Nginx UIÉí·ÝÑéÖ¤ÈÆ¹ýÎó²îÒѱ»¶ñÒâʹÓÃ
Ðû²¼Ê±¼ä 2026-04-161. Nginx UIÉí·ÝÑéÖ¤ÈÆ¹ýÎó²îÒѱ»¶ñÒâʹÓÃ
4ÔÂ15ÈÕ£¬£¬£¬Nginx UI ÖÐÒ»¸öÖ§³ÖÄ£×ÓÉÏÏÂÎÄÐÒ飨MCP£©µÄÑÏÖØÇå¾²Îó²î£¨±àºÅCVE-2026-33032£©ÏÖÔÚÕýÔâµ½¶ñÒâʹÓ㬣¬£¬¹¥»÷ÕßÎÞÐèÈκÎÉí·ÝÑéÖ¤¼´¿ÉÍêÈ«¿ØÖÆÄ¿µÄЧÀÍÆ÷¡£¡£¡£¡£¡£¡£¸ÃÎó²îµÄ»ù´¡Ôµ¹ÊÔÓÉÔÚÓÚnginx-uiδÄܶÔ/mcp_message¶ËµãʵÑéÓÐÓñ£»£»£»£»£»£»¤£¬£¬£¬Ê¹µÃÔ¶³Ì¹¥»÷ÕßÄܹ»ÔÚÎÞÆ¾Ö¤µÄÇéÐÎÏÂŲÓÃÌØÈ¨MCP²Ù×÷¡£¡£¡£¡£¡£¡£ÓÉÓÚÕâЩ²Ù×÷Éæ¼°Ð´Èë¡¢Ð޸ļ°ÖØÐ¼ÓÔØnginxÉèÖÃÎļþ£¬£¬£¬Ò»¸ö¼òÆÓµÄδÈÏÖ¤ÇëÇ󼴿ɸıäЧÀÍÆ÷ÐÐΪ£¬£¬£¬ÊµÏÖWebЧÀÍÆ÷µÄÖÜÈ«½ÓÊÜ¡£¡£¡£¡£¡£¡£ÃÀ¹ú¹ú¼Ò±ê×¼ÓëÊÖÒÕÑо¿Ôº£¨NIST£©ÔÚ¹ú¼ÒÎó²îÊý¾Ý¿â£¨NVD£©ÖÐÃ÷È·Ö¸³ö£¬£¬£¬ÈκÎÍøÂç¹¥»÷Õß¾ù¿Éδ¾ÈÏ֤ŲÓÃËùÓÐMCP¹¤¾ß£¬£¬£¬°üÀ¨ÖØÆônginx¡¢½¨Éè»òÐÞ¸ÄÉèÖÃÎļþÒÔ¼°´¥·¢×Ô¶¯ÖØÔØ¡£¡£¡£¡£¡£¡£Nginx UI¹Ù·½ÓÚ3ÔÂ15ÈÕÐû²¼2.3.4°æ±¾ÐÞ¸´¸ÃÎó²î£¬£¬£¬´ËǰһÌìÓÉPluto Security AIµÄÑо¿Ö°Ô±±¨¸æ¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬Îó²î±êʶ·û¡¢ÊÖÒÕϸ½Ú¼°¿´·¨ÑéÖ¤£¨PoC£©´úÂëÖ±ÖÁÔÂβ²Å¹ûÕæÅû¶¡£¡£¡£¡£¡£¡£±¾ÖÜÔçЩʱ¼ä£¬£¬£¬Recorded FutureÔÚCVE¸ÅÀÀ±¨¸æÖÐÈ·ÈϸÃÎó²îÕý±»Æð¾¢Ê¹Óᣡ£¡£¡£¡£¡£Pluto Securityͨ¹ýShodanɨÃè·¢Ã÷£¬£¬£¬ÏÖÔÚÔ¼ÓÐ2600¸ö¹ûÕæÌ»Â¶µÄʵÀý¿ÉÄܱ£´æÎó²î£¬£¬£¬Ö÷ÒªÂþÑÜÔÚÖйú¡¢ÃÀ¹ú¡¢Ó¡¶ÈÄáÎ÷ÑÇ¡¢µÂ¹úºÍÏã¸Û¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/critical-nginx-ui-auth-bypass-flaw-now-actively-exploited-in-the-wild/
2. ÐÂÐͶñÒâÈí¼þAgingFlyÕý¹¥»÷Õþ¸®ÓëÒ½Ôº
