CVE-2024-27564Îó²î£ºChatGPT»ù´¡ÉèÊ©ÃæÁÙSSRF¹¥»÷Íþв

Ðû²¼Ê±¼ä 2025-03-18

1. CVE-2024-27564Îó²î£ºChatGPT»ù´¡ÉèÊ©ÃæÁÙSSRF¹¥»÷Íþв


3ÔÂ17ÈÕ£¬ÍøÂçÇå¾²¹«Ë¾VeritiÔÚÆä×îÐÂÑо¿±¨¸æÖÐÕ¹ÏÖÁËOpenAIµÄChatGPT»ù´¡ÉèÊ©Öб£´æµÄÒ»¸ö·þÎñÆ÷¶ËÇëÇóαÔ죨SSRF£©Îó²î£¬¼´CVE-2024-27564£¬Ö»¹Ü¸ÃÎó²î±»¹éΪÖеÈÑÏÖØË®Æ½£¬µ«ÔÚÏÖʵÌìÏÂÖÐÒѱ»Æð¾¢Ê¹Óá£Veriti·¢Ã÷£¬Ò»ÖÜÄÚ¾ÍÓÐ10,479´Î¹¥»÷ʵÑéÔ´×Ôͳһ¶ñÒâIPµØµã¡£±ðµÄ£¬35%µÄ×éÖ¯ÒòÇ徲ϵͳÉèÖùýʧ¶øÎ´ÄÜ»ñµÃ³ä·Ö±£»¤£¬ÆäÖÐÃÀ¹úÔâÊܵĹ¥»÷×îΪ¼¯ÖУ¬Õ¼±È33%£¬Æä´ÎÊǵ¹úºÍÌ©¹ú£¬¾ùΪ7%¡£¹¥»÷Ô˶¯ÔÚ1Ô·ݼ¤Ôö£¬ËæºóÓÐËùϽµ¡£½ðÈÚÐÐÒµ³ÉΪÖ÷Òª¹¥»÷Ä¿µÄ£¬ÒòÆäÑÏÖØÒÀÀµAI·þÎñºÍAPI¼¯³É£¬Ò×ÊÜSSRF¹¥»÷Íþв£¬¿ÉÄܵ¼ÖÂÊý¾Ýй¶¡¢Î´¾­ÊÚȨµÄÉúÒâ¡¢î¿Ïµ´¦·ÖºÍÉùÓþË𺦡£VeritiÇ¿µ÷£¬²»Ó¦ºöÊÓÖеÈÑÏÖØË®Æ½µÄÎó²î£¬ÓÉÓÚ¹¥»÷Õß»áʹÓÃÈκÎÕÒµ½µÄÈõµã¡£Ñо¿Ö¸³ö£¬Îó²îÓÅÏȼ¶ÅÅÐò²»Ó¦½öÒÀÀµÑÏÖØË®Æ½ÆÀ·Ö£¬¹¥»÷Ç÷ÊÆ¿ÉÄÜѸËÙת±ä£¬Ôø±»ÒÔΪÎ޹ؽôÒªµÄÎó²î¿ÉÄܳÉΪ¹¥»÷ǰÑÔ¡£Òò´Ë£¬VeritiÌṩÁËÆð¾¢Ê¹ÓôËÎó²îµÄIPµØµãÁбí£¬½¨ÒéÇå¾²ÍŶÓÁ¬Ã¦¼ì²éIPS¡¢WAFºÍ·À»ðǽÉèÖã¬Æð¾¢¼à¿ØÈÕÖ¾£¬²éÕÒÀ´×ÔÒÑʶ±ð¶ñÒâIPµØµãµÄ¹¥»÷ʵÑ飬²¢ÔÚΣº¦ÖÎÀíÕ½ÂÔÖÐÓÅÏÈÆÀ¹ÀÓëAIÏà¹ØµÄÇå¾²Îó²î£¬ÒÔ¼õÇáÓëCVE-2024-27564Ïà¹ØµÄΣº¦¡£


