CVE-2024-27564·ì϶£ºChatGPT»ù´¡ÉèÊ©Ãæ¶ÔSSRF¹¥»÷Íþв
°ä²¼¹¦·ò 2025-03-181. CVE-2024-27564·ì϶£ºChatGPT»ù´¡ÉèÊ©Ãæ¶ÔSSRF¹¥»÷Íþв
3ÔÂ17ÈÕ£¬ÍøÂ簲ȫ¹«Ë¾VeritiÔÚÆä×îÐÂ×êÑл㱨ÖнÒʾÁËOpenAIµÄChatGPT»ù´¡ÉèÊ©ÖдæÔÚµÄÒ»¸ö·þÎñÆ÷¶ËÒªÇóαÔ죨SSRF£©·ì϶£¬¼´CVE-2024-27564£¬Ö»¹Ü¸Ã·ì϶±»¹éΪÖеÈÑϳÁˮƽ£¬µ«ÔÚÏÖʵÊÀ½çÖÐÒѱ»»ý¼«ÀûÓá£Veriti·¢ÏÖ£¬Ò»ÖÜÄÚ¾ÍÓÐ10,479´Î¹¥»÷³¢ÊÔÔ´×Ôͳһ¶ñÒâIPµØÖ·¡£´Ë±í£¬35%µÄ×éÖ¯Òò°²ÕûϵͳÅäÖÃÃýÎó¶øÎ´ÄÜ»ñµÃ³ä·Ö±£»¤£¬ÆäÖÐÃÀ¹úÔâ·êµÄ¹¥»÷×îΪ¼¯ÖУ¬Õ¼±È33%£¬Æä´ÎÊǵ¹úºÍÌ©¹ú£¬¾ùΪ7%¡£¹¥»÷»î¶¯ÔÚ1Ô·ݼ¤Ôö£¬ËæºóÓÐËù½µÂä¡£½ðÈÚÐÐÒµ³ÉÎªÖØÒª¹¥»÷Ö¸±ê£¬ÒòÆäÑϳÁÒÀÀµAI·þÎñºÍAPI¼¯³É£¬Ò×ÊÜSSRF¹¥»÷Íþв£¬¿ÉÄܵ¼ÖÂÊý¾Ýй¶¡¢Î´¾ÊÚȨµÄÂòÂô¡¢¼à¹Ü´¦·£ºÍÃûÓþÇÖº¦¡£VeritiÇ¿µ÷£¬²»Ó¦ºöÊÓÖеÈÑϳÁˮƽµÄ·ì϶£¬ÓÉÓÚ¹¥»÷Õß»áÀûÓÃÈκÎÕÒµ½µÄÈõµã¡£×êÑÐÖ¸³ö£¬·ì϶ÓÅÏȼ¶ÅÅÐò²»Ó¦½öÒÀÀµÑϳÁˮƽÆÀ·Ö£¬¹¥»÷Ç÷Ïò¿ÉÄÜѸ¿ìת±ä£¬Ôø±»ÒÔΪÎ޹ؽôÒªµÄ·ì϶¿ÉÄܳÉΪ¹¥»÷ý½é¡£Òò¶ø£¬VeritiÌṩÁË»ý¼«ÀûÓô˷ì϶µÄIPµØÖ·ÁÐ±í£¬½¨Ò鰲ȫÍŶӵ±¼´²é³IPS¡¢WAFºÍ·À»ðǽÅäÖ㬻ý¼«¼à¿ØÈÕÖ¾£¬²éÕÒÀ´×ÔÒѼø±ð¶ñÒâIPµØÖ·µÄ¹¥»÷³¢ÊÔ£¬²¢ÔÚ·çÏÕÖÎÀíÕ½ÊõÖÐÓÅÏÈÆÀ¹ÀÓëAIÓйصݲȫ·ì϶£¬ÒÔ¼õÇáÓëCVE-2024-27564ÓйصķçÏÕ¡£
https://hackread.com/hackers-exploit-chatgpt-cve-2024-27564-10000-attacks/
2. ΢Èí·¢ÏÖStilachiRATľÂí£ºÌӱܼì²âÇÔÈ¡Êý¾Ý
