CrossBarking¹¥»÷£ºOperaä¯ÀÀÆ÷˽ÓÐAPIÔâЮÖÆ
Ðû²¼Ê±¼ä 2024-11-011. CrossBarking¹¥»÷£ºOperaä¯ÀÀÆ÷˽ÓÐAPIÔâЮÖÆ
10ÔÂ30ÈÕ£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖеÄä¯ÀÀÆ÷¹¥»÷·½·¨£¬Í¨¹ýʹÓÃÏÖÒÑÐÞ¸´µÄÎó²î£¬½«×Ô½ç˵´úÂë×¢ÈëÊܺ¦ÕßµÄ Opera ä¯ÀÀÆ÷£¬´Ó¶ø¿ØÖÆÆ䡰˽ÓС±Ó¦ÓóÌÐò±à³Ì½Ó¿Ú (API)£¬ÕâЩ API ͨ³£½öΪ×îÊÜÐÅÍеÄÍøÕ¾±£´æ¡£ÕâЩ˽ÓÐ API ¿ÉΪ¿ª·¢Ö°Ô±ÌṩÌØÊâȨÏÞ£¬µ«Ò²¿ÉÄܱ»ºÚ¿ÍʹÓã¬ÒÔ»ñµÃ¶Ôä¯ÀÀÆ÷µÄȫȨ¿ØÖÆ£¬°üÀ¨¸ü¸ÄÉèÖá¢Ð®ÖÆÕË»§¡¢½ûÓÃÇå¾²À©Õ¹µÈ¡£ÎªÁËչʾÕâÖÖ¹¥»÷·½·¨£¬Guardio Ñо¿Ö°Ô±¿ª·¢ÁËÒ»¸ö¶ñÒâµÄ Chrome À©Õ¹³ÌÐò£¬¸ÃÀ©Õ¹³ÌÐò±»Éè¼ÆΪÔÚ¾ßÓÐ˽ÓÐ API »á¼ûȨÏÞµÄÍøÕ¾ÇéÐÎÖÐÔËÐжñÒâ´úÂë¡£ËûÃÇͨ¹ý¸ÃÀ©Õ¹³ÌÐò£¬½«¶ñÒâ´úÂë×¢Èëµ½ Opera ä¯ÀÀÆ÷ÖУ¬²¢Ê¹Óà settingsPrivate API ¸ü¸ÄÁËÊܺ¦ÕßµÄÓòÃûϵͳ (DNS) ÉèÖ㬴ӶøÖÜÈ«Éó²éºÍʹÓÃÆää¯ÀÀÔ˶¯¡£ÎªÏàʶ¾öÕâ¸öÎÊÌ⣬Opera ½ÓÄÉÁË Chrome ÖÐÒѾʵÏÖµÄÒ»ÖÖ¿ìËÙ½â¾ö¼Æ»®£º×èÖ¹ÈκÎÀ©Õ¹³ÌÐòÔÚ¾ßÓÐ˽ÓÐ API »á¼ûȨÏÞµÄÓòÉÏÔËÐо籾µÄÄÜÁ¦¡£
https://www.darkreading.com/vulnerabilities-threats/crossbarking-attack-secret-apis-expose-opera-browser-users
2. ÍøÂç´¹ÂÚµç×ÓÓʼþÃé׼ѧÉú´û¿î³ÖÓÐÈË
10ÔÂ30ÈÕ£¬½ü4300ÍòÃÀ¹úÈ˱³¸º×Åƽ¾ùÿÈË37,000ÃÀÔªµÄѧÉú´û¿îÕ®Îñ¡£°ÝµÇ×ÜͳÔøÌá³öÒ»ÏîÖ¼ÔÚÃâÈ¥²¿·ÖÆò´ûÈËÕ®ÎñµÄÍýÏ룬µ«¸ÃÍýÏëÃæÁÙÖØÖØÕÏ°¡£ÔÚ´ËÅä¾°Ï£¬ÍøÂç·¸·¨·Ö×ӳûúÕë¶ÔѧÉú´û¿î³ÖÓÐÈËÌᳫÍøÂç´¹ÂÚ¹¥»÷¡£Harmony Email & CollaborationµÄÍøÂçÇå¾²²¿·Ö·¢Ã÷£¬ÕâÀ๥»÷ÔÚÒÑÍùÁ½ÖÜÄÚ¼¤Ôö£¬ÇÒ¹¥»÷ÕßʹÓÃÁËÌØÊâµÄÎı¾»ìÏýÊÖÒÕ£¬ÈçUnicode´Ó×óµ½ÓÒ±ê¼Ç (LRM) ºÍÈíÁ¬×Ö·û£¬ÒÔ¹æ±Ü×ÔÈ»ÓïÑÔ´¦Öóͷ£¼ì²âÆ÷µÄ¼ì²â¡£ÕâЩÓʼþÄÚÈÝ¿´ËƽôÆÈÇÒ¿ÉÐÅ£¬ÊµÔòÖ¼ÔÚÓÕÆÊܺ¦Õßй¶Ãô¸ÐÐÅÏ¢¡£´ËÀ๥»÷²»µ«ÍþвСÎÒ˽¼ÒÐÅÏ¢Çå¾²£¬»¹¿ÉÄܶÔÆóÒµ×é³ÉΣº¦¡£Ô±¹¤ÈôÔÚ¹«Ë¾×°±¸ÉÏ´¦Öóͷ£ÕâЩÓʼþ£¬¿ÉÄܵ¼Ö¶ñÒâÈí¼þÈëÇÖ¹«Ë¾ÏµÍ³£¬½ø¶øÒý·¢Êý¾Ý鶻òÓªÒµÐÅÏ¢Íâй¡£Òò´Ë£¬ÆóÒµÐè½ÓÄÉÇÐʵ¿ÉÐеIJ½·¥À´Ìá·À´ËÀ๥»÷£¬°üÀ¨Ìá¸ßÔ±¹¤Çå¾²Òâʶ¡¢Ê¹ÓÃÏȽøµÄµç×ÓÓʼþ¹ýÂ˺ÍÇå¾²¹¤¾ß¡¢ÊµÑé¶àÒòËØÉí·ÝÑéÖ¤ÒÔ¼°Öƶ©ÍêÉƵÄÊÂÎñÏìÓ¦ÍýÏë¡£
https://blog.checkpoint.com/harmony-email/7500-phishing-emails-use-interesting-obfuscation-method-to-target-student-loan-holders/
3. LottieFiles npm°üÏÖ¶ñÒâ´úÂ룬Óû§Ðè½ôÆÈÉý¼¶
10ÔÂ31ÈÕ£¬LottieFiles ×òÈÕÐû²¼£¬Æä npm °üÖеÄÌض¨°æ±¾£¬¼´ Lottie Web Player£¨¡°lottie-player¡±£©µÄ 2.0.5¡¢2.0.6 ºÍ 2.0.7 °æ±¾£¬±»·¢Ã÷Я´ø¶ñÒâ´úÂë¡£ÕâЩ°æ±¾»áÌáÐÑÓû§ÅþÁ¬¼ÓÃÜÇ®±ÒÇ®°ü£¬ÒâͼÇå¿ÕÇ®°üÖеÄ×ʲú¡£·¢Ã÷ÎÊÌâºó£¬LottieFiles ѸËÙÐû²¼ÁË´¿¾»µÄ 2.0.8 °æ±¾£¬½¨ÒéÓû§¾¡¿ìÉý¼¶ÒÔ×èֹΣº¦¡£Í¬Ê±£¬LottieFiles Ö¸³ö£¬Í¨¹ýµÚÈý·½ CDN ʹÓøÿâÇÒδÀο¿°æ±¾µÄÓû§»á×Ô¶¯ÊÕµ½ÊÜËð°æ±¾£¬µ«Ëæ×ÅÇå¾²°æ±¾µÄÐû²¼£¬ÕâЩÓû§½«×Ô¶¯ÊÕµ½ÐÞ¸´¡£¹ØÓÚÎÞ·¨Éý¼¶µÄÓû§£¬LottieFiles ½¨ÒéÏò×îÖÕÓû§×ª´ïΣº¦£¬²¢ÖÒÑÔËûÃÇÓйØÚ²ÆÐÔ¼ÓÃÜÇ®±ÒÇ®°üÅþÁ¬ÇëÇ󣬻ò¼ÌÐøʹÓÃδÊÜÓ°ÏìµÄ 2.0.4 °æ±¾¡£±ðµÄ£¬LottieFiles Ðû²¼Í¨¸æ³Æ£¬´Ë´ÎÊÂÎñ½öÓ°ÏìÆä npm °ü£¬²»Ó°ÏìÆä SaaS ·þÎñ£¬²¢È·ÈÏÆäËû¿ªÔ´¿â¡¢´úÂëºÍ´æ´¢¿â¾ùδÊÜÓ°Ïì¡£¸Ãƽ̨ÒÑ°þ¶á¸Ä¶¯°æ±¾ÉÏ´«ÕßµÄ npm ÕÊ»§»á¼ûȨÏÞ£¬²¢×÷·ÏÏà¹ØÁîÅÆ£¬Í¬Ê±¼ÌÐø¶Ô´Ë´ÎÈëÇÖÊÂÎñ¾ÙÐÐÄÚ²¿ÊӲ졣ÏÖÔÚÉв»ÇåÎú¸ÃÊÂÎñÊÇ·ñÓÐÊܺ¦ÕßÒÔ¼°ÏêϸËðʧ½ð¶î¡£
