ÊÓÆµ¾Û»áÓ¦ÓÃHuddle01й¶Óû§Êý¾Ý
Ðû²¼Ê±¼ä 2025-10-171. ÊÓÆµ¾Û»áÓ¦ÓÃHuddle01й¶Óû§Êý¾Ý
10ÔÂ15ÈÕ£¬È¥ÖÐÐÄ»¯ÊÓÆµ¾Û»áÓ¦ÓÃHuddle01Ðû³ÆÌṩ¸ßÇå¾²ÐÔWebRTC·þÎñ£¬È´ÒòδÊܱ£»¤µÄKafka BrokerʵÀýµ¼Ö´ó¹æÄ£Óû§Êý¾Ýй¶¡£Ñо¿ÍŶӷ¢Ã÷£¬¸Ãƽ̨ÓÃÓÚ´«ÊäʵʱÈÕÖ¾µÄKafka BrokerδÆôÓÃÉí·ÝÑéÖ¤¡¢¼ÓÃÜ»ò»á¼û¿ØÖÆ£¬Ì»Â¶ÁË2025Äê8ÔÂ13ÈÕÖÁ26ÈÕʱ´ú³¬621,000ÌõʵʱÈÕÖ¾ÌõÄ¿£¬º¸ÇÓû§µç×ÓÓʼþ¡¢IPµØµã¡¢¼ÓÃÜÇ®°üµØµã£¨Ö§³Ö±ÈÌØ±Ò¡¢ÒÔÌ«·»µÈÇø¿éÁ´£©¡¢Í¨»°¼ÓÈë¼Í¼¡¢¹ú¼Ò¡¢Ê±¼ä¡¢Ê±³¤µÈÃô¸ÐÐÅÏ¢¡£ÕâЩÊý¾ÝÒÔÃ÷ÎÄÐÎʽʵʱ´«Ê䣬ÈκεÚÈý·½¾ù¿ÉÎÞÕϰ»á¼û¡£Ö»¹ÜHuddle01ÔÚÓ¦ÓÃÊÐËÁÉùÃ÷¡°²»ÍøÂç»ò¹²ÏíÓû§Êý¾Ý¡±£¬ÇÒÒþ˽Õþ²ßÇ¿µ÷¡°È¥ÖÐÐÄ»¯Í¨Ñ¶ÖеÄÊý¾Ý͸Ã÷ÓëÓû§¿ØÖÆ¡±£¬µ«ÏÖʵ̻¶µÄÊý¾ÝÏÔʾÆä±£´æÑÏÖØÇå¾²Îó²î¡£Æ½Ì¨ÓÉÃÀ¹úÌØÀ»ªÖÝGraphene01 Labs¿ª·¢£¬ÔÚGoogle PlayÏÂÔØÁ¿³¬5Íò´Î£¬iOS¶Ëƽ¾ùÆÀ·Ö4.7ÐÇ£¬ÉîÊܼÓÃÜÇ®±Òϲ»¶ÕßÇàíù¡£È»¶ø£¬Çø¿éÁ´¼¯³É·´¶ø¼Ó¾çÁËΣº¦£¬¹¥»÷Õß¿ÉʹÓÃй¶µÄÇ®°üµØµã¹ØÁªÕæÊµÉí·Ý£¬»æÖÆÓû§¹ØÏµÍ¼£¬½ø¶øÊµÑ龫׼´¹ÂÚ¹¥»÷»òÉç»á¹¤³Ì¹¥»÷¡£
https://cybernews.com/security/video-call-app-huddle01-leaks-sensitive-user-data/
2. CISA½ôÆÈ¸üÐÂKEVĿ¼£ºAdobeÓëSKYSEAÎó²îÔâ×Ô¶¯Ê¹ÓÃ
10ÔÂ16ÈÕ£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ÓÚ¿ËÈÕ½«Á½¸öÑÏÖØÇå¾²Îó²îÄÉÈëÆäÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼£¬Í¹ÏÔÄ¿½ñÍøÂçÇå¾²ÍþвµÄ½ôÆÈÐÔ¡£ÆäÖУ¬Ó°ÏìAdobe