CVE-2024-27564Îó²î£ºChatGPT»ù´¡ÉèÊ©ÃæÁÙSSRF¹¥»÷Íþв
Ðû²¼Ê±¼ä 2025-03-181. CVE-2024-27564Îó²î£ºChatGPT»ù´¡ÉèÊ©ÃæÁÙSSRF¹¥»÷Íþв
3ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾VeritiÔÚÆä×îÐÂÑо¿±¨¸æÖÐÕ¹ÏÖÁËOpenAIµÄChatGPT»ù´¡ÉèÊ©Öб£´æµÄÒ»¸öЧÀÍÆ÷¶ËÇëÇóαÔ죨SSRF£©Îó²î£¬£¬£¬£¬£¬£¬£¬¼´CVE-2024-27564£¬£¬£¬£¬£¬£¬£¬Ö»¹Ü¸ÃÎó²î±»¹éΪÖеÈÑÏÖØË®Æ½£¬£¬£¬£¬£¬£¬£¬µ«ÔÚÏÖʵÌìÏÂÖÐÒѱ»Æð¾¢Ê¹Óᣡ£¡£¡£¡£Veriti·¢Ã÷£¬£¬£¬£¬£¬£¬£¬Ò»ÖÜÄÚ¾ÍÓÐ10,479´Î¹¥»÷ʵÑéÔ´×Ôͳһ¶ñÒâIPµØµã¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬35%µÄ×éÖ¯ÒòÇ徲ϵͳÉèÖùýʧ¶øÎ´ÄÜ»ñµÃ³ä·Ö±£»£»£»£»£»£»¤£¬£¬£¬£¬£¬£¬£¬ÆäÖÐÃÀ¹úÔâÊܵĹ¥»÷×îΪ¼¯ÖУ¬£¬£¬£¬£¬£¬£¬Õ¼±È33%£¬£¬£¬£¬£¬£¬£¬Æä´ÎÊǵ¹úºÍÌ©¹ú£¬£¬£¬£¬£¬£¬£¬¾ùΪ7%¡£¡£¡£¡£¡£¹¥»÷»î¶¯ÔÚ1Ô·ݼ¤Ôö£¬£¬£¬£¬£¬£¬£¬ËæºóÓÐËùϽµ¡£¡£¡£¡£¡£½ðÈÚÐÐÒµ³ÉΪÖ÷Òª¹¥»÷Ä¿µÄ£¬£¬£¬£¬£¬£¬£¬ÒòÆäÑÏÖØÒÀÀµAIЧÀͺÍAPI¼¯³É£¬£¬£¬£¬£¬£¬£¬Ò×ÊÜSSRF¹¥»÷Íþв£¬£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÊý¾Ýй¶¡¢Î´¾ÊÚȨµÄÉúÒâ¡¢î¿Ïµ´¦·ÖºÍÉùÓþË𺦡£¡£¡£¡£¡£VeritiÇ¿µ÷£¬£¬£¬£¬£¬£¬£¬²»Ó¦ºöÊÓÖеÈÑÏÖØË®Æ½µÄÎó²î£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚ¹¥»÷Õß»áʹÓÃÈκÎÕÒµ½µÄÈõµã¡£¡£¡£¡£¡£Ñо¿Ö¸³ö£¬£¬£¬£¬£¬£¬£¬Îó²îÓÅÏȼ¶ÅÅÐò²»Ó¦½öÒÀÀµÑÏÖØË®Æ½ÆÀ·Ö£¬£¬£¬£¬£¬£¬£¬¹¥»÷Ç÷ÊÆ¿ÉÄÜѸËÙת±ä£¬£¬£¬£¬£¬£¬£¬Ôø±»ÒÔΪÎ޹ؽôÒªµÄÎó²î¿ÉÄܳÉΪ¹¥»÷ǰÑÔ¡£¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬£¬£¬VeritiÌṩÁËÆð¾¢Ê¹ÓôËÎó²îµÄIPµØµãÁÐ±í£¬£¬£¬£¬£¬£¬£¬½¨ÒéÇå¾²ÍŶÓÁ¬Ã¦¼ì²éIPS¡¢WAFºÍ·À»ðǽÉèÖ㬣¬£¬£¬£¬£¬£¬Æð¾¢¼à¿ØÈÕÖ¾£¬£¬£¬£¬£¬£¬£¬²éÕÒÀ´×ÔÒÑʶ±ð¶ñÒâIPµØµãµÄ¹¥»÷ʵÑ飬£¬£¬£¬£¬£¬£¬²¢ÔÚΣº¦ÖÎÀíÕ½ÂÔÖÐÓÅÏÈÆÀ¹ÀÓëAIÏà¹ØµÄÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬ÒÔ¼õÇáÓëCVE-2024-27564Ïà¹ØµÄΣº¦¡£¡£¡£¡£¡£