https://hackread.com/hackers-exploit-chatgpt-cve-2024-27564-10000-attacks/


2. ΢Èí·¢Ã÷StilachiRATľÂí£ºÌӱܼì²âÇÔÈ¡Êý¾Ý


3ÔÂ17ÈÕ£¬Î¢Èí½üÆÚ·¢Ã÷ÁËÒ»ÖÖÃûΪStilachiRATµÄÐÂÐÍÔ¶³Ì»á¼ûľÂí£¬¸Ã¶ñÒâÈí¼þ½ÓÄÉÖØ´óÊÖÒÕÌӱܼì²â¡¢¼á³Ö³¤ÆÚÐÔ²¢ÇÔÈ¡Ãô¸ÐÊý¾Ý£¬Ö»¹ÜÉÐδÆÕ±éÈö²¥£¬µ«Î¢ÈíÒѹûÕæ·ÖÏíÈëÇÖÖ¸±ê»ººÍ½âÖ¸µ¼¡£StilachiRATÄÜ´Óä¯ÀÀÆ÷¡¢Êý×ÖÇ®°ü¡¢¼ôÌù°å¼°ÏµÍ³ÖÐÇÔÊØÐÅÏ¢£¬¾ßÓÐǿʢµÄÕì̽ÄÜÁ¦£¬ÈçÍøÂçϵͳӲ¼þÐÅÏ¢¡¢¼ì²âÉãÏñÍ·¼°RDP»á»°µÈ¡£Ëü»¹ÄÜͨ¹ýWindows APIÌáÈ¡Chromeƾ֤£¬¼à¿Ø¼ôÌù°åÖеÄÃô¸ÐÐÅÏ¢£¬²¢Ê¹ÓÃWindows·þÎñ¿ØÖÆÖÎÀíÆ÷»ñµÃ³¤ÆÚÐÔ¡£±ðµÄ£¬StilachiRATÄÜð³äµÇÈÎÃü»§¼à¿ØRDP»á»°£¬ÊµÏÖÍøÂçÖеĺáÏòÒÆ¶¯¡£¸Ã¶ñÒâÈí¼þ»¹¾ß±¸¼ì²â¹æ±ÜºÍ·´È¡Ö¤¹¦Ð§£¬Èçɨ³ýÊÂÎñÈÕÖ¾¡¢¼ì²éɳºÐÇéÐεÈ¡£StilachiRAT¿É½ÓÊÜÀ´×ÔC2·þÎñÆ÷µÄÏÂÁִÐÐÖØÆôϵͳ¡¢É¨³ýÈÕÖ¾¡¢ÇÔȡƾ֤µÈ²Ù×÷¡£ÎªïÔÌ­¹¥»÷Ãæ£¬Î¢Èí½¨Òé´Ó¹ÙÍøÏÂÔØÈí¼þ£¬²¢Ê¹ÓÃÇå¾²Èí¼þ×èÖ¹¶ñÒâÓòºÍ¸½¼þ¡£


https://www.bleepingcomputer.com/news/security/microsoft-new-rat-malware-used-for-crypto-theft-reconnaissance/