Experience Manager£¨AEM£©µÄCVE-2025-54253Îó²î±»ÆÀ¶¨Îª×î¸ßÑÏÖØÐÔÆ·¼¶£¨CVSS 10.0£©£¬¸ÃÎó²îÔ´ÓÚAEM Forms JEE 6.5.23.0¼°¸üÔç°æ±¾Öб£´æÎ´ÂÄÀúÖ¤µÄ/adminui/debug servlet¶Ëµã£¬¹¥»÷Õß¿ÉʹÓô˶˵ãÌá½»¶ñÒâOGNL±í´ïʽ£¬ÎÞÐèÉí·ÝÑéÖ¤¼´¿ÉÖ´ÐÐí§ÒâϵͳÏÂÁî¡£AdobeÒÑÓÚ2025Äê8ÔÂÐû²¼µÄ6.5.0-0108°æ±¾ÖÐÐÞ¸´´ËÎó²î£¬Í¬Ê±ÐÞ¸´µÄÉÐÓÐCVSS 8.6·ÖµÄCVE-2025-54254¡£Ö»¹ÜAdobeÈϿɱ£´æ¹ûÕæ¿´·¨ÑéÖ¤£¬µ«ÏÖʵ¹¥»÷ϸ½ÚÉÐδÅû¶¡£CISAÒªÇóÁª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹±ØÐèÔÚ2025Äê11ÔÂ5ÈÕǰÍê³ÉÐÞ¸´¡£ÁíÒ»ÔòÖ÷Òª¸üÐÂÉæ¼°SKYSEA Client ViewµÄCVE-2016-7836Îó²î£¨CVSS 9.8·Ö£©£¬¸ÃÎó²îÔ´ÓÚÉí·ÝÑéÖ¤»úÖÆÈ±ÏÝ£¬¹¥»÷Õß¿Éͨ¹ýÖÎÀí¿ØÖÆÌ¨µÄTCPÅþÁ¬Ô¶³ÌÖ´ÐдúÂë¡£ÈÕ±¾Îó²î˵Ã÷£¨JVN£©ÔÚ2016Äêµ×µÄÇ徲ͨ¸æÖÐÃ÷È·Ö¸³ö£¬Ò°ÍâÒѼì²âµ½Õë¶Ô´ËÎó²îµÄ¹¥»÷ÐÐΪ¡£
https://thehackernews.com/2025/10/cisa-flags-adobe-aem-flaw-with-perfect.html
3. ËÕ¸»±ÈÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ£¬¿Í»§Ãô¸ÐÐÅÏ¢ÔâÇÔÈ¡
10ÔÂ16ÈÕ£¬È«Çò×ÅÃûÒÕÊõÆ·ÅÄÂôÐÐËÕ¸»±È¿ËÈÕת´ïÒ»ÆðÖØ´óÊý¾Ýй¶ÊÂÎñ£¬ÍþвÐÐΪÕßÇÔÈ¡Á˿ͻ§Ãô¸ÐÐÅÏ¢£¬°üÀ¨È«Ãû¡¢Éç»áÇå¾²ºÅÂ루SSN£©¼°½ðÈÚÕË»§ÏêÇé¡£¸ÃÊÂÎñÓÚ2025Äê7ÔÂ24ÈÕ±»·¢Ã÷£¬¾ÓÉÁ½¸öÔµÄÏêϸÊӲ죬¹«Ë¾·½È·Èϱ»µÁÊý¾ÝÀàÐͼ°ÊÜÓ°ÏìСÎÒ˽¼Ò¹æÄ£¡£×÷ΪȫÇòÁìÏȵĸ߼ÛÖµÎïÆ·ÅÄÂôÐÐÓë×ʲúÖ§³Ö´û¿î·þÎñÉÌ£¬ËÕ¸»±ÈÿÄê´¦Öóͷ£ÊýÊ®ÒÚÃÀÔªÅÄÂôÉúÒ⣬2024Äê×ÜÏúÊÛ¶î´ï60ÒÚÃÀÔª¡£´Ë´Îй¶ÊÂÎñÓ°Ïì¹æÄ£ÆÕ±é£¬Æ¾Ö¤ÏòÃÀ¹úÃåÒòÖÝÉó²é³¤°ì¹«ÊÒÌá½»µÄÎļþ£¬ÒÑÈ·ÈϰüÀ¨ÃåÒòÖݺÍÂ޵µºÖÝÔÚÄڵIJ¿·Ö¿Í»§ÐÅÏ¢Ôâ²»·¨»ñÈ¡£¬µ«ÏêϸÊÜÓ°Ïì×ÜÈËÊýÉÐδÍêÈ«Åû¶¡£ËÕ¸»±ÈÔÚ֪ͨÖÐÇ¿µ÷£¬ÊÂÎñ±¬·¢ºóÁ¬Ã¦Æô¶¯ÖÜÈ«ÊӲ죬ͨ¹ýÊý¾ÝÉó²éÈ·¶¨ÐÅϢй¶¹æÄ£¡£×èÖ¹ÏÖÔÚ£¬ÉÐÎÞÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£ÎªÓ¦¶Ô´Ë´ÎΣ»ú£¬ËÕ¸»±ÈΪÊÜÓ°Ïì¿Í»§Ìṩµ÷½â²½·¥£ºÍ¨¹ýTransUnionÌṩΪÆÚ12¸öÔµÄÃâ·ÑÉí·Ý±£»¤ÓëÐÅÓÃ¼à¿Ø·þÎñ£¬¿Í»§ÐèÔÚ90ÌìÄÚÍê³É×¢²á¡£
https://www.bleepingcomputer.com/news/security/auction-giant-sothebys-says-data-breach-exposed-customer-information/
4. ProsperÔâ´ó¹æÄ£Êý¾Ýй¶£¬1760ÍòÓû§ÐÅÏ¢±»ÇÔ
10ÔÂ16ÈÕ£¬ÃÀ¹úµã¶Ôµã½è´ûƽ̨ProsperÅû¶Æäϵͳ9ÔÂ2ÈÕÔâºÚ¿ÍÈëÇÖ£¬µ¼ÖÂÁè¼Ý1760ÍòÈ˵ÄСÎÒ˽¼ÒÐÅÏ¢±»µÁ¡£´Ë´ÎÊÂÎñÉæ¼°¿Í»§¼°´û¿îÉêÇëÈ˵ÄÃô¸ÐÊý¾Ý£¬°üÀ¨Éç»áÇå¾²ºÅÂë¡¢ÐÕÃû¡¢Õþ¸®½ÒÏþµÄÉí·ÝÖ¤ºÅ¡¢¾Íҵ״̬¡¢ÐÅÓÃÆÀ·Ö¡¢ÊÕÈëˮƽ¡¢³öÉúÈÕÆÚ¡¢ÏÖʵµØµã¡¢IPµØµã¼°ä¯ÀÀÆ÷Óû§ÊðÀíÐÅÏ¢µÈ¡£Ö»¹ÜProsperÌåÏÖÉÐδ·¢Ã÷¹¥»÷Õß»ñÈ¡¿Í»§ÕË»§»ò×ʽð»á¼ûȨÏÞµÄÖ¤¾Ý£¬µ«È·ÈÏÉñÃØÊý¾ÝÒÑͨ¹ýδ¾ÊÚȨÅÌÎʹ«Ë¾Êý¾Ý¿âµÄ·½·¨±»ÇÔÈ¡¡£×÷Ϊ½¨ÉèÓÚ2005ÄêµÄÀÏÅÆ½ðÈÚÆ½Ì¨£¬ProsperÒÑ×ÊÖú³¬200Íò¿Í»§Íê³É³¬300ÒÚÃÀÔª´û¿îÉúÒâ¡£±¾´ÎÇå¾²Îó²îδӰÏìÆäÃæÏò¿Í»§µÄÒ»Ñùƽ³£ÔËÓª£¬¹«Ë¾ÒÑÏòî¿Ïµ²¿·ÖºÍÖ´·¨»ú¹Ø±¨°¸£¬²¢Æô¶¯ÍŽáÊӲ졣ProsperÇ¿µ÷£¬ÊÓ²ìÈÔ´¦ÓÚÔçÆÚ½×¶Î£¬ÔÚÈ·¶¨ÏêϸÊÜÓ°ÏìÊý¾Ý¹æÄ£ºó£¬½«ÏòÊÜÓ°ÏìÓû§ÌṩÃâ·ÑÐÅÓÃ¼à¿Ø·þÎñ¡£ÖµµÃ×¢ÖØµÄÊÇ£¬Êý¾Ýй¶֪ͨ·þÎñHave