ÔÚÌá³öË÷Åâ»òÎüÊÕÎļþʱÓöµ½ÄÑÌâ¡£¡£¡£¡£ÒÁÀûÅâ³¥¼¯ÍÅÒÑÏòÃÀ¹ú֤ȯÉúÒâίԱ»áÌá½»8-K±í¸ñ£¬£¬£¬ £¬£¬£¬³ÆÔÚ6ÔÂ7ÈÕ¼ì²âµ½¡°Òì³£ÍøÂç»î¶¯¡±¡£¡£¡£¡£ÒÁÀû°ü¹ÜÍøÕ¾Ò²Ðû²¼Í¨Öª£¬£¬£¬ £¬£¬£¬³ÆÐÅÏ¢Çå¾²ÍŶÓÔÚ6ÔÂ7ÈÕ·¢Ã÷Òì³£ÍøÂç»î¶¯£¬£¬£¬ £¬£¬£¬²¢Á¬Ã¦½ÓÄÉÐж¯Ó¦¶Ô£¬£¬£¬ £¬£¬£¬ÒÔ±£»£»£»£»£»¤ÏµÍ³ºÍÊý¾Ý¡£¡£¡£¡£¹«Ë¾ÒÑÆô¶¯ÊÂÎñÏìӦЭÒ飬£¬£¬ £¬£¬£¬²¢½ÓÄɱ£»£»£»£»£»¤²½·¥È·±£ÏµÍ³Çå¾²¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬ £¬£¬£¬ÒÁÀû°ü¹ÜÕýÔÚÓëÖ´·¨²¿·ÖÏàÖú£¬£¬£¬ £¬£¬£¬²¢ÔÚÍøÂçÇ徲ר¼ÒµÄЭÖúϾÙÐÐÖÜÈ«µÄȡ֤ÆÊÎö£¬£¬£¬ £¬£¬£¬ÒÔÖÜÈ«ÏàʶÊÂÎñ¡£¡£¡£¡£¹«Ë¾ÖÒÑԳƣ¬£¬£¬ £¬£¬£¬ÔÚÍ£µçʱ´ú²»»áÖµç»ò·¢Ë͵ç×ÓÓʼþ¸ø¿Í»§ÒªÇ󸶿£¬£¬ £¬£¬£¬²¢½¨Òé¿Í»§²»Òªµã»÷δ֪ȪԴµÄÁ´½Ó»òÌṩСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¹ØÓÚÐèÒªÌá³öË÷ÅâµÄͶ±£ÈË£¬£¬£¬ £¬£¬£¬¹«Ë¾ÌṩÁËÁªÏµÍâµØÊðÀíÈË»òERIEÊ×´ÎËðʧ֪ͨÍŶӵĵ绰£¬£¬£¬ £¬£¬£¬ÒÔ¼°¿Í»§Ð§À͵绰¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬ £¬£¬£¬ÉÐδȷ¶¨´Ë´Î¹¥»÷ÊÇ·ñΪÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬ £¬£¬£¬Ò²Î´Í¸Â¶Êý¾ÝÊÇ·ñÔÚ¹¥»÷Àú³ÌÖб»µÁ¡£¡£¡£¡£ÒÁÀûÌåÏÖ£¬£¬£¬ £¬£¬£¬¸ÃÊÂÎñµÄËùÓйæÄ£¡¢ÐÔ×ÓºÍÓ°ÏìÈÔÓдý½øÒ»²½È·¶¨¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/erie-insurance-confirms-cyberattack-behind-business-disruptions/


6. Roundcube RCEÎó²î²¹¶¡ºóÔâʹÓ㬣¬£¬ £¬£¬£¬³¬8Íǫ̀ЧÀÍÆ÷ÊÜÓ°Ïì


6ÔÂ11ÈÕ£¬£¬£¬ £¬£¬£¬RoundcubeÕâһʢÐÐWebÓʼþƽ̨¿ËÈÕÆØ³öÑÏÖØÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©Îó²î£¨±àºÅCVE-2025-49113£©£¬£¬£¬ £¬£¬£¬¸ÃÎó²îÔÚ²¹¶¡Ðû²¼½ö¼¸Ììºó¾Í±»ÍþвÐÐΪÕßʹÓ㬣¬£¬ £¬£¬£¬¹¥»÷ÁËÁè¼Ý80,000Ì¨ÃæÏò»¥ÁªÍøµÄЧÀÍÆ÷¡£¡£¡£¡£¸ÃÎó²îCVSSÆÀ·Ö¸ß´ï9.9£¬£¬£¬ £¬£¬£¬´ËǰÒÑDZÔÚÊ®ÓàÄ꣬£¬£¬ £¬£¬£¬¹¥»÷Õ߿ɽè´Ë¿ØÖÆÊÜÓ°Ïìϵͳ²¢ÔËÐжñÒâ´úÂ룬£¬£¬ £¬£¬£¬¶ÔÓû§ºÍ×éÖ¯×é³ÉÖØ´óΣº¦¡£¡£¡£¡£FearsOffÊ×´´È˼æÊ×ϯִÐйÙKirill Firsov·¢Ã÷ÁË´ËÎó²î£¬£¬£¬ £¬£¬£¬ËûÔ¤¼Æ¸ÃÎó²îÓ°ÏìÁè¼Ý5300Íǫ̀Ö÷»ú£¬£¬£¬ £¬£¬£¬°üÀ¨Ê¹ÓÃcPanel¡¢PleskµÈ¹¤¾ßµÄЧÀÍÆ÷¡£¡£¡£¡£NISTÐû²¼µÄÇ徲ͨ¸æÖ¸³ö£¬£¬£¬ £¬£¬£¬Roundcube Webmail 1.5.10֮ǰµÄ°æ±¾ºÍ1.6.11֮ǰµÄ1.6.x°æ±¾±£´æ´ËÎó²î£¬£¬£¬ £¬£¬£¬ÒòURLÖеÄ_from²ÎÊýδÔÚÌØ¶¨ÎļþÖÐÑéÖ¤£¬£¬£¬ £¬£¬£¬µ¼ÖÂPHP¹¤¾ß·´ÐòÁл¯£¬£¬£¬ £¬£¬£¬´Ó¶øÔÊÐí¾­ÓÉÉí·ÝÑéÖ¤µÄÓû§Ö´ÐÐÔ¶³Ì´úÂë¡£¡£¡£¡£¸ÃÎó²îÒÑÔÚRoundcube 1.6.11ºÍ1.5.10 LTS°æ±¾ÖлñµÃÐÞ¸´¡£¡£¡£¡£Îó²îÅû¶ºó£¬£¬£¬ £¬£¬£¬Positive TechnologiesÑо¿Ö°Ô±Àֳɸ´ÏÖÁ˸ÃÎó²î£¬£¬£¬ £¬£¬£¬²¢±Þ²ßÓû§Á¬Ã¦¸üÐÂÖÁ×îа汾¡£¡£¡£¡£È»¶ø£¬£¬£¬ £¬£¬£¬Shadowserver»ù½ð»áÑо¿Ö°Ô±ÖÒÑԳƣ¬£¬£¬ £¬£¬£¬»¥ÁªÍøÉÏÈÔÓÐԼĪ84,000¸öRoundcubeʵÀýδ»ñµÃÐÞ²¹£¬£¬£¬ £¬£¬£¬±£´æÑÏÖØÇå¾²Òþ»¼¡£¡£¡£¡£


https://securityaffairs.com/178887/hacking/over-80000-servers-hit-as-roundcube-rce-bug-gets-rapidly-exploited.html