https://www.bleepingcomputer.com/news/security/lottiefiles-hit-in-npm-supply-chain-attack-targeting-users-crypto/
4. PTZOpticsÉãÏñ»úÏÖÁãÈÕÎó²î£¬ºÚ¿ÍÊÔͼʹÓÃÌᳫ¹¥»÷
10ÔÂ31ÈÕ£¬ºÚ¿ÍÕýÔÚʹÓÃPTZOpticsÔÆ̨±ä½¹ÊµÊ±Á÷ýÌåÉãÏñ»úÖеÄÁ½¸öз¢Ã÷µÄÁãÈÕÎó²îCVE-2024-8956ºÍCVE-2024-8957¡£ÕâЩÎó²îÓÚ2024Äê4Ô±»GreyNoiseµÄSift¹¤¾ßÔÚÆäÃÛ¹ÞÍøÂçÉϼì²âµ½¡£CVE-2024-8956Éæ¼°ÉãÏñ»ú¡°lighthttpd¡±ÍøÂç·þÎñÆ÷ÖеÄÈõÉí·ÝÑéÖ¤ÎÊÌ⣬ÔÊÐíδ¾ÊÚȨµÄÓû§»á¼ûCGI API£¬Ì»Â¶Ãô¸ÐÐÅÏ¢¡£¶øCVE-2024-8957ÔòÊÇÓÉÓÚ¡°ntp_client¡±¶þ½øÖÆÎļþÖеÄÊäÈëÕûÀíȱ·¦£¬ÔÊÐíÔ¶³Ì´úÂëÖ´ÐС£ÕâÁ½¸öÎó²î¿ÉÄܵ¼ÖÂÉãÏñÍ·±»ÍêÈ«½ÓÊÜ¡¢Ñ¬È¾¶ñÒâÈí¼þ¡¢¹¥»÷ͳһÍøÂçµÄÆäËû×°±¸»òÖÐÖ¹ÊÓƵÁ÷¡£Ö»¹Ü³õʼ¹¥»÷Ô˶¯ÔÚ·¢Ã÷ºó²»¾ÃÏûÊÅ£¬µ«6Ô·ºÆðÁËʹÓÃwgetÏÂÔØshell¾ç±¾¾ÙÐз´Ïò»á¼ûµÄʵÑé¡£GreyNoiseÒÑÏòÊÜÓ°Ï칩ӦÉ̾ÙÐÐÈÏÕæÈεÄÅû¶£¬PTZOpticsµÈ³§ÉÌÒÑÐû²¼Çå¾²¸üУ¬µ«²¿·Ö¾ÉÐͺźÍз¢Ã÷µÄÊÜÓ°ÏìÐͺÅÉÐδÊÕµ½²¹¶¡¡£GreyNoiseÒÔΪ¿ÉÄÜÓиüÆÕ±éµÄ×°±¸Êܵ½Ó°Ï죬½¨ÒéÓû§×Éѯװ±¸¹©Ó¦ÉÌÏàʶ×îй̼þ¸üÐÂÇéÐΡ£
https://www.bleepingcomputer.com/news/security/hackers-target-critical-zero-day-vulnerability-in-ptz-cameras/
5. ÒÉËÆÎÚ¿ËÀ¼ÍøÂç¹¥»÷µ¼ÖÂÌØά¶ûÍ£³µÏµÍ³Ì±»¾
