CrossBarking¹¥»÷£ºOperaä¯ÀÀÆ÷˽ÓÐAPIÔâ½Ù³Ö
°ä²¼¹¦·ò 2024-11-011. CrossBarking¹¥»÷£ºOperaä¯ÀÀÆ÷˽ÓÐAPIÔâ½Ù³Ö
10ÔÂ30ÈÕ£¬×êÑÐÈËÔ±·¢ÏÖÁËÒ»ÖÖеÄä¯ÀÀÆ÷¹¥»÷·½Ê½£¬Í¨¹ýÀûÓÃÏÖÒѽ¨¸´µÄ·ì϶£¬½«×Ô½ç˵´úÂë×¢ÈëÊܺ¦ÕßµÄ Opera ä¯ÀÀÆ÷£¬´Ó¶ø½ÚÔìÆä¡°Ë½ÓÓ×±ÀûÓ÷¨Ê½±à³Ì½Ó¿Ú (API)£¬ÕâЩ API ͨ³£½öΪ×îÊÜÐÅÀµµÄÍøÕ¾±£Áô¡£ÕâЩ˽ÓÐ API ¿ÉΪ¿ª·¢ÈËÔ±Ìá¹©ÌØÊâȨÏÞ£¬µ«Ò²¿ÉÄܱ»ºÚ¿ÍÀûÓã¬ÒÔ»ñµÃ¶Ôä¯ÀÀÆ÷µÄȫȨ½ÚÔ죬Ô̺¬¸ü¸ÄÉèÖᢽٳÖÕË»§¡¢½ûÓð²È«À©´óµÈ¡£ÎªÁËչʾÕâÖÖ¹¥»÷·½Ê½£¬Guardio ×êÑÐÈËÔ±¿ª·¢ÁËÒ»¸ö¶ñÒâµÄ Chrome À©´ó·¨Ê½£¬¸ÃÀ©´ó·¨Ê½±»Éè¼ÆÎªÔÚÓµÓÐ˽ÓÐ API ½Ó¼ûȨÏÞµÄÍøÕ¾»·¾³ÖÐÔËÐжñÒâ´úÂë¡£ËûÃÇͨ¹ý¸ÃÀ©´ó·¨Ê½£¬½«¶ñÒâ´úÂë×¢Èëµ½ Opera ä¯ÀÀÆ÷ÖУ¬²¢ÀûÓà settingsPrivate API ¸ü¸ÄÁËÊܺ¦ÕßµÄÓòÃûϵͳ (DNS) ÉèÖ㬴ӶøÈ«Ãæ²é¿´ºÍ°Ñ³ÖÆää¯ÀÀ»î¶¯¡£ÎªÏàʶ¾öÕâ¸öÎÊÌ⣬Opera ѡȡÁË Chrome ÖÐÒѾʵÏÖµÄÒ»ÖÖ¼±¾ç½â¾ö¹æ»®£º×èÖ¹ÈκÎÀ©´ó·¨Ê½ÔÚÓµÓÐ˽ÓÐ API ½Ó¼ûȨÏÞµÄÓòÉÏÔËÐо籾µÄÄÜÁ¦¡£
https://www.darkreading.com/vulnerabilities-threats/crossbarking-attack-secret-apis-expose-opera-browser-users
2. ÍøÂç´¹µöµç×ÓÓʼþ¶Ô׼ѧÉú´û¿î³ÖÓÐÈË
10ÔÂ30ÈÕ£¬½ü4300ÍòÃÀ¹úÈ˱³¸º×žùÔÈÿÈË37,000ÃÀÔªµÄѧÉú´û¿îÕ®Îñ¡£°ÝµÇ×ÜÍ³ÔøÌá³öÒ»ÏîÖ¼ÔÚÃâÈ¥²¿ÃŸæ´ûÈËÕ®ÎñµÄ´òË㣬µ«¸Ã´òËãÃæ¶Ô³Á³Á×è°¡£Ôڴ˲¼¾°Ï£¬ÍøÂç·¸×ï·Ö×ӳûúÕë¶ÔѧÉú´û¿î³ÖÓÐÈËÌáÒéÍøÂç´¹µö¹¥»÷¡£Harmony Email & CollaborationµÄÍøÂ簲ȫÊýÃÅ·¢ÏÖ£¬ÕâÀ๥»÷ÔÚ´ÓǰÁ½ÖÜÄÚ¼¤Ôö£¬ÇÒ¹¥»÷ÕßʹÓÃÁËÌØÊâµÄÎı¾»ìºÏ¼¼Êõ£¬ÈçUnicode´Ó×óµ½ÓÒÏóÕ÷ (LRM) ºÍÈíÁ¬×Ö·û£¬ÒÔ¶ã±ÜÌìȻ˵»°´¦Öüì²âÆ÷µÄ¼ì²â¡£ÕâЩÓʼþÄÚÈÝ¿´ËÆ´¹Î£ÇÒ¿ÉÐÅ£¬ÊµÔòÖ¼ÔÚÓÕÆÊܺ¦Õßй¼ûô¸ÐÐÅÏ¢¡£´ËÀ๥»÷²»½öÍþвÓ×ÎÒÐÅÏ¢°²È«£¬»¹¿ÉÄÜ¶ÔÆóÒµ×é³É·çÏÕ¡£Ô±¹¤ÈôÔÚ¹«Ë¾É豸ÉÏ´¦ÖÃÕâЩÓʼþ£¬¿ÉÄܵ¼Ö¶ñÒâÈí¼þÈëÇÖ¹«Ë¾ÏµÍ³£¬½ø¶øÒý·¢Êý¾Ýй¶»òÒµÎñÐÅÏ¢±íй¡£Òò¶ø£¬ÆóÒµÐè²ÉÈ¡ÇÐʵ¿ÉÐеĴëÊ©À´·À±¸´ËÀ๥»÷£¬Ô̺¬Ìá¸ßÔ±¹¤°²È«Òâʶ¡¢ÀûÓÃÏȽøµÄµç×ÓÓʼþ¹ýÂ˺Ͱ²È«¹¤¾ß¡¢Ö´Ðжà³É·ÖÉí·ÝÑéÖ¤ÒÔ¼°Ôì¶©ÃÀÂúµÄÊÂÎñÏìÓ¦´òËã¡£
https://blog.checkpoint.com/harmony-email/7500-phishing-emails-use-interesting-obfuscation-method-to-target-student-loan-holders/
3. LottieFiles npm°üÏÖ¶ñÒâ´úÂ룬Óû§Ð费ΣÉý¼¶
10ÔÂ31ÈÕ£¬LottieFiles ×òÈÕ°ä·¢£¬Æä npm °üÖеÄÌØ¶¨°æ±¾£¬¼´ Lottie Web Player£¨¡°lottie-player¡±£©µÄ 2.0.5¡¢2.0.6 ºÍ 2.0.7 °æ±¾£¬±»·¢ÏÖЯ´ø¶ñÒâ´úÂë¡£ÕâЩ°æ±¾»áÌáÐÑÓû§ÏνӼÓÃÜÇ®±ÒÇ®°ü£¬ÒâͼÇå¿ÕÇ®°üÖеÄ×ʲú¡£·¢ÏÖÎÊÌâºó£¬LottieFiles Ѹ¿ì°ä²¼ÁË´¿¾»µÄ 2.0.8 °æ±¾£¬½¨ÒéÓû§¾¡¿ìÉý¼¶ÒÔÔ¤·À·çÏÕ¡£Í¬Ê±£¬LottieFiles Ö¸³ö£¬Í¨¹ýµÚÈý·½ CDN ʹÓøÿâÇÒδ¹Ì¶¨°æ±¾µÄÓû§»á×Ô¶¯ÊÕµ½ÊÜËð°æ±¾£¬µ«Ëæ×Ű²È«°æ±¾µÄ°ä²¼£¬ÕâЩÓû§½«×Ô¶¯ÊÕµ½½¨¸´¡£¶ÔÓÚÎÞ·¨Éý¼¶µÄÓû§£¬LottieFiles ½¨ÒéÏò×îÖÕÓû§´«µÝ·çÏÕ£¬²¢ÖÒ¸æËûÃÇÓйØÚ²ÆÐÔ¼ÓÃÜÇ®±ÒÇ®°üÏνÓÒªÇ󣬻ò³ÖÐøÊ¹ÓÃδÊÜÓ°ÏìµÄ 2.0.4 °æ±¾¡£´Ë±í£¬LottieFiles °ä²¼²¼¸æ³Æ£¬Õâ´ÎÊÂÎñ½öÓ°ÏìÆä npm °ü£¬²»Ó°ÏìÆä SaaS ·þÎñ£¬²¢È·ÈÏÆäËû¿ªÔ´¿â¡¢´úÂëºÍ´æ´¢¿â¾ùδÊÜÓ°Ïì¡£¸Ãƽ̨ÒÑñݶá´Û¸Ä°æ±¾ÉÏ´«ÕßµÄ npm ÕÊ»§½Ó¼ûȨÏÞ£¬²¢³·ÏúÓйØÁîÅÆ£¬Í¬Ê±³ÖÐø¶ÔÕâ´ÎÈëÇÖÊÂÎñ½øÐÐÄÚ²¿µ÷²é¡£Ä¿Ç°Éв»Ã÷ÏÔ¸ÃÊÂÎñÊÇ·ñÓÐÊܺ¦ÕßÒÔ¼°¾ßÌåËðʧ½ð¶î¡£