3ÔÂ17ÈÕ£¬Î¢Èí½üÆÚ·¢ÏÖÁËÒ»ÖÖÃûΪStilachiRATµÄÐÂÐÍÔ¶³Ì½Ó¼ûľÂí£¬¸Ã¶ñÒâÈí¼þѡȡ¸´ÔÓ¼¼ÊõÌӱܼì²â¡¢Î¬³ÖÓÆ¾ÃÐÔ²¢ÇÔÈ¡Ãô¸ÐÊý¾Ý£¬Ö»¹ÜÉÐδ¿í·º´«²¼£¬µ«Î¢ÈíÒѹ«¿ª·ÖÏíÈëÇÖÖ¸±ê»ººÍ½âÁìµ¼¡£StilachiRATÄÜ´Óä¯ÀÀÆ÷¡¢Êý×ÖÇ®°ü¡¢¼ôÌù°å¼°ÏµÍ³ÖÐÇÔÊØÐÅÏ¢£¬ÓµÓÐ׳´óµÄ¿úËÅÄÜÁ¦£¬ÈçÍøÂçϵͳӲ¼þÐÅÏ¢¡¢¼ì²âÉãÏñÍ·¼°RDP»á»°µÈ¡£Ëü»¹ÄÜͨ¹ýWindows APIÌáÈ¡ChromeÍ´´¦£¬¼à¿Ø¼ôÌù°åÖеÄÃô¸ÐÐÅÏ¢£¬²¢ÀûÓÃWindows·þÎñ½ÚÔìÖÎÀíÆ÷»ñµÃÓÆ¾ÃÐÔ¡£´Ë±í£¬StilachiRATÄܼÙÒâµÇ¼Óû§¼à¿ØRDP»á»°£¬ÊµÏÖÍøÂçÖеĺáÏòÒÆ¶¯¡£¸Ã¶ñÒâÈí¼þ»¹¾ß±¸¼ì²â¶ã±ÜºÍ·´È¡Ö¤Ö°ÄÜ£¬Èç¶Ï¸ùÊÂÎñÈÕÖ¾¡¢²é³É³ºÐ»·¾³µÈ¡£StilachiRAT¿É½ÓÊÜÀ´×ÔC2·þÎñÆ÷µÄºÅÁִÐгÁÆôϵͳ¡¢¶Ï¸ùÈÕÖ¾¡¢ÇÔȡʹ´¦µÈ²Ù×÷¡£ÎªÏ÷¼õ¹¥»÷Ãæ£¬Î¢Èí½¨Òé´Ó¹ÙÍøÏÂÔØÈí¼þ£¬²¢Ê¹Óð²È«Èí¼þ×èÖ¹¶ñÒâÓòºÍ¸½¼þ¡£
https://www.bleepingcomputer.com/news/security/microsoft-new-rat-malware-used-for-crypto-theft-reconnaissance/
3. LazarusºÚ¿ÍÊÔͼϴǮºóOKXÔÝÍ£ÁËDEX¾ÛºÏÆ÷
3ÔÂ17ÈÕ£¬³¯ÏÊ Lazarus ºÚ¿Í×éÖ¯½üÆÚÖ´ÐÐÁËһ·¼ÛÖµ15ÒÚÃÀÔªµÄ¼ÓÃÜÇ®±Ò͵ÇÔ°¸£¬ÕâÒ»ÊÂÎñÒýÆðÁË¿í·º¹Ø×¢¡£×÷ΪȫÇòµ±ÏȵļÓÃÜÇ®±ÒÂòÂôËùÖ®Ò»£¬OKX Ôڴ˲¼¾°Ï¾ö¶¨ÔÝÍ£ÆäÈ¥ÖÐÐÄ»¯ÂòÂôËù£¨DEX£©¾ÛºÏÆ÷·þÎñ£¬ÒÔ½øÐа²È«Éý¼¶¡£OKXÔÚÈ«ÇòÖÐÐÄ»¯ÂòÂôËùÏÖ»õÂòÂôÊг¡·Ý¶îÔ¼Õ¼8.0%£¬ÂòÂôÁ¿¾Þ´ó£¬Î»ÁÐÐÐҵǰÁС£Lazarus×éÖ¯ÊÔIJÀûÓÃOKXµÄDEX·þÎñϴ媱»µÁµÄ1ÒÚÃÀÔª¼ÓÃÜÇ®±Ò£¬´ËÊÂÉõÖÁÒý·¢ÁËÅ·Ã˼à¹Ü»ú¹¹µÄµ÷²é¡£Ö»¹ÜOKX·ñ¶¨ÁËÓйØÖ¸