CrossBarking¹¥»÷£ºOperaä¯ÀÀÆ÷˽ÓÐAPIÔâ½Ù³Ö

Ðû²¼Ê±¼ä 2024-11-01

1. CrossBarking¹¥»÷£ºOperaä¯ÀÀÆ÷˽ÓÐAPIÔâ½Ù³Ö


10ÔÂ30ÈÕ£¬Ñо¿ÈËÔ±·¢ÏÖÁËÒ»ÖÖеÄä¯ÀÀÆ÷¹¥»÷·½Ê½£¬Í¨¹ýÀûÓÃÏÖÒÑÐÞ¸´µÄ©¶´£¬½«×Ô½ç˵´úÂë×¢ÈëÊܺ¦ÕßµÄ Opera ä¯ÀÀÆ÷£¬´Ó¶ø¿ØÖÆÆ䡰˽ÓС±Ó¦Ó÷¨Ê½±à³Ì½Ó¿Ú (API)£¬ÕâЩ API ͨ³£½öΪ×îÊÜÐÅÈεÄÍøÕ¾±£Áô¡£ÕâЩ˽ÓÐ API ¿ÉΪ¿ª·¢ÈËÔ±ÌṩÌØÊâȨÏÞ£¬µ«Ò²¿ÉÄܱ»ºÚ¿ÍÀûÓã¬ÒÔ»ñµÃ¶Ôä¯ÀÀÆ÷µÄȫȨ¿ØÖÆ£¬°üÂÞ¸ü¸ÄÉèÖᢽٳÖÕË»§¡¢½ûÓÃÄþ¾²À©Õ¹µÈ¡£ÎªÁËչʾÕâÖÖ¹¥»÷·½Ê½£¬Guardio Ñо¿ÈËÔ±¿ª·¢ÁËÒ»¸ö¶ñÒâµÄ Chrome À©Õ¹·¨Ê½£¬¸ÃÀ©Õ¹·¨Ê½±»Éè¼ÆΪÔÚ¾ßÓÐ˽ÓÐ API ·ÃÎÊȨÏÞµÄÍøÕ¾»·¾³ÖÐÔËÐжñÒâ´úÂë¡£ËûÃÇͨ¹ý¸ÃÀ©Õ¹·¨Ê½£¬½«¶ñÒâ´úÂë×¢Èëµ½ Opera ä¯ÀÀÆ÷ÖУ¬²¢ÀûÓà settingsPrivate API ¸ü¸ÄÁËÊܺ¦ÕßµÄÓòÃûϵͳ (DNS) ÉèÖ㬴ӶøÈ«Ãæ¼ì²ìºÍÀûÓÃÆää¯ÀÀ»î¶¯¡£ÎªÁ˽â¾öÕâ¸öÎÊÌ⣬Opera ½ÓÄÉÁË Chrome ÖÐÒѾ­ÊµÏÖµÄÒ»ÖÖ¿ìËÙ½â¾ö·½°¸£º×èÖ¹ÈκÎÀ©Õ¹·¨Ê½ÔÚ¾ßÓÐ˽ÓÐ API ·ÃÎÊȨÏÞµÄÓòÉÏÔËÐнű¾µÄÄÜÁ¦¡£


https://www.darkreading.com/vulnerabilities-threats/crossbarking-attack-secret-apis-expose-opera-browser-users


