Python JSON Logger¿âÎó²îÆØ¹â£º4300Íò×°ÖÃÃæÁÙRCEΣº¦

Ðû²¼Ê±¼ä 2025-03-13

1. Python JSON Logger¿âÎó²îÆØ¹â£º4300Íò×°ÖÃÃæÁÙRCEΣº¦


3ÔÂ10ÈÕ£¬£¬ £¬£¬£¬¿ËÈÕ£¬£¬ £¬£¬£¬Python JSON Logger ¿âÖÐÅû¶ÁËÒ»¸öÑÏÖØÎó²î£¨GHSA-wmxh-pxcx-9w24£©£¬£¬ £¬£¬£¬CVSS v3 ÑÏÖØÐÔÆ·¼¶Îª8.8/10£¬£¬ £¬£¬£¬¿ÉÄܵ¼ÖÂÔ¼4300Íò¸ö×°ÖÃÃæÁÙÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©¹¥»÷Σº¦¡£ ¡£¡£¡£¸ÃÎó²îÔ´ÓÚδע²áµÄÒÀÀµÏî¡°msgspec-python313-pre¡±£¬£¬ £¬£¬£¬¹¥»÷Õß¿ÉʹÓôËÎó²îÔÚÖ´ÐÐÊÜÓ°Ïì°æ±¾£¨3.2.0ºÍ3.2.1£©µÄÈÕÖ¾ÊÊÓóÌÐòµÄϵͳÉÏÖ´ÐÐí§Òâ´úÂë¡£ ¡£¡£¡£¸ÃÎó²îÊÇÒÀÀµ»ìÏý¹¥»÷µÄµäµä·¶×Ó£¬£¬ £¬£¬£¬Ê¹ÓÃÈí¼þ¹©Ó¦Á´ÖеÄÎó²î¡£ ¡£¡£¡£Ö»¹ÜûÓÐÖ¤¾ÝÅú×¢ÔÚÎó²î´°¿Úʱ´ú±¬·¢Á˶ñÒâʹÓ㬣¬ £¬£¬£¬µ«¸Ã¿âµÄÆÕ±é½ÓÄÉ·Å´óÁËDZÔÚÓ°Ïì¡£ ¡£¡£¡£ÀÖ³ÉʹÓøÃÎó²î½«Ê¹¹¥»÷Õß»ñµÃ¶ÔϵͳµÄÍêÈ«¿ØÖÆÈ¨¡£ ¡£¡£¡£»£»£»£»£»£»º½â²½·¥°üÀ¨Ðû²¼v3.3.0°æ±¾£¬£¬ £¬£¬£¬ÍêÈ«Ïû³ýÁËmsgspec-python313-preÒÀÀµÐÔ£¬£¬ £¬£¬£¬²¢ÓëÇå¾²Ñо¿Ô±Ð­µ÷×ªÒÆÓÐÕùÒéµÄÈí¼þ°üÃû³ÆµÄËùÓÐȨ¡£ ¡£¡£¡£Çå¾²ÍŶӽ¨ÒéÁ¬Ã¦Éý¼¶µ½v3.3.0£¬£¬ £¬£¬£¬ÎÞ·¨Á¬Ã¦¸üеÄ×éÖ¯Ó¦ÉóºËÆäPythonÇéÐΡ£ ¡£¡£¡£´ËÎó²î͹ÏÔÁËPythonÉú̬ϵͳÔÚÆ½ºâ¿ÉÓÃÐÔºÍÇå¾²ÐÔ·½ÃæÃæÁÙµÄÒ»Á¬ÌôÕ½£¬£¬ £¬£¬£¬²¢´ÙʹÖ÷Òª¿ªÔ´ÉçÇøÖØÐÂÉóÔÄÒÀÀµÖÎÀíʵ¼ù¡£ ¡£¡£¡£