¿Ø£¬²¢Ö¸³öÒѶ³½áÁ÷ÈëÖÐÐÄ»¯ÂòÂôËùµÄÓйØ×ʽ𣬵«¹«Ë¾ÈÔ¾ö¶¨²ÉÈ¡Ðж¯£¬ÒÔÔ¤·À·þÎñ±»ÀÄÓá£OKXÔÚÓë¼à¹Ü»ú¹¹ÐÉ̺ó£¬×Ô¶¯ÔÝÍ£ÁËDEX¾ÛºÏÆ÷·þÎñ£¬²¢´òËãÍÆ³ö¼ø±ðºÍ×·×ÙºÚ¿ÍÓйصØÖ·µÄϵͳ£¬Í¬Ê±ÔÚÖÐÐÄ»¯ÂòÂôËùÉÏʵʱ¹Ø±ÕÕâЩµØÖ·¡£OKXÕýÓëÇø¿éÁ´Ë÷ÇóÕߺÏ×÷£¬ÒÔÈ·±£ÂòÂôµÃµ½ÕýÈ·ÏóÕ÷²¢Ìá¸ß°²È«ÐÔ¡£ÕâЩ´ëʩּÔÚ¼ÓÇ¿¼ÓÃÜÇ®±ÒÂòÂôƽ̨µÄ°²È«ÐÔ¡¢Í¨Ã÷¶ÈºÍ¼à¹ÜºÏ¹æÐÔ¡£È»¶ø£¬Ä¿Ç°Éв»Ã÷ÏÔLazarusÊÇ·ñÄÜÈÆ¹ýÕâЩ´ëÊ©£¬»òÕß³¯ÏʺڿÍÊÇ·ñ»áתÏòÆäËû°²È«³ß¶È½ÏµÍµÄÂòÂôËù¡£
https://www.bleepingcomputer.com/news/security/okx-suspends-dex-aggregator-after-lazarus-hackers-try-to-launder-funds/
4. tj-actionsÔ⹩¸øÁ´¹¥»÷£¬CI/CD»úÃÜй¶·çÏÕ¸ß
3ÔÂ17ÈÕ£¬¿í·ºÊ¹ÓõÄGitHub Action¡°tj-actions/changed-files¡±½üÆÚÔâ·êÁ˹©¸øÁ´¹¥»÷£¬µ¼ÖÂCI/CD»úÃÜ¿ÉÄÜ´ÓGitHub Actions¹¹½¨ÈÕÖ¾Öб»ÇÔÈ¡¡£¸Ã¹¤¾ßÔÊÐí¿ª·¢ÈËԱƾ¾ÝÀȡҪÇó»òÌá½»Öиü¸ÄµÄÎļþ²ÉÈ¡Ðж¯£¬³£ÓÃÓÚ²âÊÔ¡¢¹¤×÷Á÷³Ì´¥·¢¼°´úÂëÑéÖ¤¡£ÔÚ2025Äê3ÔÂ14ÈÕ£¬¹¥»÷Õßͨ¹ýÅú¸Ä¹¤¾ß´úÂë²¢Ïò¶à¸ö°æ±¾±êÇ©Ôö³¤¶ñÒâÌá½»£¬³É¹¦½«CI/CD»úÃÜ´ÓRunner Worker¹ý³Ìת´¢µ½Ê¹ÓøòÙ×÷µÄÈκÎÏîÖ÷ÕÅ´æ´¢¿âÖС£ÈôÊǹ¤×÷Á÷ÈÕÖ¾¿É¹«¿ª½Ó¼û£¬ÈκÎÈ˶¼Äܹ»¶ÁÈ¡ºÍÇÔÈ¡ÕâЩ¶³öµÄ»úÃÜ¡£¹¥»÷Õß»¹ÈëÇÖÁËÓµÓнӼû¸Ã¹¤¾ß´æ´¢¿âÌØÈ¨µÄGitHub»úеÈË(@tj-actions-bot)µÄÓ×ÎÒ½Ó¼ûÁîÅÆ(PAT)£¬µ«ÈëÇÖ·½Ê½Éв»Ã÷ÏÔ¡£GitHubËæºóɾ³ýÁ˱»ÈëÇֵIJÙ×÷£¬²¢¸´ÔÁË´æ´¢¿â£¬µ«¸Ã·ì϶¶ÔÊÜÓ°ÏìµÄÈí¼þÏîÄ¿²úÉúÁËÓÆ¾ÃÓ°Ï죬²¢±»·ÖÅäÁËÒ»¸öCVE