4ÔÂ15ÈÕ£¬£¬£¬Ò»ÖÖÃûΪ¡°AgingFly¡±µÄÐÂÐͶñÒâÈí¼þ¼Ò×åÕý±»ÓÃÓÚ¹¥»÷µØ·½Õþ¸®¡¢Ò½ÔºÒÔÖ¹ú·À²½¶Ó³ÉÔ±£¬£¬£¬¸ÃÈí¼þרÃÅ´Ó»ùÓÚChromiumµÄä¯ÀÀÆ÷ºÍWindows°æWhatsAppÖÐÇÔÈ¡Éí·ÝÑéÖ¤Êý¾Ý¡£¡£¡£¡£¡£¡£CERT-UAÒѽ«¹¥»÷Ðж¯¹éÒòÓÚÆä×·×ÙµÄÍøÂçÍþв¼¯ÈºUAC-0247¡£¡£¡£¡£¡£¡£¹¥»÷Á´Ê¼ÓÚÄ¿µÄÊÕµ½Î±×°³ÉÈËÐÔÖ÷ÒåÔ®ÖúµÄµç×ÓÓʼþ£¬£¬£¬ÓÕµ¼µã»÷ǶÈëÁ´½Ó£¬£¬£¬¸ÃÁ´½Ó»áÖØ¶¨Ïòµ½Òò¿çÕ¾¾ç±¾£¨XSS£©Îó²îÔâÈëÇÖµÄÕýµ±ÍøÕ¾£¬£¬£¬»òʹÓÃAI¹¤¾ßÌìÉúµÄÐéÎ±ÍøÕ¾¡£¡£¡£¡£¡£¡£Ëæºó£¬£¬£¬Êܺ¦ÕßÊÕµ½°üÀ¨¿ì½Ý·½·¨Îļþ£¨LNK£©µÄ¹éµµÎļþ£¬£¬£¬¸ÃÎļþÆô¶¯ÄÚÖõÄHTA´¦Öóͷ£³ÌÐò£¬£¬£¬ÅþÁ¬Ô¶³Ì×ÊÔ´¼ìË÷²¢Ö´ÐÐHTAÎļþ¡£¡£¡£¡£¡£¡£HTAÏÔʾÓÕ¶ü±íµ¥ÒÔÊèÉ¢×¢ÖØÁ¦£¬£¬£¬Í¬Ê±½¨ÉèÍýÏëʹÃüÏÂÔØ²¢ÔËÐÐEXEÓÐÓÃÔØºÉ£¬£¬£¬½«shellcode×¢ÈëÕýµ±Àú³Ì¡£¡£¡£¡£¡£¡£½Ó׏¥»÷Õß°²ÅÅÁ½½×¶Î¼ÓÔØÆ÷£¬£¬£¬×îÖÕÓÐÓÃÔØºÉ¾Ñ¹ËõºÍ¼ÓÃܺóÊÍ·Å¡£¡£¡£¡£¡£¡£µä·¶µÄTCP·´Ïòshell»òÀàËÆRAVENSHELLµÄ¹¤¾ß±»ÓÃ×÷Ìø°å£¬£¬£¬½¨ÉèÓëÖÎÀíЧÀÍÆ÷µÄTCPÅþÁ¬£¬£¬£¬Ê¹ÓÃXORÃÜÂë¼ÓÃܵÄTCPͨµÀÓëC2ЧÀÍÆ÷ͨѶ£¬£¬£¬Í¨¹ýWindowsÏÂÁîÌáÐÑ·ûÖ´ÐÐÏÂÁî¡£¡£¡£¡£¡£¡£Ö®ºóAgingFly±»½»¸¶°²ÅÅ£¬£¬£¬Í¬Ê±Ê¹ÓÃPowerShell¾ç±¾£¨SILENTLOOP£©Ö´ÐÐÏÂÁî¡¢¸üÐÂÉèÖò¢´ÓTelegramƵµÀ»ñÈ¡C2µØµã¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-agingfly-malware-used-in-attacks-on-ukraine-govt-hospitals/
3. EssentialPluginÈýÊ®Óà¿î²å¼þÔâºóÃÅÈëÇÖ
4ÔÂ15ÈÕ£¬£¬£¬EssentialPluginÈí¼þ°üÖеÄ30¶à¿îWordPress²å¼þÒѱ»¶ñÒâ´úÂëÈëÇÖ£¬£¬£¬¹¥»÷Õß¿ÉÔÚδ¾ÊÚȨµÄÇéÐÎÏ»á¼û²¢¿ØÖÆÔËÐÐÕâЩ²å¼þµÄÍøÕ¾¡£¡£¡£¡£¡£¡£¸ÃÊÂÎñÓÉÍйÜWordPressÖ÷»úÌṩÉÌAnchor HostingµÄÊ×´´ÈËAustin