https://hackread.com/hackers-exploit-chatgpt-cve-2024-27564-10000-attacks/
2. ΢Èí·¢Ã÷StilachiRATľÂí£ºÌӱܼì²âÇÔÈ¡Êý¾Ý
3ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬Î¢Èí½üÆÚ·¢Ã÷ÁËÒ»ÖÖÃûΪStilachiRATµÄÐÂÐÍÔ¶³Ì»á¼ûľÂí£¬£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ½ÓÄÉÖØ´óÊÖÒÕÌӱܼì²â¡¢¼á³Ö³¤ÆÚÐÔ²¢ÇÔÈ¡Ãô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬£¬Ö»¹ÜÉÐδÆÕ±éÈö²¥£¬£¬£¬£¬£¬£¬£¬µ«Î¢ÈíÒѹûÕæ·ÖÏíÈëÇÖÖ¸±ê»ººÍ½âÖ¸µ¼¡£¡£¡£¡£¡£StilachiRATÄÜ´Óä¯ÀÀÆ÷¡¢Êý×ÖÇ®°ü¡¢¼ôÌù°å¼°ÏµÍ³ÖÐÇÔÊØÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬¾ßÓÐǿʢµÄÕì̽ÄÜÁ¦£¬£¬£¬£¬£¬£¬£¬ÈçÍøÂçϵͳӲ¼þÐÅÏ¢¡¢¼ì²âÉãÏñÍ·¼°RDP»á»°µÈ¡£¡£¡£¡£¡£Ëü»¹ÄÜͨ¹ýWindows APIÌáÈ¡Chromeƾ֤£¬£¬£¬£¬£¬£¬£¬¼à¿Ø¼ôÌù°åÖеÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃWindowsЧÀÍ¿ØÖÆÖÎÀíÆ÷»ñµÃ³¤ÆÚÐÔ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬StilachiRATÄÜð³äµÇÈÎÃü»§¼à¿ØRDP»á»°£¬£¬£¬£¬£¬£¬£¬ÊµÏÖÍøÂçÖеĺáÏòÒÆ¶¯¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ»¹¾ß±¸¼ì²â¹æ±ÜºÍ·´È¡Ö¤¹¦Ð§£¬£¬£¬£¬£¬£¬£¬Èçɨ³ýÊÂÎñÈÕÖ¾¡¢¼ì²éɳºÐÇéÐεȡ£¡£¡£¡£¡£StilachiRAT¿É½ÓÊÜÀ´×ÔC2ЧÀÍÆ÷µÄÏÂÁ£¬£¬£¬£¬£¬£¬Ö´ÐÐÖØÆôϵͳ¡¢É¨³ýÈÕÖ¾¡¢ÇÔȡƾ֤µÈ²Ù×÷¡£¡£¡£¡£¡£ÎªïÔ̹¥»÷Ãæ£¬£¬£¬£¬£¬£¬£¬Î¢Èí½¨Òé´Ó¹ÙÍøÏÂÔØÈí¼þ£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃÇå¾²Èí¼þ×èÖ¹¶ñÒâÓòºÍ¸½¼þ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/microsoft-new-rat-malware-used-for-crypto-theft-reconnaissance/