3. LazarusºÚ¿ÍÊÔͼϴǮºóOKXÔÝÍ£ÁËDEX¾ÛºÏÆ÷


3ÔÂ17ÈÕ£¬³¯ÏÊ Lazarus ºÚ¿Í×éÖ¯½üÆÚʵÑéÁËÒ»Æð¼ÛÖµ15ÒÚÃÀÔªµÄ¼ÓÃÜÇ®±Ò͵ÇÔ°¸£¬ÕâÒ»ÊÂÎñÒýÆðÁËÆÕ±é¹Ø×¢¡£×÷ΪȫÇòÁìÏȵļÓÃÜÇ®±ÒÉúÒâËùÖ®Ò»£¬OKX ÔÚ´ËÅ侰ϾöÒéÔÝÍ£ÆäÈ¥ÖÐÐÄ»¯ÉúÒâËù£¨DEX£©¾ÛºÏÆ÷·þÎñ£¬ÒÔ¾ÙÐÐÇå¾²Éý¼¶¡£OKXÔÚÈ«ÇòÖÐÐÄ»¯ÉúÒâËùÏÖ»õÉúÒâÊг¡·Ý¶îÔ¼Õ¼8.0%£¬ÉúÒâÁ¿ÖØ´ó£¬Î»ÁÐÐÐҵǰÏß¡£Lazarus×éÖ¯ÊÔͼʹÓÃOKXµÄDEX·þÎñϴ媱»µÁµÄ1ÒÚÃÀÔª¼ÓÃÜÇ®±Ò£¬´ËÊÂÉõÖÁÒý·¢ÁËÅ·ÃËî¿Ïµ»ú¹¹µÄÊӲ졣ֻ¹ÜOKX·ñ¶¨ÁËÏà¹ØÖ¸¿Ø£¬²¢Ö¸³öÒѶ³½áÁ÷ÈëÖÐÐÄ»¯ÉúÒâËùµÄÏà¹Ø×ʽ𣬵«¹«Ë¾ÈÔ¾öÒé½ÓÄÉÐж¯£¬ÒÔ±ÜÃâ·þÎñ±»ÀÄÓá£OKXÔÚÓëî¿Ïµ»ú¹¹Ð­É̺ó£¬×Ô¶¯ÔÝÍ£ÁËDEX¾ÛºÏÆ÷·þÎñ£¬²¢ÍýÏëÍÆ³öʶ±ðºÍ×·×ÙºÚ¿ÍÏà¹ØµØµãµÄϵͳ£¬Í¬Ê±ÔÚÖÐÐÄ»¯ÉúÒâËùÉÏʵʱ·â±ÕÕâЩµØµã¡£OKXÕýÓëÇø¿éÁ´Ì½Ë÷ÕßÏàÖú£¬ÒÔÈ·±£ÉúÒâ»ñµÃ׼ȷ±ê¼Ç²¢Ìá¸ßÇå¾²ÐÔ¡£ÕâЩ²½·¥Ö¼ÔÚÔöÇ¿¼ÓÃÜÇ®±ÒÉúÒâÆ½Ì¨µÄÇå¾²ÐÔ¡¢Í¸Ã÷¶ÈºÍî¿ÏµºÏ¹æÐÔ¡£È»¶ø£¬ÏÖÔÚÉв»ÇåÎúLazarusÊÇ·ñÄÜÈÆ¹ýÕâЩ²½·¥£¬»òÕß³¯ÏʺڿÍÊÇ·ñ»áתÏòÆäËûÇå¾²±ê×¼½ÏµÍµÄÉúÒâËù¡£


https://www.bleepingcomputer.com/news/security/okx-suspends-dex-aggregator-after-lazarus-hackers-try-to-launder-funds/