https://cybersecuritynews.com/popular-python-library-vulnerability/


2. Áè¼Ý300¸öÒªº¦»ù´¡ÉèÊ©×éÖ¯Êܵ½MedusaÀÕË÷Èí¼þ¹¥»÷


3ÔÂ12ÈÕ£¬£¬ £¬£¬£¬CISA¡¢FBIºÍ¶àÖÝÐÅÏ¢¹²ÏíÓëÆÊÎöÖÐÐÄ(MS-ISAC)ÁªºÏÐû²¼Í¨¸æ³Æ£¬£¬ £¬£¬£¬×èÖ¹2025Äê2Ô£¬£¬ £¬£¬£¬MedusaÀÕË÷Èí¼þÐж¯ÒÑÓ°ÏìÃÀ¹ú300¶à¸öÒªº¦»ù´¡ÉèÊ©ÁìÓòµÄ×éÖ¯£¬£¬ £¬£¬£¬Éæ¼°Ò½ÁÆ¡¢½ÌÓý¡¢Ö´·¨¡¢°ü¹Ü¡¢ÊÖÒÕºÍÖÆÔìÒµµÈ¶à¸öÐÐÒµ¡£ ¡£¡£¡£Îª·ÀÓùMedusaÀÕË÷Èí¼þ¹¥»÷£¬£¬ £¬£¬£¬½¨Òé×éÖ¯½ÓÄÉ»º½â²½·¥£¬£¬ £¬£¬£¬°üÀ¨ÐÞ²¹Çå¾²Îó²î¡¢·Ö¶ÎÍøÂç¡¢¹ýÂËÍøÂçÁ÷Á¿µÈ¡£ ¡£¡£¡£MedusaÀÕË÷Èí¼þÍÅ»ï×Ô2021Äê1Ô·ºÆð£¬£¬ £¬£¬£¬2023Äê×îÏÈ»îÔ¾£¬£¬ £¬£¬£¬ÒÑÔÚÈ«ÇòÔì³É400¶àÃûÊܺ¦Õߣ¬£¬ £¬£¬£¬²¢Í¨¹ýйÃÜÍøÕ¾ºÍÆáºÚÀÕË÷ÃÅ»§ÍøÕ¾ÏòÊܺ¦ÕßʩѹҪÇóÖ§¸¶Êê½ð¡£ ¡£¡£¡£¸ÃÍÅ»ï½ÓÄÉÀÕË÷Èí¼þ¼´Ð§ÀÍ(RaaS)ÔËÓªºÍͬÃËģʽ£¬£¬ £¬£¬£¬ÕÐļ³õʼ»á¼û¾­¼ÍÈËÒÔ»ñµÃ¶ÔDZÔÚÊܺ¦Õߵijõʼ»á¼ûȨ¡£ ¡£¡£¡£±ðµÄ£¬£¬ £¬£¬£¬¶à¸ö¶ñÒâÈí¼þ¼Ò×åºÍÍøÂç·¸·¨Ðж¯¶¼×Ô³ÆÊÇMedusa£¬£¬ £¬£¬£¬µ¼Ö¹ØÓÚMedusaÀÕË÷Èí¼þµÄ±¨µÀ·ºÆð»ìÏý¡£ ¡£¡£¡£ÉϸöÔ£¬£¬ £¬£¬£¬CISAºÍFBI»¹Ðû²¼Á˹ØÓÚGhostÀÕË÷Èí¼þ¹¥»÷µÄÁªºÏ¾¯±¨£¬£¬ £¬£¬£¬³Æ¶à¸öÐÐÒµÁìÓòµÄÊܺ¦Õß¶¼Êܵ½Á˹¥»÷¡£ ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cisa-medusa-ransomware-hit-over-300-critical-infrastructure-orgs/