Ginder·¢Ã÷£¬£¬£¬ËûÔÚÊÕµ½Ä³²å¼þ°üÀ¨ÔÊÐíµÚÈý·½»á¼û´úÂëµÄÏßË÷ºóÕö¿ªÊӲ죬£¬£¬Ð§¹ûÏÔʾ£º×Ô2025Äê8Ô¸ÃÏîÄ¿±»ÐµêÖ÷ÒÔÁùλÊý¼ÛÇ®ÊÕ¹ºÒÔÀ´£¬£¬£¬EssentialPluginÈí¼þ°üÖеÄËùÓвå¼þ¾ù±£´æºóÃÅ¡£¡£¡£¡£¡£¡£ºóÃÅ×î³õ´¦ÓÚ²»»î¶¯×´Ì¬£¬£¬£¬Ö±µ½½üÆÚ²Å±»¼¤»î£¬£¬£¬Ëü¾²Ä¬ÅþÁ¬Íⲿ»ù´¡ÉèÊ©»ñȡһ¸öÃûΪ¡°wp-comments-posts.php¡±µÄÎļþ£¬£¬£¬½ø¶ø½«¶ñÒâÈí¼þ×¢Èë½¹µãÉèÖÃÎļþ¡°wp-config.php¡±¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ¶ÔÍøÕ¾ËùÓÐÕß²»¿É¼û£¬£¬£¬²¢Ê¹ÓûùÓÚÒÔÌ«·»µÄC2µØµãÆÊÎö¾ÙÐйæ±Ü£¬£¬£¬¿Éƾָ֤Áî»ñÈ¡À¬»øÁ´½Ó¡¢Öض¨ÏòºÍÐéÎ±Ò³Ãæ¡£¡£¡£¡£¡£¡£WordPress.orgѸËÙÏìÓ¦£¬£¬£¬¹Ø±ÕÁËÏà¹Ø²å¼þ²¢Ç¿ÖÆÍøÕ¾¸üУ¬£¬£¬ÒÔÇжϺóÃÅͨѶ²¢½ûÓÃÆäÖ´Ðз¾¶¡£¡£¡£¡£¡£¡£½¨ÒéʹÓÃÊÜÓ°Ïì²å¼þµÄÍøÕ¾ÖÎÀíÔ±Á¬Ã¦¼ì²é²¢ÊÖ¶¯ÕûÀíÉèÖÃÎļþÖеĶñÒâ´úÂë¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/wordpress-plugin-suite-hacked-to-push-malware-to-thousands-of-sites/
4. Mirax¶ñÒâÈí¼þ¹¥»÷»î¶¯²¨¼°22ÍòÕË»§
4ÔÂ15ÈÕ£¬£¬£¬Ò»ÖÖÃûΪMiraxµÄÐÂÐͰ²×¿Ô¶³Ì»á¼ûľÂí£¨RAT£©Õýͨ¹ýMetaƽ̨£¨FacebookºÍInstagram£©ÉÏµÄ¹ã¸æ´ó¹æÄ£Èö²¥£¬£¬£¬Ö÷ÒªÕë¶ÔÎ÷°àÑÀÓïÓû§£¬£¬£¬ÏÖÔÚÒÑÓÐÁè¼Ý22Íò¸öÕË»§±»Ñ¬È¾¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ²»µ«ÔÊÐí¹¥»÷ÕßʵʱÍêÈ«¿ØÖÆÊÜѬȾװ±¸£¬£¬£¬»¹Äܽ«×°±¸×ª»¯ÎªSOCKS5ÊðÀí½Úµã£¬£¬£¬Í¨¹ýÊܺ¦ÕßµÄIPµØµã·ÓɶñÒâÁ÷Á¿¡£¡£¡£¡£¡£¡£MiraxÒÔ¶ñÒâÈí¼þ¼´Ð§ÀÍ£¨MaaS£©ÐÎʽ³öÊÛ£¬£¬£¬µ«½ÓÄɸ߶ȹܿصĶÀ¼Ò·Ö·¢Ä£Ê½£¬£¬£¬½öÏÞÉÙÊýͬÃ˳ÉÔ±»á¼û£¬£¬£¬Õâ±ê¼Ç×ÅÒÆ¶¯ÍþвÕý´ÓÆÕ±éµÄMaaSÏò¸üÒþ²ØµÄ¡°Ë½ÓÐMaaS¡±Ñݱ䡣¡£¡£¡£¡£¡£×Ô2025Äê12ÔÂ19ÈÕÆð£¬£¬£¬Mirax×îÏÈÔÚµØÏÂÂÛ̳¹ûÕæÍÆ¹ã£¬£¬£¬CleafyÍþвÇ鱨ÍŶÓ×Ô2026Äê3ÔÂÆð¶ÔÆä¾ÙÐÐÆð¾¢¼à¿Ø¡£¡£¡£¡£¡£¡£¹¥»÷ͨ¹ý¶à½×¶ÎÓªÏú»î¶¯ÊµÑ飬£¬£¬Ê¹ÓÃMeta¹ã¸æÓÕÆÓû§ÏÂÔØ¶ñÒâÓ¦ÓóÌÐò¡£¡£¡£¡£¡£¡£Êܺ¦Õß±»Öض¨Ïòµ½ÌṩÐéαЧÀÍ£¨Èç²»·¨ÌåÓýÖ±²¥Ó¦Ó㩵Ĵ¹ÂÚÍøÕ¾£¬£¬£¬Ê¹ÓÃÓû§²àÔØAPKÎļþµÄϰ¹ß¾ÙÐй¥»÷¡£¡£¡£¡£¡£¡£¶ñÒâÈí¼þͨ¹ýÍйÜÔÚGitHub