https://www.bleepingcomputer.com/news/security/lottiefiles-hit-in-npm-supply-chain-attack-targeting-users-crypto/
4. PTZOpticsÉãÏñ»úÏÖÁãÈÕ·ì϶£¬ºÚ¿ÍÊÔIJÀûÓÃÌáÒé¹¥»÷
10ÔÂ31ÈÕ£¬ºÚ¿ÍÔÚÀûÓÃPTZOpticsÔÆÌ¨±ä½¹ÊµÊ±Á÷ýÌåÉãÏñ»úÖеÄÁ½¸öз¢ÏÖµÄÁãÈÕ·ì϶CVE-2024-8956ºÍCVE-2024-8957¡£ÕâЩ·ì϶ÓÚ2024Äê4Ô±»GreyNoiseµÄSift¹¤¾ßÔÚÆäÃÛ¹ÞÍøÂçÉϼì²âµ½¡£CVE-2024-8956Éæ¼°ÉãÏñ»ú¡°lighthttpd¡±ÍøÂç·þÎñÆ÷ÖеÄÈõÉí·ÝÑéÖ¤ÎÊÌ⣬ÔÊÐíδ¾ÊÚȨµÄÓû§½Ó¼ûCGI API£¬Â¶³öÃô¸ÐÐÅÏ¢¡£¶øCVE-2024-8957ÔòÊÇÓÉÓÚ¡°ntp_client¡±¶þ½øÔìÎļþÖеÄÊäÈëËãÕʲ»¼°£¬ÔÊÐíÔ¶³Ì´úÂëÖ´ÐС£ÕâÁ½¸ö·ì϶¿ÉÄܵ¼ÖÂÉãÏñÍ·±»ÆëÈ«ÊÕÊÜ¡¢Ï°È¾¶ñÒâÈí¼þ¡¢¹¥»÷Í³Ò»ÍøÂçµÄÆäËûÉ豸»òÖжÏÊÓÆµÁ÷¡£Ö»¹Ü³õʼ¹¥»÷»î¶¯ÔÚ·¢ÏÖºó²»¾ÃÒþû£¬µ«6Ô³öÏÖÁËʹÓÃwgetÏÂÔØshell¾ç±¾½øÐз´Ïò½Ó¼ûµÄ³¢ÊÔ¡£GreyNoiseÒÑÏòÊÜÓ°Ï칩¸øÉ̽øÐÐÕÆ¹ÜÈεÄÅû¶£¬PTZOpticsµÈ³§ÉÌÒѰ䲼°²È«¸üУ¬µ«²¿ÃžÉÐͺźÍз¢ÏÖµÄÊÜÓ°ÏìÐͺÅÉÐδÊÕµ½²¹¶¡¡£GreyNoiseÒÔΪ¿ÉÄÜÓиü¿í·ºµÄÉ豸Êܵ½Ó°Ï죬½¨ÒéÓû§Õ÷ѯÉ豸¹©¸øÉÌÏàʶ×îй̼þ¸üÐÂÇé¿ö¡£
https://www.bleepingcomputer.com/news/security/hackers-target-critical-zero-day-vulnerability-in-ptz-cameras/
5. ÒÉËÆÎÚ¿ËÀ¼ÍøÂç¹¥»÷µ¼ÖÂÌØÎ¬¶ûÍ£³µÏµÍ³Ì±»¾
10ÔÂ31ÈÕ£¬¶íÂÞ˹Î÷±±²¿³ÇÊÐÌØÎ¬¶ûµÄ¾ÓÃñÒòµ±¾ÖËù³ÆµÄÊý×ÖÍ£³µÖ§¸¶ÏµÍ³¡°¼¼Êõ¹ÊÕÏ¡±¶øµÃÒÔÃâ·ÑÍ£³µ½üÁ½Ì졣Ȼ¶ø£¬Ò»¸öÃûΪ¡°ÎÚ¿ËÀ¼ÍøÂçͬÃË¡±µÄºÚ¿Í×éÖ¯Ðû³ÆÕâ¿ÉÄÜÊÇÕë¶Ô¸ÃÊÐÖÎÀíÍøÂçµÄÍøÂç¹¥»÷ËùÖ£¬²¢Ðû³Æ·ÛËéÁËÊýʮ̨Ðé¹¹»ú¡¢±¸·Ý´æ´¢¡¢ÍøÕ¾¡¢µç×ÓÓʼþºÍÊý°Ù¸ö¹¤×÷Õ¾¡£ÌØÎ¬¶ûÊе±¾Ö×î³õδ¶Ô´Ë°ä·¢ÆÀÂÛ£¬µ«Ëæºó°ä·¢ÉêÃ÷³ÆÍøÕ¾ºÍÔÚÏßÍ£³µÖ§¸¶Æ½Ì¨ÔÚ½øÐм¼Êõά½¨¡£±¾µØ¾ÓÃñÔÚ³¢ÊÔ¸¶¿îʱÓöµ½ÃýÎóÐÂÎÅ»òÀûÓ÷¨Ê½¼ÓÔØÊ§°Ü¡£Êе±¾Ö¹ÙÔ±ºóÀ´°ä·¢Í£³µ¸¶·Ñ·þÎñÒѸ´Ô£¬µ«Î´È·ÈÏÊÇ·ñ²úÉúÁËÍøÂç¹¥»÷¡£Õâ²¢·ÇÇ×ÎÚ¿ËÀ¼ºÚ¿Í³õ´ÎÐû³Æ¶Ô¶íÂÞ˹·þÎñÌáÒé¹¥»÷£¬´ËǰҲÓÐÀàËÆÊÂÎñ±»¹é×ïΪ¡°¼¼Êõ¹ÊÕÏ¡±¡£ÎÚ¿ËÀ¼ÍøÂçͬÃËÊÇÒ»¸öÇ×ÎÚ¿ËÀ¼ÍøÂç»î¶¯ÈËÊ¿¼¯Ì壬×Ô¶íÂÞ˹ÈëÇÖÎÚ¿ËÀ¼ÒÔÀ´»ý¼«²Î¼Ó·´¶í·Ü¶·£¬²¢ÔøÐû³ÆÈëÇÖ¶íÂÞ˹¹ú¶ÈÐÅÓþ¿¨Ö§¸¶ÏµÍ³µÈÐж¯¡£
https://therecord.media/ukraine-cyberattack-russia-parking-tver
6. Phish n' ShipsÍøÂç´¹µö»î¶¯Ï°È¾Ç§¼ÒÍøµê
10ÔÂ31ÈÕ£¬Ò»ÏîÃûΪ¡°Phish n' Ships¡±µÄÍøÂç´¹µö»î¶¯×Ô2019ÄêÆð£¬ÒÑϰȾ³¬¹ýһǧ¼ÒºÏ·¨ÔÚÏßÉ̵꣬ͨ¹ýÍÆ¹ãÐéαÉÌÆ·ÁбíÚ²ÆÊýÊ®ÍòÏû·ÑÕߣ¬Ôì³ÉÊýǧÍòÃÀÔªËðʧ¡£¸Ã»î¶¯ÀûÓ÷ì϶¡¢ÃýÎóÅäÖûòÊÜËðÖÎÀíԱʹ´¦ÈëÇÖÍøÕ¾£¬ÉÏ´«¶ñÒâ¾ç±¾ºÍÐéα²úÆ·ÁÐ±í£¬ÀûÓÃSEOÓÅ»¯ÎüÒýÊܺ¦Õß¡£Êܺ¦Õßµã»÷Á´½Óºó±»³Á¶¨ÏòÖÁ¼ÙÉ̵꣬¾ÀúÐéα½áÕËÁ÷³Ì²¢ÊäÈëÓ×ÎÒÐÅÏ¢ºÍÐÅÓþ¿¨ÏêÇ飬µ«²É°ìµÄÎïÆ·´ÓδͶµÝ¡£SatoriÍþвµý±¨ÍŶӷ¢ÏÖËùÓмÙÉ̵êÏνÓÖÁÒ»¸öÓÉ14¸öIPµØÖ·×é³ÉµÄÍøÂ磬²¢ÀÄÓöà¼ÒÖ§¸¶ÌṩÉÌÌ×ÏÖ¡£HUMAN¼°ÆäºÏ×÷ͬ°éÒÑе÷»ØÓ¦£¬Í¨ÖªÊÜÓ°Ïì×éÖ¯²¢ÏòGoogle»ã±¨ÐéαÁÐ±í£¬´óÎÞÊý¶ñÒâËÑË÷Á˾ÖÒѱ»ËãÕÊ£¬µ«ÍþвÐÐΪÕß¿ÉÄ᳢ܻÊÔ³ÉÁ¢ÐµÄÚ²ÆÍøÂç¡£½¨ÒéÏû·ÑÕß×¢ÒⲻѰ³£³Á¶¨Ïò£¬È·ÈÏÉ̵êÍøÖ·£¬²¢»ã±¨Ú²ÆÐÔÊÕ·Ñ¡£
https://www.bleepingcomputer.com/news/security/over-a-thousand-online-shops-hacked-to-show-fake-product-listings/


¾©¹«Íø°²±¸11010802024551ºÅ