3. ³¯ÏÊAPT37×éÖ¯ÍÆ³öÐÂÐÍAndroidÌØ¹¤Èí¼þKoSpy


3ÔÂ12ÈÕ£¬£¬ £¬£¬£¬Ò»ÖÖÃûΪ¡°KoSpy¡±µÄÐÂÐÍAndroidÌØ¹¤Èí¼þÓ볯ÏÊÍþв×éÖ¯APT37£¨ÓÖÃû¡°ScarCruft¡±£©Óйأ¬£¬ £¬£¬£¬¸Ã×é֯ͨ¹ýÖÁÉÙÎå¸ö¶ñÒâÓ¦ÓóÌÐòÉøÍ¸µ½Google PlayºÍµÚÈý·½Ó¦ÓÃÊÐËÁAPKPure¡£ ¡£¡£¡£ÕâЩӦÓóÌÐòαװ³ÉÎļþÖÎÀíÆ÷¡¢Çå¾²¹¤¾ßºÍÈí¼þ¸üгÌÐò£¬£¬ £¬£¬£¬Õë¶Ôº«ÓïºÍÓ¢ÓïÓû§¡£ ¡£¡£¡£Ò»µ©¼¤»î£¬£¬ £¬£¬£¬KoSpy»á´ÓFirebase FirestoreÊý¾Ý¿âÖмìË÷¼ÓÃÜÉèÖÃÎļþ£¬£¬ £¬£¬£¬ÅþÁ¬µ½ÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷£¬£¬ £¬£¬£¬²¢ÔËÐÐÖÖÖÖÊý¾ÝÍøÂ繦Ч£¬£¬ £¬£¬£¬Èç×èµ²¶ÌÐźÍͨ»°¼Í¼¡¢ÊµÊ±×·×ÙGPSλÖá¢ÇÔÈ¡Îļþ¡¢Â¼ÖÆÒôƵºÍÊÓÆµµÈ¡£ ¡£¡£¡£Ö»¹ÜÕâЩӦÓóÌÐòÒÑ´ÓGoogle PlayºÍAPKPureÖÐÒÆ³ý£¬£¬ £¬£¬£¬µ«Óû§ÈÔÐèÊÖ¶¯Ð¶Ôز¢Ê¹ÓÃÇå¾²¹¤¾ßɨÃè×°±¸¡£ ¡£¡£¡£Google Play ProtectÄܹ»×èÖ¹ÒÑÖªµÄ¶ñÒâÓ¦ÓóÌÐò£¬£¬ £¬£¬£¬×ÊÖúÌá·ÀKoSpy¡£ ¡£¡£¡£¹È¸èÒÑÈ·ÈÏËùÓÐKoSpyÓ¦ÓÃÒÑ´ÓGoogle PlayÖÐɾ³ý£¬£¬ £¬£¬£¬ÏìÓ¦µÄFirebaseÏîĿҲÒѱ»³·Ï¡£ ¡£¡£¡£Ê¹ÓÃÇøÓòÓïÑÔÅú×¢ÕâÊÇÓÐÕë¶ÔÐԵĶñÒâÈí¼þ£¬£¬ £¬£¬£¬Google Play Protect»á×Ô¶¯±£»£»£»£»£»£»¤AndroidÓû§ÃâÊÜÒÑÖª°æ±¾µÄ¶ñÒâÈí¼þË𺦡£ ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-north-korean-android-spyware-slips-onto-google-play/


4. MozillaÖÒÑÔ£ºFirefoxÓû§Ðè¸üÐÂä¯ÀÀÆ÷ÒÔ×èÖ¹Ç徲Σº¦


3ÔÂ12ÈÕ£¬£¬ £¬£¬£¬Mozilla½üÆÚÖÒÑÔFirefoxÓû§£¬£¬ £¬£¬£¬Îñ±Ø½«Æää¯ÀÀÆ÷¸üе½×îа汾£¬£¬ £¬£¬£¬ÒÔ×èÖ¹Òò¹«Ë¾µÄÒ»¸ö¸ùÖ¤Êé¼´½«µ½ÆÚ¶ø¿ÉÄܵ¼ÖµÄÖÐÖ¹ºÍÇ徲Σº¦¡£ ¡£¡£¡£¸Ã¸ùÖ¤ÊéÓÃÓÚÇ©Êð°üÀ¨Firefox×Ô¼º¼°MozillaÏîÄ¿¸½¼Ó×é¼þÔÚÄÚµÄÄÚÈÝ£¬£¬ £¬£¬£¬½«ÓÚ2025Äê3ÔÂ14ÈÕµ½ÆÚ¡£ ¡£¡£¡£ÎªÈ·±£Õý³£Ê¹Óø½¼Ó×é¼þ²¢×èÖ¹Ç徲Σº¦£¬£¬ £¬£¬£¬Óû§Ð轫ä¯ÀÀÆ÷¸üÐÂÖÁFirefox 128£¨2024Äê7ÔÂÐû²¼£©»ò¸ü¸ß°æ±¾£¬£¬ £¬£¬£¬ÒÔ¼°¡°À©Õ¹Ö§³Ö°æ±¾¡±£¨ESR£©Óû§µÄESR 115.13»ò¸ü¸ß°æ±¾¡£ ¡£¡£¡£ÕâЩΣº¦°üÀ¨¶ñÒâ²å¼þ¿ÉÄÜÈÆ¹ýÇå¾²±£»£»£»£»£»£»¤Ð¹Â¶Óû§Êý¾Ý¡¢²»ÊÜÐÅÈεÄÖ¤Êé¿ÉÄÜÔÊÐíÓû§»á¼ûڲƭ»ò²»Çå¾²µÄÍøÕ¾£¬£¬ £¬£¬£¬ÒÔ¼°ÃÜÂëй¶¾¯±¨¿ÉÄÜ×èÖ¹ÊÂÇéµÈ¡£ ¡£¡£¡£Óû§¿Éͨ¹ýä¯ÀÀÆ÷²Ëµ¥¼ì²é²¢È·Èϰ汾£¬£¬ £¬£¬£¬´Ë²Ù×÷Ò²»á×Ô¶¯´¥·¢¸üмì²é¡£ ¡£¡£¡£¸ÃÎÊÌâÓ°ÏìËùÓÐÆ½Ì¨ÉϵÄFirefox£¬£¬ £¬£¬£¬µ«iOS³ýÍâ¡£ ¡£¡£¡£Mozilla½¨ÒéÓû§¸üе½×îа汾ÒÔÈ·±£ä¯ÀÀÆ÷Çå¾²¸ßЧ£¬£¬ £¬£¬£¬²¢ÎªÓöµ½ÎÊÌâµÄÓû§ÉèÖÃÁËÖ§³ÖÏ̡߳£ ¡£¡£¡£Í¬Ê±£¬£¬ £¬£¬£¬»ùÓÚFirefoxµÄä¯ÀÀÆ÷ÈçTor¡¢LibreWolfºÍWaterfoxµÄÓû§Ò²Ó¦È·±£ÔËÐеÄÊÇ»ùÓÚFirefox 128¼°¸ü¸ß°æ±¾µÄ°æ±¾¡£ ¡£¡£¡£