2. ÍøÂçµöÓãµç×ÓÓʼþÃé׼ѧÉú´û¿î³ÖÓÐÈË


10ÔÂ30ÈÕ£¬½ü4300ÍòÃÀ¹úÈ˱³¸º×Åƽ¾ùÿÈË37,000ÃÀÔªµÄѧÉú´û¿îÕ®Îñ¡£°ÝµÇ×ÜͳÔøÌá³öÒ»ÏîÖ¼ÔÚÃâ³ý²¿ÃŽè¿îÈËÕ®ÎñµÄ¼Æ»®£¬µ«¸Ã¼Æ»®ÃæÁÙÖØÖØÕÏ°­¡£ÔÚ´ËÅä¾°Ï£¬ÍøÂç·¸×ï·Ö×Ó³Ë϶Õë¶ÔѧÉú´û¿î³ÖÓÐÈËÌᳫÍøÂçµöÓã¹¥»÷¡£Harmony Email & CollaborationµÄÍøÂçÄþ¾²²¿ÃÅ·¢ÏÖ£¬ÕâÀ๥»÷ÔÚ¹ýÈ¥Á½ÖÜÄÚ¼¤Ôö£¬ÇÒ¹¥»÷ÕßʹÓÃÁËÌØÊâµÄÎı¾»ìÏý¼¼Êõ£¬ÈçUnicode´Ó×óµ½ÓÒ±êÖ¾ (LRM) ºÍÈíÁ¬×Ö·û£¬ÒÔ¹æ±Ü×ÔÈ»ÓïÑÔ´¦Öüì²âÆ÷µÄ¼ì²â¡£ÕâЩÓʼþÄÚÈÝ¿´Ëƽô¼±ÇÒ¿ÉÐÅ£¬ÊµÔòÖ¼ÔÚÓÕÆ­Êܺ¦Õßй¶Ãô¸ÐÐÅÏ¢¡£´ËÀ๥»÷²»½öÍþв¸öÈËÐÅÏ¢Äþ¾²£¬»¹¿ÉÄܶÔÆóÒµ×é³É·çÏÕ¡£Ô±¹¤ÈôÔÚ¹«Ë¾É豸ÉÏ´¦ÖÃÕâЩÓʼþ£¬¿ÉÄܵ¼Ö¶ñÒâÈí¼þÈëÇÖ¹«Ë¾ÏµÍ³£¬½ø¶øÒý·¢Êý¾Ý鶻òÒµÎñÐÅÏ¢Íâй¡£Òò´Ë£¬ÆóÒµÐè½ÓÄÉÇÐʵ¿ÉÐеĴëÊ©À´·À·¶´ËÀ๥»÷£¬°üÂÞÌá¸ßÔ±¹¤Äþ¾²Òâʶ¡¢ÀûÓÃÏȽøµÄµç×ÓÓʼþ¹ýÂ˺ÍÄþ¾²¹¤¾ß¡¢ÊµÊ©¶àÒòËØÉí·ÝÑéÖ¤ÒÔ¼°Öƶ¨ÍêÉƵÄʼþÏìÓ¦¼Æ»®¡£


https://blog.checkpoint.com/harmony-email/7500-phishing-emails-use-interesting-obfuscation-method-to-target-student-loan-holders/


3. LottieFiles npm°üÏÖ¶ñÒâ´úÂ룬Óû§Ðè½ô¼±Éý¼¶


10ÔÂ31ÈÕ£¬LottieFiles ×òÈÕÐû²¼£¬Æä npm °üÖеÄÌض¨°æ±¾£¬¼´ Lottie Web Player£¨¡°lottie-player¡±£©µÄ 2.0.5¡¢2.0.6 ºÍ 2.0.7 °æ±¾£¬±»·¢ÏÖЯ´ø¶ñÒâ´úÂë¡£ÕâЩ°æ±¾»áÌáʾÓû§Á¬½Ó¼ÓÃÜ»õ±ÒÇ®°ü£¬ÒâͼÇå¿ÕÇ®°üÖеÄ×ʲú¡£·¢ÏÖÎÊÌâºó£¬LottieFiles ѸËÙÐû²¼ÁË´¿¾»µÄ 2.0.8 °æ±¾£¬½¨ÒéÓû§¾¡¿ìÉý¼¶ÒÔÖÆÖ¹·çÏÕ¡£Í¬Ê±£¬LottieFiles Ö¸³ö£¬Í¨¹ýµÚÈý·½ CDN ʹÓøÿâÇÒδÀι̰汾µÄÓû§»á×Ô¶¯ÊÕµ½ÊÜËð°æ±¾£¬µ«Ëæ×ÅÄþ¾²°æ±¾µÄÐû²¼£¬ÕâЩÓû§½«×Ô¶¯ÊÕµ½ÐÞ¸´¡£¶ÔÓÚÎÞ·¨Éý¼¶µÄÓû§£¬LottieFiles ½¨ÒéÏò×îÖÕÓû§Í¨±¨·çÏÕ£¬²¢¾¯¸æËûÃÇÓйØÆÛÕ©ÐÔ¼ÓÃÜ»õ±ÒÇ®°üÁ¬½ÓÇëÇ󣬻ò¼ÌÐøʹÓÃδÊÜÓ°ÏìµÄ 2.0.4 °æ±¾¡£´ËÍ⣬LottieFiles Ðû²¼Í¨¸æ³Æ£¬´Ë´Îʼþ½öÓ°ÏìÆä npm °ü£¬²»Ó°ÏìÆä SaaS ·þÎñ£¬²¢È·ÈÏÆäËû¿ªÔ´¿â¡¢´úÂëºÍ´æ´¢¿â¾ùδÊÜÓ°Ïì¡£¸Ãƽ̨ÒÑ°þ¶á¸Ä¶¯°æ±¾ÉÏ´«ÕßµÄ npm ÕÊ»§·ÃÎÊȨÏÞ£¬²¢È¡ÏûÏà¹ØÁîÅÆ£¬Í¬Ê±¼ÌÐø¶Ô´Ë´ÎÈëÇÖʼþ½øÐÐÄÚ²¿ÊӲ졣ĿǰÉв»Çå³þ¸ÃʼþÊÇ·ñÓÐÊܺ¦ÕßÒÔ¼°¾ßÌåËðʧ½ð¶î¡£


https://www.bleepingcomputer.com/news/security/lottiefiles-hit-in-npm-supply-chain-attack-targeting-users-crypto/