ID£¨CVE-2025-30066£©ÒÔ±ã¸ú×Ù¡£¶ñÒâ´úÂ벢佫ÄÚ´æÊä³öй¶µ½Ô¶³Ì·þÎñÆ÷£¬¶øÊÇʹÆäÔڿɹ«¿ª½Ó¼ûµÄ´æ´¢¿âÖпɼû¡£ÎªÁËÔ¤·ÀÀàËÆÐ¹Â¶£¬tj-actions´æ´¢¿â½øÐÐÁ˸üУ¬ÌṩÁËÊÜÓ°ÏìÓû§±ØÒªÖ´ÐеIJÙ×÷×¢Ã÷£¬GitHubÒ²½¨Ò齫ËùÓÐGitHub Actions pingµ½Ìض¨µÄÌá½»¹þÏ£¶ø²»Êǰ汾±êÇ©£¬²¢Ê¹ÓÃÔÊÐíÁбíÖ°ÄÜÀ´×èֹδ¾ÊÚȨ/²»ÊÜÐÅÀµµÄGitHub Actions¡£
https://www.bleepingcomputer.com/news/security/supply-chain-attack-on-popular-github-action-exposes-ci-cd-secrets/
5. ÐÂÐͼÓÃÜÍÚ¾ò»î¶¯ÀûÓÃÃýÎóÅäÖÃJupyter Notebook¹¥»÷
3ÔÂ15ÈÕ£¬½üÆÚ£¬Ò»ÖÖÐÂÐͼÓÃÜÍÚ¾ò»î¶¯±»·¢ÏÖ£¬¸Ã»î¶¯ÀûÓÃÃýÎóÅäÖõÄJupyter NotebooksÕë¶ÔWindowsºÍLinuxϵͳ¡£¹¥»÷Õßͨ¹ý¶³öµÄJupyter NotebookÊ·ýÖ´ÐкÅÁ³¢ÊÔ×°ÖöñÒâÈí¼þ¡£¶ÔÓÚWindowsϵͳ£¬¹¥»÷»áÏÂÔØÒ»¸öÔ̺¬ÃûΪ¡°Binary.freedllbinary¡±µÄ64λ¿ÉÖ´ÐÐÎļþµÄMSI×°Ö÷¨Ê½£¬¸ÃÖ´ÐÐÎļþ»á¼ÓÔØÃûΪ¡°java.exe¡±µÄ¸¨ÖúÓÐЧ¸ºÔØ£¬ÏÖʵÉÏÊÇÒ»¸öʹÓÃUPX´ò°üµÄ¶ñÒâ¶þ½øÔìÎļþ£¬ÓÃÓÚ´Ó¶à¸ö´æ´¢¿âÖмìË÷ÃûΪ¡°x2.dat¡±µÄ¼ÓÃÜblob¡£¶ÔÓÚLinuxϵͳ£¬¹¥»÷»áÏÂÔØÒ»¸öbash¾ç±¾£¬¸Ã¾ç±¾»á¼ìË÷Á½¸öELF¶þ½øÔìÎļþ²¢ÉèÖÃcronjobsÒÔÈ·Î¬ÓÆ¾ÃÐÔ¡£¹¥»÷Õßѡȡ¸´ÔӵļÓÃܼ¼Êõ°µ²ØÆäÓÐÐ§ÔØºÉ£¬Ö¸±êÔ̺¬Monero¡¢Sumokoin¡¢ArQmaµÈ¶àÖÖ¼ÓÃÜÇ®±Ò¡£Cado°²È«³¢ÊÔÊÒÖ¸³ö£¬Õâ´Î»î¶¯´ú±íÁËÒ»ÖÖÒÔǰ´Óδ±¨Â·¹ýµÄ¼ÓÃÜÍÚ¾ò¹¥»÷µÄÐÂÔØÌå¡£×éÖ¯Ó¦Ö´ÐÐÇ¿Éí·ÝÑéÖ¤£¬½ûÓöÔJupyterÊ·ýµÄ¹«¹²½Ó¼û£¬²¢¶¨ÆÚ¼à¿ØÔÆ»·¾³ÖеÄÒì³£»î¶¯£¬ÒÔ¼õÇáÕâЩ¹¥»÷¡£