https://www.bleepingcomputer.com/news/software/mozilla-warns-users-to-update-firefox-before-certificate-expires/


5. ÈÕ±¾Ôâ¡°MirrorFace¡±APT¹¥»÷£¬£¬ £¬£¬£¬Ê¹ÓÃWindows SandboxÌӱܼì²â


3ÔÂ12ÈÕ£¬£¬ £¬£¬£¬ÈÕ±¾¹ú¼Ò¾¯Ô±ÌüºÍ¹ú¼ÒÍøÂçÇå¾²ÊÂÎñ×¼±¸ºÍÕ½ÂÔÖÐÐÄÐû²¼ÁËÒ»·ÝÇ徲ͨ¸æ£¬£¬ £¬£¬£¬ÖÒÑÔÈÕ±¾×éÖ¯ÃæÁÙÀ´×Ô¡°MirrorFace¡±ÕâÒ»APT10×Ó×éÖ¯µÄ¸ß¼¶Ò»Á¬ÐÔÍþв¹¥»÷¡£ ¡£¡£¡£¸Ã×é֯ʹÓÃWindows SandboxºÍVisual Studio CodeÖ´ÐжñÒâ»î¶¯£¬£¬ £¬£¬£¬²¢Ê¹ÓÃÁËÃûΪ¡°LilimRAT¡±µÄ¶¨ÖƶñÒâÈí¼þ£¬£¬ £¬£¬£¬×¨ÃÅÉè¼ÆÔÚWindows SandboxÖÐÔËÐУ¬£¬ £¬£¬£¬ÒÔÌÓ±ÜÖ÷»úϵͳÉÏÇå¾²¹¤¾ßµÄ¼ì²â¡£ ¡£¡£¡£¹¥»÷Õßͨ¹ýÆôÓÃWindows Sandbox¡¢½¨Éè×Ô½ç˵ÉèÖÃÎļþºÍÔÚ¸ôÀëÇéÐÎÖÐÖ´ÐжñÒâÈí¼þµÈÖØ´óµÄ¶à½×¶Î¹¥»÷Á÷³Ì£¬£¬ £¬£¬£¬ÔÚÊÜѬȾϵͳÉϼá³Ö³¤ÆÚÐÔ²¢×î´óÏ޶ȵØïÔÌ­»î¶¯ºÛ¼£¡£ ¡£¡£¡£ÓÉÓÚWindows SandboxĬÈϽûÓÃÇÒWindows DefenderÔÚÆäÖÐҲĬÈϽûÓ㬣¬ £¬£¬£¬Îª¹¥»÷ÕßÌṩÁËÒ»¸ö²»Çå¾²µÄ²Ù×÷ÇéÐΡ£ ¡£¡£¡£Ç徲ר¼Ò½¨Òé¼á³ÖWindows Sandbox½ûÓÃ״̬£¬£¬ £¬£¬£¬¼à¿ØÏà¹ØÀú³Ì£¬£¬ £¬£¬£¬ÏÞÖÆÖÎÀíȨÏÞ£¬£¬ £¬£¬£¬²¢ÊµÑéAppLockerÕ½ÂÔ£¬£¬ £¬£¬£¬ÒÔ±ÜÃâδ¾­ÊÚȨִÐÐWindows Sandbox¡£ ¡£¡£¡£