4. PTZOpticsÉãÏñ»úÏÖÁãÈÕ©¶´£¬ºÚ¿ÍÊÔͼÀûÓÃÌᳫ¹¥»÷


10ÔÂ31ÈÕ£¬ºÚ¿ÍÕýÔÚÀûÓÃPTZOpticsÔÆ̨±ä½¹ÊµÊ±Á÷ýÌåÉãÏñ»úÖеÄÁ½¸öз¢ÏÖµÄÁãÈÕ©¶´CVE-2024-8956ºÍCVE-2024-8957¡£ÕâЩ©¶´ÓÚ2024Äê4Ô±»GreyNoiseµÄSift¹¤¾ßÔÚÆäÃÛ¹ÞÍøÂçÉϼì²âµ½¡£CVE-2024-8956Éæ¼°ÉãÏñ»ú¡°lighthttpd¡±ÍøÂç·þÎñÆ÷ÖеÄÈõÉí·ÝÑéÖ¤ÎÊÌ⣬ÔÊÐíδ¾­ÊÚȨµÄÓû§·ÃÎÊCGI API£¬Ì»Â¶Ãô¸ÐÐÅÏ¢¡£¶øCVE-2024-8957ÔòÊÇÓÉÓÚ¡°ntp_client¡±¶þ½øÖÆÎļþÖеÄÊäÈëÇåÀí²»×㣬ÔÊÐíÔ¶³Ì´úÂëÖ´ÐС£ÕâÁ½¸ö©¶´¿ÉÄܵ¼ÖÂÉãÏñÍ·±»ÍêÈ«½Ó¹Ü¡¢Ñ¬È¾¶ñÒâÈí¼þ¡¢¹¥»÷ͬһÍøÂçµÄÆäËûÉ豸»òÖжÏÊÓƵÁ÷¡£¾¡¹Ü³õʼ¹¥»÷»î¶¯ÔÚ·¢ÏÖºó²»¾ÃÏûʧ£¬µ«6Ô·ºÆðÁËʹÓÃwgetÏÂÔØshell½Å±¾½øÐз´Ïò·ÃÎʵÄʵÑé¡£GreyNoiseÒÑÏòÊÜÓ°Ï칩ӦÉ̽øÐÐÂôÁ¦ÈεÄÅû¶£¬PTZOpticsµÈ³§ÉÌÒÑÐû²¼Äþ¾²¸üУ¬µ«²¿ÃžÉÐͺźÍз¢ÏÖµÄÊÜÓ°ÏìÐͺÅÉÐδÊÕµ½²¹¶¡¡£GreyNoiseÈÏΪ¿ÉÄÜÓиü¹ã·ºµÄÉ豸Êܵ½Ó°Ï죬½¨ÒéÓû§×ÉѯÉ豸¹©Ó¦ÉÌÁ˽â×îй̼þ¸üÐÂÇé¿ö¡£


https://www.bleepingcomputer.com/news/security/hackers-target-critical-zero-day-vulnerability-in-ptz-cameras/