I Been Pwned£¨HIBP£©Åû¶ÊÂÎñÓ°Ïì¹æÄ£´ï1760Íò¸öΨһµç×ÓÓʼþµØµã£¬µ«Prosper½²»°ÈËÌåÏÖ¡°ÎÞ·¨ÑéÖ¤¡±¸ÃÊý¾ÝµÄ׼ȷÐÔ£¬²¢ÖØÉ깫˾ÈÔÔÚºËʵÏêϸÊÜÓ°ÏìÊý¾Ý¼°ËùÓÐÕßÉí·Ý¡£
https://www.bleepingcomputer.com/news/security/have-i-been-pwned-warns-of-prosper-data-breach-impacting-176-million-accounts/
5. Ó¡¶ÈNetcoreCloud·þÎñÆ÷ÉèÖùýʧÖÂ400ÒÚÌõÃô¸ÐÊý¾Ýй¶
10ÔÂ16ÈÕ£¬Ó¡¶ÈÈ«Çòµç×ÓÓʼþÓªÏúÓë×Ô¶¯»¯ÆóÒµNetcoreCloudÒò·þÎñÆ÷ÉèÖùýʧ£¬µ¼Ö°üÀ¨400ÒÚÌõ¼Í¼¡¢×ܼÆ13.4TBµÄÃô¸ÐÊý¾Ýй¶£¬Éæ¼°È«Çò¿Í»§µç×ÓÓʼþ¡¢ÄÚ²¿ÏêϸÐÅÏ¢¼°ÊÖÒÕÉèÖõȽ¹µãÊý¾Ý¡£ÍøÂçÇå¾²Ñо¿Ô±Jeremiah FowlerÔÚ¹ûÕæÊý¾Ý¿âÖз¢Ã÷¸ÃÎó²î£¬Êý¾Ý¿âδ¼ÓÃÜÇÒδÊܱ£»¤£¬ÈκλñÈ¡IPµØµãÕß¾ù¿É»á¼ûº£Á¿ÓʼþͨѶ¼Í¼£¬°üÀ¨Ò½ÁƱ£½¡Í¨Öª¡¢ÒøÐÐÔ˶¯¾¯±¨¡¢¾ÍÒµÏà¹ØÓʼþ¼°²¿·ÖÕË»§ÊÖÒÕÐÅÏ¢£¨ÈçIPµØµã¡¢SMTPÉèÖã©£¬²¿·Ö¼Í¼ÉõÖÁ±ê¼ÇΪÉñÃØ¡£NetcoreCloud×ܲ¿Î»ÓÚÓ¡¶ÈÃÏÂò£¬Îª40¸ö¹ú¼Ò/µØÇøµÄ6500Óà¸öÆ·ÅÆÌṩµç×ÓÓʼþ¼°×Ô¶¯»¯·þÎñ£¬ÁýÕÖµçÉÌ¡¢½ðÈÚ¡¢Ã½Ìå¡¢ÂÃÓεÈÐÐÒµ¡£Fowler·¢Ã÷ºóÁ¬Ã¦Í¨Öª¸Ã¹«Ë¾£¬Êý¾Ý¿âÓÚµ±ÈÕ±»½ôÆÈ±£»¤²¢ÏÞÖÆ»á¼û¡£Netcore»ØÓ¦³Æ½«¿ªÕ¹ÄÚ²¿Éó²é£¬µ«ÏÖÔÚÈÔ±£´æÈý´óÒɵ㣺й¶Êý¾Ý¿âÓÉNetcoreÖ±½ÓÖÎÀí»òµÚÈý·½ÍйÜδÃ÷£»Êý¾Ý̻¶ʱ³¤¼°ÊÇ·ñ±»¶ñÒâ»á¼ûδȷÈÏ£»ÊÇ·ñÓÐÆäËûÖ÷ÌåÏÂÔØ»ò¸´ÖÆÊý¾ÝÐèͨ¹ý·¨ÎñÉó¼ÆºËʵ¡£