4. tj-actionsÔ⹩ӦÁ´¹¥»÷£¬CI/CDÉñÃØÐ¹Â¶Î£º¦¸ß


3ÔÂ17ÈÕ£¬ÆÕ±éʹÓõÄGitHub Action¡°tj-actions/changed-files¡±½üÆÚÔâÊÜÁ˹©Ó¦Á´¹¥»÷£¬µ¼ÖÂCI/CDÉñÃØ¿ÉÄÜ´ÓGitHub Actions¹¹½¨ÈÕÖ¾Öб»ÇÔÈ¡¡£¸Ã¹¤¾ßÔÊÐí¿ª·¢Ö°Ô±Æ¾Ö¤À­È¡ÇëÇó»òÌá½»Öиü¸ÄµÄÎļþ½ÓÄÉÐж¯£¬³£ÓÃÓÚ²âÊÔ¡¢ÊÂÇéÁ÷³Ì´¥·¢¼°´úÂëÑéÖ¤¡£ÔÚ2025Äê3ÔÂ14ÈÕ£¬¹¥»÷Õßͨ¹ýÐ޸Ť¾ß´úÂë²¢Ïò¶à¸ö°æ±¾±êÇ©Ìí¼Ó¶ñÒâÌá½»£¬Àֳɽ«CI/CDÉñÃØ´ÓRunner WorkerÀú³Ìת´¢µ½Ê¹ÓøòÙ×÷µÄÈκÎÏîÄ¿µÄ´æ´¢¿âÖС£ÈôÊÇÊÂÇéÁ÷ÈÕÖ¾¿É¹ûÕæ»á¼û£¬ÈκÎÈ˶¼¿ÉÒÔ¶ÁÈ¡ºÍÇÔÈ¡ÕâЩ̻¶µÄÉñÃØ¡£¹¥»÷Õß»¹ÈëÇÖÁ˾ßÓлá¼û¸Ã¹¤¾ß´æ´¢¿âÌØÈ¨µÄGitHub»úеÈË(@tj-actions-bot)µÄСÎÒ˽¼Ò»á¼ûÁîÅÆ(PAT)£¬µ«ÈëÇÖ·½·¨Éв»ÇåÎú¡£GitHubËæºóɾ³ýÁ˱»ÈëÇֵIJÙ×÷£¬²¢»Ö¸´ÁË´æ´¢¿â£¬µ«¸ÃÎó²î¶ÔÊÜÓ°ÏìµÄÈí¼þÏîÄ¿±¬·¢Á˳¤ÆÚÓ°Ï죬²¢±»·ÖÅÉÁËÒ»¸öCVE ID£¨CVE-2025-30066£©ÒÔ±ã¸ú×Ù¡£¶ñÒâ´úÂ벢佫ÄÚ´æÊä³öй¶µ½Ô¶³Ì·þÎñÆ÷£¬¶øÊÇʹÆäÔڿɹûÕæ»á¼ûµÄ´æ´¢¿âÖпɼû¡£ÎªÁ˱ÜÃâÀàËÆÐ¹Â¶£¬tj-actions´æ´¢¿â¾ÙÐÐÁ˸üУ¬ÌṩÁËÊÜÓ°ÏìÓû§ÐèÒªÖ´ÐеIJÙ×÷˵Ã÷£¬GitHubÒ²½¨Ò齫ËùÓÐGitHub Actions pingµ½Ìض¨µÄÌá½»¹þÏ£¶ø²»Êǰ汾±êÇ©£¬²¢Ê¹ÓÃÔÊÐíÁÐ±í¹¦Ð§À´×èֹδ¾­ÊÚȨ/²»ÊÜÐÅÍеÄGitHub Actions¡£


https://www.bleepingcomputer.com/news/security/supply-chain-attack-on-popular-github-action-exposes-ci-cd-secrets/


5. ÐÂÐͼÓÃÜÍÚ¾òÔ˶¯Ê¹ÓùýʧÉèÖÃJupyter Notebook¹¥»÷


3ÔÂ15ÈÕ£¬½üÆÚ£¬Ò»ÖÖÐÂÐͼÓÃÜÍÚ¾òÔ˶¯±»·¢Ã÷£¬¸ÃÔ˶¯Ê¹ÓùýʧÉèÖõÄJupyter NotebooksÕë¶ÔWindowsºÍLinuxϵͳ¡£¹¥»÷Õßͨ¹ý̻¶µÄJupyter NotebookʵÀýÖ´ÐÐÏÂÁʵÑé×°ÖöñÒâÈí¼þ¡£¹ØÓÚWindowsϵͳ£¬¹¥»÷»áÏÂÔØÒ»¸ö°üÀ¨ÃûΪ¡°Binary.freedllbinary¡±µÄ64λ¿ÉÖ´ÐÐÎļþµÄMSI×°ÖóÌÐò£¬¸ÃÖ´ÐÐÎļþ»á¼ÓÔØÃûΪ¡°java.exe¡±µÄ¸¨ÖúÓÐÓøºÔØ£¬ÏÖʵÉÏÊÇÒ»¸öʹÓÃUPX´ò°üµÄ¶ñÒâ¶þ½øÖÆÎļþ£¬ÓÃÓÚ´Ó¶à¸ö´æ´¢¿âÖмìË÷ÃûΪ¡°x2.dat¡±µÄ¼ÓÃÜblob¡£¹ØÓÚLinuxϵͳ£¬¹¥»÷»áÏÂÔØÒ»¸öbash¾ç±¾£¬¸Ã¾ç±¾»á¼ìË÷Á½¸öELF¶þ½øÖÆÎļþ²¢ÉèÖÃcronjobsÒÔÈ·¼á³¤ÆÚÐÔ¡£¹¥»÷Õß½ÓÄÉÖØ´óµÄ¼ÓÃÜÊÖÒÕÒþ²ØÆäÓÐÓÃÔØºÉ£¬Ä¿µÄ°üÀ¨Monero¡¢Sumokoin¡¢ArQmaµÈ¶àÖÖ¼ÓÃÜÇ®±Ò¡£CadoÇ徲ʵÑéÊÒÖ¸³ö£¬´Ë´ÎÔ˶¯´ú±íÁËÒ»ÖÖÒÔǰ´Ó䱨µÀ¹ýµÄ¼ÓÃÜÍÚ¾ò¹¥»÷µÄÐÂÔØÌå¡£×é֯ӦʵÑéÇ¿Éí·ÝÑéÖ¤£¬½ûÓöÔJupyterʵÀýµÄ¹«¹²»á¼û£¬²¢°´ÆÚ¼à¿ØÔÆÇéÐÎÖеÄÒì³£Ô˶¯£¬ÒÔ¼õÇáÕâЩ¹¥»÷¡£