5. ÒÉËÆÎÚ¿ËÀ¼ÍøÂç¹¥»÷µ¼ÖÂÌØά¶ûÍ£³µÏµÍ³Ì±»¾


10ÔÂ31ÈÕ£¬¶íÂÞ˹Î÷±±²¿¶¼ÊÐÌØά¶ûµÄ¾ÓÃñÒòÕþ¸®Ëù³ÆµÄÊý×ÖÍ£³µÖ§¸¶ÏµÍ³¡°¼¼Êõ¹ÊÕÏ¡±¶øµÃÒÔÃâ·ÑÍ£³µ½üÁ½Ì졣Ȼ¶ø£¬Ò»¸öÃûΪ¡°ÎÚ¿ËÀ¼ÍøÂçÁªÃË¡±µÄºÚ¿Í×éÖ¯Éù³ÆÕâ¿ÉÄÜÊÇÕë¶Ô¸ÃÊйÜÀíÍøÂçµÄÍøÂç¹¥»÷ËùÖ£¬²¢Éù³Æ´Ý»ÙÁËÊýʮ̨ÐéÄâ»ú¡¢±¸·Ý´æ´¢¡¢ÍøÕ¾¡¢µç×ÓÓʼþºÍÊý°Ù¸öÊÂÇéÕ¾¡£ÌØά¶ûÊÐÕþ¸®×î³õδ¶Ô´Ë·¢±íÆÀÂÛ£¬µ«Ëæºó·¢±íÉùÃ÷³ÆÍøÕ¾ºÍÔÚÏßÍ£³µÖ§¸¶Æ½Ì¨ÕýÔÚ½øÐм¼ÊõάÐÞ¡£µ±µØ¾ÓÃñÔÚʵÑ鸶¿îʱÓöµ½´íÎóÏûÏ¢»òÓ¦Ó÷¨Ê½¼ÓÔØʧ°Ü¡£ÊÐÕþ¸®¹ÙÔ±ºóÀ´Ðû²¼Í£³µ¸¶·Ñ·þÎñÒѻָ´£¬µ«Î´È·ÈÏÊÇ·ñ·¢ÉúÁËÍøÂç¹¥»÷¡£Õâ²¢·ÇÇ×ÎÚ¿ËÀ¼ºÚ¿ÍÊ×´ÎÉù³Æ¶Ô¶íÂÞ˹·þÎñÌᳫ¹¥»÷£¬´ËÇ°Ò²ÓÐÀàËÆʼþ±»¹é¾ÌΪ¡°¼¼Êõ¹ÊÕÏ¡±¡£ÎÚ¿ËÀ¼ÍøÂçÁªÃËÊÇÒ»¸öÇ×ÎÚ¿ËÀ¼ÍøÂç»î¸ÐÈËÊ¿ÍÅÌ壬×Ô¶íÂÞ˹ÈëÇÖÎÚ¿ËÀ¼ÒÔÀ´»ý¼«¼ÓÈë·´¶í¶·Õù£¬²¢ÔøÉù³ÆÈëÇÖ¶íÂÞ˹¹ú¼ÒÐÅÓÿ¨Ö§¸¶ÏµÍ³µÈÐж¯¡£


https://therecord.media/ukraine-cyberattack-russia-parking-tver


6. Phish n' ShipsÍøÂçµöÓã»î¶¯Ñ¬È¾Ç§¼ÒÍøµê


10ÔÂ31ÈÕ£¬Ò»ÏîÃûΪ¡°Phish n' Ships¡±µÄÍøÂçµöÓã»î¶¯×Ô2019ÄêÆð£¬ÒÑѬȾÁè¼Ýһǧ¼ÒºÏ·¨ÔÚÏßÉ̵꣬ͨ¹ýÍƹãÐé¼ÙÉÌÆ·ÁбíÆÛÕ©ÊýÊ®ÍòÏû·ÑÕߣ¬Ôì³ÉÊýǧÍòÃÀÔªËðʧ¡£¸Ã»î¶¯ÀûÓ鶴¡¢´íÎóÅäÖûòÊÜËð¹ÜÀíԱƾ¾ÝÈëÇÖÍøÕ¾£¬ÉÏ´«¶ñÒâ½Å±¾ºÍÐé¼Ù²úÎïÁбí£¬ÀûÓÃSEOÓÅ»¯ÎüÒýÊܺ¦Õß¡£Êܺ¦Õßµã»÷Á´½Óºó±»Öض¨ÏòÖÁ¼ÙÉ̵꣬¾­ÀúÐé¼Ù½áÕËÁ÷³Ì²¢ÊäÈë¸öÈËÐÅÏ¢ºÍÐÅÓÿ¨ÏêÇ飬µ«¹ºÖõÄÎïÆ·´ÓδËÍ´ï¡£SatoriÍþвÇ鱨ÍŶӷ¢ÏÖËùÓмÙÉ̵êÁ¬½ÓÖÁÒ»¸öÓÉ14¸öIPµØÖ·×é³ÉµÄÍøÂ磬²¢ÀÄÓöà¼ÒÖ§¸¶ÌṩÉÌÌ×ÏÖ¡£HUMAN¼°ÆäºÏ×÷»ï°éÒÑЭµ÷»ØÓ¦£¬Í¨ÖªÊÜÓ°Ïì×éÖ¯²¢ÏòGoogle³ÂËßÐé¼ÙÁбí£¬´ó¶àÊý¶ñÒâËÑË÷½á¹ûÒѱ»ÇåÀí£¬µ«ÍþвÐÐΪÕß¿ÉÄÜ»áʵÑ齨Á¢ÐµÄÆÛÕ©ÍøÂç¡£½¨ÒéÏû·ÑÕßÁôÒⲻѰ³£Öض¨Ïò£¬È·ÈÏÉ̵êÍøÖ·£¬²¢³ÂËßÆÛÕ©ÐÔÊÕ·Ñ¡£


https://www.bleepingcomputer.com/news/security/over-a-thousand-online-shops-hacked-to-show-fake-product-listings/