10ÔÂ31ÈÕ£¬¶íÂÞ˹Î÷±±²¿¶¼»áÌØά¶ûµÄסÃñÒòÕþ¸®Ëù³ÆµÄÊý×ÖÍ£³µÖ§¸¶ÏµÍ³¡°ÊÖÒÕ¹ÊÕÏ¡±¶øµÃÒÔÃâ·ÑÍ£³µ½üÁ½Ì졣Ȼ¶ø£¬Ò»¸öÃûΪ¡°ÎÚ¿ËÀ¼ÍøÂçͬÃË¡±µÄºÚ¿Í×éÖ¯Éù³ÆÕâ¿ÉÄÜÊÇÕë¶Ô¸ÃÊÐÖÎÀíÍøÂçµÄÍøÂç¹¥»÷ËùÖ£¬²¢Éù³Æ´Ý»ÙÁËÊýʮ̨ÐéÄâ»ú¡¢±¸·Ý´æ´¢¡¢ÍøÕ¾¡¢µç×ÓÓʼþºÍÊý°Ù¸öÊÂÇéÕ¾¡£ÌØά¶ûÊÐÕþ¸®×î³õδ¶Ô´Ë½ÒÏþ̸ÂÛ£¬µ«Ëæºó½ÒÏþÉùÃ÷³ÆÍøÕ¾ºÍÔÚÏßÍ£³µÖ§¸¶Æ½Ì¨ÕýÔÚ¾ÙÐÐÊÖÒÕάÐÞ¡£ÍâµØסÃñÔÚʵÑ鸶¿îʱÓöµ½¹ýʧÐÂÎÅ»òÓ¦ÓóÌÐò¼ÓÔØʧ°Ü¡£ÊÐÕþ¸®¹ÙÔ±ØʺóÐû²¼Í£³µ¸¶·Ñ·þÎñÒѻָ´£¬µ«Î´È·ÈÏÊÇ·ñ±¬·¢ÁËÍøÂç¹¥»÷¡£Õâ²¢·ÇÇ×ÎÚ¿ËÀ¼ºÚ¿ÍÊ×´ÎÉù³Æ¶Ô¶íÂÞ˹·þÎñÌᳫ¹¥»÷£¬´ËÇ°Ò²ÓÐÀàËÆÊÂÎñ±»¹é×ïΪ¡°ÊÖÒÕ¹ÊÕÏ¡±¡£ÎÚ¿ËÀ¼ÍøÂçͬÃËÊÇÒ»¸öÇ×ÎÚ¿ËÀ¼ÍøÂç»î¸ÐÈËÊ¿ÕûÌ壬×Ô¶íÂÞ˹ÈëÇÖÎÚ¿ËÀ¼ÒÔÀ´Æð¾¢¼ÓÈë·´¶í¶·Õù£¬²¢ÔøÉù³ÆÈëÇÖ¶íÂÞ˹¹ú¼ÒÐÅÓÿ¨Ö§¸¶ÏµÍ³µÈÐж¯¡£
https://therecord.media/ukraine-cyberattack-russia-parking-tver
6. Phish n' ShipsÍøÂç´¹ÂÚÔ˶¯Ñ¬È¾Ç§¼ÒÍøµê
10ÔÂ31ÈÕ£¬Ò»ÏîÃûΪ¡°Phish n' Ships¡±µÄÍøÂç´¹ÂÚÔ˶¯×Ô2019ÄêÆð£¬ÒÑѬȾÁè¼Ýһǧ¼ÒÕýµ±ÔÚÏßÊÐËÁ£¬Í¨¹ýÍƹãÐéαÉÌÆ·ÁбíÚ²ÆÊýÊ®ÍòÏûºÄÕߣ¬Ôì³ÉÊýÍòÍòÃÀÔªËðʧ¡£¸ÃÔ˶¯Ê¹ÓÃÎó²î¡¢¹ýʧÉèÖûòÊÜËðÖÎÀíԱƾ֤ÈëÇÖÍøÕ¾£¬ÉÏ´«¶ñÒâ¾ç±¾ºÍÐéα²úÆ·ÁÐ±í£¬Ê¹ÓÃSEOÓÅ»¯ÎüÒýÊܺ¦Õß¡£Êܺ¦Õßµã»÷Á´½Óºó±»Öض¨ÏòÖÁ¼ÙÊÐËÁ£¬ÂÄÀúÐéα½áÕËÁ÷³Ì²¢ÊäÈëСÎÒ˽¼ÒÐÅÏ¢ºÍÐÅÓÿ¨ÏêÇ飬µ«¹ºÖõÄÎïÆ·´ÓδËÍ´ï¡£SatoriÍþвÇ鱨ÍŶӷ¢Ã÷ËùÓмÙÊÐËÁÅþÁ¬ÖÁÒ»¸öÓÉ14¸öIPµØµã×é³ÉµÄÍøÂ磬²¢ÀÄÓöà¼ÒÖ§¸¶ÌṩÉÌÌ×ÏÖ¡£HUMAN¼°ÆäÏàÖúͬ°éÒÑе÷»ØÓ¦£¬Í¨ÖªÊÜÓ°Ïì×éÖ¯²¢ÏòGoogle±¨¸æÐéαÁÐ±í£¬´ó´ó¶¼¶ñÒâËÑË÷Ч¹ûÒѱ»ÕûÀí£¬µ«ÍþвÐÐΪÕß¿ÉÄÜ»áʵÑ齨ÉèеÄÚ²ÆÍøÂç¡£½¨ÒéÏûºÄÕß×¢Öز»Ñ°³£Öض¨Ïò£¬È·ÈÏÊÐËÁÍøÖ·£¬²¢±¨¸æÚ²ÆÐÔÊÕ·Ñ¡£
https://www.bleepingcomputer.com/news/security/over-a-thousand-online-shops-hacked-to-show-fake-product-listings/