https://cybersecuritynews.com/hackers-attacking-exposed-jupyter-notebooks/


6. Apache Tomcat RCEÎó²î£¨CVE-2025-24813£©±»Æð¾¢Ê¹ÓÃ


3ÔÂ17ÈÕ£¬Apache TomcatÖб£´æÒ»¸öÑÏÖØµÄÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©Îó²î£¨CVE-2025-24813£©£¬¹¥»÷Õß¿Éͨ¹ý¼òÆÓµÄPUTÇëÇó½ÓÊÜ·þÎñÆ÷¡£Îó²îÅû¶½ö30Сʱºó£¬GitHubÉϾÍÐû²¼ÁË¿´·¨ÑéÖ¤£¨PoC£©Îó²î£¬ºÚ¿ÍÒÑ×îÏÈʹÓøÃÎó²î¡£WallarmÇå¾²Ñо¿Ö°Ô±Ö¤Êµ£¬ÓÉÓÚPUTÇëÇó¿´ËÆÕý³£ÇÒ¶ñÒâÄÚÈÝʹÓÃbase64±àÂë»ìÏý£¬¹Å°åÇå¾²¹¤¾ßÄÑÒÔ¼ì²â¡£¹¥»÷Õß·¢ËͰüÀ¨base64±àÂëÐòÁл¯JavaÓÐÓøºÔصÄPUTÇëÇóÉúÑĵ½Tomcat»á»°´æ´¢ÖУ¬ÔÙ·¢ËÍ´øÓÐÖ¸Ïò»á»°ÎļþµÄJSESSIONID cookieµÄGETÇëÇ󣬯ÈʹTomcat·´ÐòÁл¯²¢Ö´ÐжñÒâ´úÂ룬ÎÞÐèÉí·ÝÑéÖ¤¡£¸ÃÎó²îÓÉÓÚTomcat½ÓÊܲ¿·ÖPUTÇëÇó¼°Ä¬ÈϻỰ³¤ÆÚÐÔÒýÆð£¬Ó°Ïì¶à¸öTomcat°æ±¾¡£ApacheÒÑÐû²¼²¹¶¡£¬½¨ÒéÓû§Éý¼¶ÖÁÒÑÐÞ²¹°æ±¾£¬²¢Í¨¹ý»Ö¸´Ä¬ÈÏservletÉèÖᢹرղ¿·ÖPUTÖ§³Ö¼°×èÖ¹½«Çå¾²Ãô¸ÐÎļþ´æ´¢ÔÚ¹«¹²ÉÏ´«Â·¾¶µÄ×ÓĿ¼ÖÐÀ´»º½âÎÊÌâ¡£WallarmÖÒÑÔ£¬¹¥»÷Õß½«×ª±äÕ½ÂÔ£¬ÉÏ´«¶ñÒâJSPÎļþ¡¢ÐÞ¸ÄÉèÖò¢ÔڻỰ´æ´¢Ö®ÍâÖ²ÈëºóÃÅ£¬ÕâÖ»ÊǵÚÒ»²¨¹¥»÷¡£


https://www.bleepingcomputer.com/news/security/critical-rce-flaw-in-apache-tomcat-actively-exploited-in-attacks/