ReleasesÉϵÄͶ·ÅÆ÷Èö²¥£¬£¬£¬ÕâЩͶ·ÅÆ÷ƵÈÔ¸üкÍÖØÐ´ò°üÒÔÈÆ¹ýÇå¾²¼ì²é¡£¡£¡£¡£¡£¡£×°Öú󣬣¬£¬Í¶·ÅÆ÷½âѹÓÐÓÃÔØºÉ²¢Ó¦ÓÃÇ¿»ìÏýÊÖÒÕ£¬£¬£¬Í¨¹ýWebSocket½¨ÉèÅþÁ¬¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/190842/uncategorized/mirax-malware-campaign-hits-220k-accounts-enables-full-remote-control.html
5. CISA¸üÐÂKEVĿ¼£ºÐÂÔöSharePoint¼°ExcelÎó²î
4ÔÂ15ÈÕ£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«Ó°ÏìMicrosoft SharePoint ServerºÍMicrosoft Office ExcelµÄÎó²îÌí¼Óµ½ÆäÒÑÖª¿ÉʹÓÃÎó²î£¨KEV£©Ä¿Â¼ÖУ¬£¬£¬ÒªÇóÁª°î»ú¹¹ÔÚ2026Äê4ÔÂ28ÈÕǰÍê³ÉÐÞ¸´¡£¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬±àºÅΪCVE-2009-0238£¨CVSSÆÀ·Ö9.3£©µÄÎó²îÓ°Ïì¶à¸ö°æ±¾µÄMicrosoft Excel¼°Ïà¹ØÉó²éÆ÷¡£¡£¡£¡£¡£¡£µ±Óû§·¿ªÌØÖƵÄExcelÎļþʱ£¬£¬£¬¸ÃÎó²î»áµ¼ÖÂÓ¦ÓóÌÐò»á¼ûÄÚ´æÖеÄÎÞЧ¹¤¾ß£¬£¬£¬Ôì³ÉÄÚ´æË𻵣¬£¬£¬´Ó¶øÊ¹Ô¶³Ì¹¥»÷ÕßÄܹ»ÒÔÄ¿½ñÓû§È¨ÏÞÔÚÊÜÓ°ÏìϵͳÉÏÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¸ÃÎó²îÔçÔÚ2009Äê2Ô¾ͱ»Æð¾¢Ê¹Ó㬣¬£¬ÌØÊâÊÇͨ¹ýTrojan.Mdropper.AC¶ñÒâÈí¼þÈö²¥£¬£¬£¬ÊÇÆäÊ±ÖØ´óÏÖʵÍþв֮һ¡£¡£¡£¡£¡£¡£µÚ¶þ¸ö±»¼ÓÈëĿ¼µÄÎó²î±àºÅΪCVE-2026-32201£¨CVSSÆÀ·Ö6.5£©£¬£¬£¬Éæ¼°Microsoft SharePoint