https://cybersecuritynews.com/mirrorface-apt-hackers-exploited-windows-sandbox-visual-studio-code/


6. FacebookÖÒÑÔ£ºFreeType×ÖÌå¿â¸ßΣÎó²îÐè½ôÆÈÉý¼¶


3ÔÂ12ÈÕ£¬£¬ £¬£¬£¬Facebook¿ËÈÕ·¢³öÖÒÑÔ£¬£¬ £¬£¬£¬Ö¸³öÔÚFreeType 2.13¼°ÒÔÉϰ汾Öб£´æÒ»¸ö¸ßΣÎó²î£¨CVE-2025-27363£©£¬£¬ £¬£¬£¬¿ÉÄܵ¼ÖÂí§Òâ´úÂëÖ´ÐУ¬£¬ £¬£¬£¬ÇÒÒÑÓб¨¸æ³Æ¸ÃÎó²îÕýÔÚ±»Æð¾¢Ê¹ÓþÙÐй¥»÷¡£ ¡£¡£¡£FreeTypeÊÇÒ»¸öÆÕ±éʹÓõĿªÔ´×ÖÌåäÖȾ¿â£¬£¬ £¬£¬£¬×°ÖÃÔÚ°üÀ¨Linux¡¢AndroidµÈ¶à¸öϵͳºÍЧÀÍÖС£ ¡£¡£¡£¸ÃÎó²îÔÚʵÑéÆÊÎöTrueType GXºÍ¿É±ä×ÖÌåÎļþÏà¹ØµÄ×ÖÌå×Ó×ÖÐνṹʱ±¬·¢Ô½½çдÈ룬£¬ £¬£¬£¬±£´æÓÚFreeType 2.13.0¼°ÒÔϰ汾ÖУ¬£¬ £¬£¬£¬µ«ÒÑÔÚ2.13.0°æ±¾µÄ¸üÐÂÖеÃÒÔÐÞ¸´¡£ ¡£¡£¡£Ö»¹Ü×îеÄÒ×Êܹ¥»÷°æ±¾ÒÑÓÐÁ½ÄêÀúÊ·£¬£¬ £¬£¬£¬µ«¾ÉµÄ¿â°æ±¾ÔÚÈí¼þÏîÄ¿ÖпÉÄܺã¾Ã±£´æ£¬£¬ £¬£¬£¬Òò´ËÈí¼þ¿ª·¢Ö°Ô±ºÍÏîÄ¿ÖÎÀíÔ±Ð辡¿ìÉý¼¶µ½×îа汾FreeType 2.13.3£¬£¬ £¬£¬£¬ÒÔ×èֹDZÔÚµÄÇ徲Σº¦¡£ ¡£¡£¡£FacebookÌåÏÖ£¬£¬ £¬£¬£¬ËûÃÇ·¢Ã÷´ËÎó²îºó¾ÙÐÐÁ˱¨¸æ£¬£¬ £¬£¬£¬Ö¼ÔÚÔöǿÿСÎÒ˽¼ÒµÄÔÚÏßÇå¾²£¬£¬ £¬£¬£¬²¢ÖÂÁ¦ÓÚ±£»£»£»£»£»£»¤Óû§µÄ˽ÈËͨѶ¡£ ¡£¡£¡£¿£¿£¿£¿£¿£Ë¼Á¿µ½FreeTypeµÄÆÕ±éÓ¦Ó㬣¬ £¬£¬£¬¾¡¿ì½â¾ö¸ÃÎó²î¹ØÓÚ°ü¹ÜÍøÂçÇå¾²ÖÁ¹ØÖ÷Òª¡£ ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/facebook-discloses-freetype-2-flaw-exploited-in-attacks/