https://hackread.com/misconfigured-netcorecloud-server-40-billion-records/
6. ³¯ÏʺڿÍʹÓÃEtherHidingÔÚÇø¿éÁ´ÉÏÒþ²Ø¶ñÒâÈí¼þ
10ÔÂ16ÈÕ£¬³¯Ïʹú¼ÒÖ§³ÖµÄºÚ¿Í×éÖ¯UNC5342×Ô2025Äê2ÔÂÆð£¬ÔÚÕë¶ÔÈí¼þ¼°ÍøÂ翪·¢Ö°Ô±µÄÉç»á¹¤³Ì¹¥»÷ÖУ¬Ê״νÓÄÉÃûΪ"EtherHiding"µÄÇø¿éÁ´ÖÇÄܺÏÔ¼¶ñÒâÈí¼þÈö²¥ÊÖÒÕ¡£¸ÃÊÖÒÕÓÉGuardio LabsÓÚ2023ÄêÌá³ö£¬Í¨¹ý½«¶ñÒâÔØºÉǶÈë±Ò°²ÖÇÄÜÁ´»òÒÔÌ«·»µÄÖÇÄܺÏÔ¼ÖУ¬ÊµÏֵͱ¾Ç®¡¢¸ßÄäÃûÐԵĶñÒâÈí¼þÍйÜÓ붯̬¸üС£¹¥»÷Á÷³ÌÒÔÐéαÇóÖ°ÃæÊÔΪÓÕ¶ü£¬ÓÉαÔìʵÌ壨ÈçBlockNovas LLC¡¢Angeloper Agency£©Ìᳫ¡£Êܺ¦ÕßÔÚÊÖÒÕÆÀ¹À»·½Ú±»ÓÕÆÖ´ÐÐJavaScriptÏÂÔØ³ÌÐò£¬¸Ã³ÌÐòͨ¹ýÖÇÄܺÏÔ¼ÓëÒÔÌ«·»½»»¥£¬»ñÈ¡°üÀ¨InvisibleFerretÌØ¹¤Èí¼þJS°æ±¾µÄµÚÈý½×¶ÎÓÐÓøºÔØ¡£Çø¿éÁ´ÌØÕ÷ʹ¹¥»÷¾ß±¸Èý´óÓÅÊÆ£ºÆäÒ»£¬Í¨¹ýÖ»¶ÁŲÓûñÈ¡ÔØºÉ²»ÁôÉúÒâ¼Í¼£¬Òþ²ØÐÔ¼«Ç¿£»Æä¶þ£¬ºÏÔ¼ÔÚǰËĸöÔ¸üг¬20´Î£¬Ã¿´Î½öÐè1.37ÃÀÔªgas·Ñ£¬Ö§³Ö¿ìËÙÎÞаµ÷½â£»ÆäÈý£¬¶àÁ´Ê¹ÓÃÅú×¢³¯ÏʺڿÍÍŶӱ£´æ²Ù×÷¸ôÀë¡£¶ñÒâÈí¼þÔÚÄÚ´æÖÐÔËÐУ¬¿É¶¯Ì¬¼ÓÔØÆ¾Ö¤ÇÔȡģ¿é£¬Ä¿µÄÖ±Ö¸Chrome¡¢EdgeµÈä¯ÀÀÆ÷µÄÃÜÂë¡¢ÐÅÓÿ¨¼°¼ÓÃÜÇ®°üÊý¾Ý¡£ÆäÏÂÁî¿ØÖÆ£¨C2£©Í¨µÀÖ§³ÖÖ´ÐÐí§ÒâÏÂÁî¡¢ZIPѹËõÎļþÍâйÖÁTelegramµÈ²Ù×÷¡£
https://www.bleepingcomputer.com/news/security/north-korean-hackers-use-etherhiding-to-hide-malware-on-the-blockchain/


¾©¹«Íø°²±¸11010802024551ºÅ