ServerÖеÄÓÕÆÎó²î£¬£¬£¬¿ÉÄÜÓë¿çÕ¾¾ç±¾¹¥»÷£¨XSS£©Ïà¹Ø¡£¡£¡£¡£¡£¡£Î¢Èí±¨¸æ³Æ¸ÃÁãÈÕÎó²îÒѱ»Æð¾¢ÓÃÓÚÏÖʵ¹¥»÷ÖС£¡£¡£¡£¡£¡£Ç徲ͨ¸æÖ¸³ö£¬£¬£¬SharePointÖв»×¼È·µÄÊäÈëÑéÖ¤ÔÊÐíδ¾ÊÚȨµÄ¹¥»÷Õßͨ¹ýÍøÂçÖ´ÐÐÓÕÆ²Ù×÷£¬£¬£¬ÀÖ³ÉʹÓúó¿ÉÉó²é²¿·ÖÃô¸ÐÐÅÏ¢£¬£¬£¬»ò¸ü¸ÄÒÑÅû¶ÐÅÏ¢¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/190852/hacking/u-s-cisa-adds-microsoft-sharepoint-server-and-microsoft-office-excel-flaws-to-its-known-exploited-vulnerabilities-catalog.html
6. CISAÖÒÑÔWindowsʹÃüÖ÷»úȨÏÞÌáÉýÎó²îÕý±»Ê¹ÓÃ
4ÔÂ15ÈÕ£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ·¢³öÖÒÑÔ£¬£¬£¬ÒªÇóÃÀ¹úÕþ¸®»ú¹¹¾¡¿ì±£»£»£»£»£»£»¤ÆäϵͳÃâÊÜWindowsʹÃüÖ÷»úȨÏÞÌáÉýÎó²î£¨CVE-2025-60710£©µÄË𺦡£¡£¡£¡£¡£¡£¸ÃÎó²îÔÊÐíÍâµØ¹¥»÷ÕßÔÚ½ö¾ß±¸»ù±¾Óû§È¨ÏÞµÄÇéÐÎÏ£¬£¬£¬Í¨¹ýµÍÖØÆ¯ºóµÄ¹¥»÷·½·¨»ñµÃSYSTEMȨÏÞ£¬£¬£¬´Ó¶øÍêÈ«¿ØÖÆÊÜѬȾµÄ×°±¸¡£¡£¡£¡£¡£¡£Ê¹ÃüÖ÷»úÊÇWindowsϵͳµÄ½¹µã×é¼þ£¬£¬£¬×÷Ϊ»ùÓÚDLLµÄÀú³ÌµÄÈÝÆ÷£¬£¬£¬ÔÊÐíËüÃÇÔÚºǫ́ÔËÐУ¬£¬£¬²¢È·±£Ôڹػúʱ´ú׼ȷ¹Ø±ÕÒÔ±ÜÃâÊý¾ÝË𻵡£¡£¡£¡£¡£¡£¸ÃÎó²îÔ´ÓÚÓ°ÏìWindows 11ºÍWindows Server 2025×°±¸µÄÁ´½Ó¸ú×ÙÈõµã£¬£¬£¬ÏêϸÌåÏÖΪWindowsʹÃüÖ÷»úÀú³ÌÔÚÎļþ»á¼û֮ǰµÄÁ´½ÓÆÊÎö²»µ±£¬£¬£¬µ¼ÖÂÊÚȨ¹¥»÷ÕßÄܹ»ÔÚÍâµØÌáÉýȨÏÞ¡£¡£¡£¡£¡£¡£Î¢ÈíÒÑÓÚ2025Äê11ÔÂÐû²¼ÁËÕë¶Ô¸ÃÎó²îµÄÇå¾²¸üС£¡£¡£¡£¡£¡£±¾ÖÜÒ»£¬£¬£¬CISA½«CVE-2025-60710ÕýʽÁÐÈëÆä¡°ÒÑÖª¿ÉʹÓÃÎó²î¡±£¨KEV£©Ä¿Â¼¡£¡£¡£¡£¡£¡£Æ¾Ö¤2021Äê11ÔÂÐû²¼µÄ¾ßÓÐÔ¼ÊøÁ¦µÄ²Ù×÷Ö¸ÁBOD£©22-01£¬£¬£¬Áª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹±»¸øÓèÁ½ÖÜʱ¼äÀ´Íê³ÉÎó²îÐÞ¸´£¬£¬£¬ÒÔ±£»£»£»£»£»£»¤ÆäÍøÂçÃâÊܹ¥»÷¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cisa-flags-windows-task-host-vulnerability-as-exploited-in-attacks/


¾©¹«Íø°²±¸11010802024551ºÅ