https://cybersecuritynews.com/hackers-attacking-exposed-jupyter-notebooks/
6. Apache Tomcat RCE·ì϶£¨CVE-2025-24813£©±»»ý¼«ÀûÓÃ
3ÔÂ17ÈÕ£¬Apache TomcatÖдæÔÚÒ»¸öÑϳÁµÄÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©·ì϶£¨CVE-2025-24813£©£¬¹¥»÷Õß¿Éͨ¹ýµ¥Ò»µÄPUTÒªÇóÊÕÊÜ·þÎñÆ÷¡£·ì϶Åû¶½ö30Ó×ʱºó£¬GitHubÉϾͰ䲼Á˸ÅÏëÑéÖ¤£¨PoC£©·ì϶£¬ºÚ¿ÍÒÑÆðÍ·ÀûÓø÷ì϶¡£Wallarm°²È«×êÑÐÈËԱ֤ʵ£¬ÓÉÓÚPUTÒªÇó¿´ËÆÕý³£ÇÒ¶ñÒâÄÚÈÝʹÓÃbase64±àÂë»ìºÏ£¬´«Í³°²È«¹¤¾ßÄÑÒÔ¼ì²â¡£¹¥»÷Õß·¢ËÍÔ̺¬base64±àÂëÐòÁл¯JavaÓÐЧ¸ºÔصÄPUTÒªÇó±£Áôµ½Tomcat»á»°´æ´¢ÖУ¬ÔÙ·¢ËÍ´øÓÐÖ¸Ïò»á»°ÎļþµÄJSESSIONID cookieµÄGETÒªÇ󣬯ÈʹTomcat·´ÐòÁл¯²¢Ö´ÐжñÒâ´úÂ룬ÎÞÐèÉí·ÝÑéÖ¤¡£¸Ã·ì϶ÓÉÓÚTomcat½ÓÊܲ¿ÃÅPUTÒªÇó¼°Ä¬ÈÏ»á»°ÓÆ¾ÃÐÔÒýÆð£¬Ó°Ïì¶à¸öTomcat°æ±¾¡£ApacheÒѰ䲼²¹¶¡£¬½¨ÒéÓû§Éý¼¶ÖÁÒѽ¨²¹°æ±¾£¬²¢Í¨¹ý¸´ÔĬÈÏservletÅäÖᢹعز¿ÃÅPUTÖ§³Ö¼°Ô¤·À½«°²È«Ãô¸ÐÎļþ´æ´¢ÔÚ¹«¹²ÉÏ´«õè¾¶µÄ×ÓĿ¼ÖÐÀ´»º½âÎÊÌâ¡£WallarmÖҸ棬¹¥»÷Õß½«×ª±äÕ½Êõ£¬ÉÏ´«¶ñÒâJSPÎļþ¡¢Åú¸ÄÅäÖò¢ÔڻỰ´æ´¢Ö®±íÖ²ÈëºóÃÅ£¬ÕâÖ»ÊǵÚÒ»²¨¹¥»÷¡£
https://www.bleepingcomputer.com/news/security/critical-rce-flaw-in-apache-tomcat-actively-exploited-in-attacks/


¾©¹«Íø°²±¸11010802024551ºÅ