3. LazarusºÚ¿ÍÊÔͼϴǮºóOKXÔÝÍ£ÁËDEX¾ÛºÏÆ÷
3ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬³¯ÏÊ Lazarus ºÚ¿Í×éÖ¯½üÆÚʵÑéÁËÒ»Æð¼ÛÖµ15ÒÚÃÀÔªµÄ¼ÓÃÜÇ®±Ò͵ÇÔ°¸£¬£¬£¬£¬£¬£¬£¬ÕâÒ»ÊÂÎñÒýÆðÁËÆÕ±é¹Ø×¢¡£¡£¡£¡£¡£×÷ΪȫÇòÁìÏȵļÓÃÜÇ®±ÒÉúÒâËùÖ®Ò»£¬£¬£¬£¬£¬£¬£¬OKX ÔÚ´ËÅ侰ϾöÒéÔÝÍ£ÆäÈ¥ÖÐÐÄ»¯ÉúÒâËù£¨DEX£©¾ÛºÏÆ÷ЧÀÍ£¬£¬£¬£¬£¬£¬£¬ÒÔ¾ÙÐÐÇå¾²Éý¼¶¡£¡£¡£¡£¡£OKXÔÚÈ«ÇòÖÐÐÄ»¯ÉúÒâËùÏÖ»õÉúÒâÊг¡·Ý¶îÔ¼Õ¼8.0%£¬£¬£¬£¬£¬£¬£¬ÉúÒâÁ¿Öش󣬣¬£¬£¬£¬£¬£¬Î»ÁÐÐÐҵǰÏß¡£¡£¡£¡£¡£Lazarus×éÖ¯ÊÔͼʹÓÃOKXµÄDEXЧÀÍϴ媱»µÁµÄ1ÒÚÃÀÔª¼ÓÃÜÇ®±Ò£¬£¬£¬£¬£¬£¬£¬´ËÊÂÉõÖÁÒý·¢ÁËÅ·ÃËî¿Ïµ»ú¹¹µÄÊӲ졣¡£¡£¡£¡£Ö»¹ÜOKX·ñ¶¨ÁËÏà¹ØÖ¸¿Ø£¬£¬£¬£¬£¬£¬£¬²¢Ö¸³öÒѶ³½áÁ÷ÈëÖÐÐÄ»¯ÉúÒâËùµÄÏà¹Ø×ʽ𣬣¬£¬£¬£¬£¬£¬µ«¹«Ë¾ÈÔ¾öÒé½ÓÄÉÐж¯£¬£¬£¬£¬£¬£¬£¬ÒÔ±ÜÃâЧÀͱ»ÀÄÓᣡ£¡£¡£¡£OKXÔÚÓëî¿Ïµ»ú¹¹ÐÉ̺󣬣¬£¬£¬£¬£¬£¬×Ô¶¯ÔÝÍ£ÁËDEX¾ÛºÏÆ÷ЧÀÍ£¬£¬£¬£¬£¬£¬£¬²¢ÍýÏëÍÆ³öʶ±ðºÍ×·×ÙºÚ¿ÍÏà¹ØµØµãµÄϵͳ£¬£¬£¬£¬£¬£¬£¬Í¬Ê±ÔÚÖÐÐÄ»¯ÉúÒâËùÉÏʵʱ·â±ÕÕâЩµØµã¡£¡£¡£¡£¡£OKXÕýÓëÇø¿éÁ´Ì½Ë÷ÕßÏàÖú£¬£¬£¬£¬£¬£¬£¬ÒÔÈ·±£ÉúÒâ»ñµÃ׼ȷ±ê¼Ç²¢Ìá¸ßÇå¾²ÐÔ¡£¡£¡£¡£¡£ÕâЩ²½·¥Ö¼ÔÚÔöÇ¿¼ÓÃÜÇ®±ÒÉúÒâÆ½Ì¨µÄÇå¾²ÐÔ¡¢Í¸Ã÷¶ÈºÍî¿ÏµºÏ¹æÐÔ¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚÉв»ÇåÎúLazarusÊÇ·ñÄÜÈÆ¹ýÕâЩ²½·¥£¬£¬£¬£¬£¬£¬£¬»òÕß³¯ÏʺڿÍÊÇ·ñ»áתÏòÆäËûÇå¾²±ê×¼½ÏµÍµÄÉúÒâËù¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/okx-suspends-dex-aggregator-after-lazarus-hackers-try-to-launder-funds/
4. tj-actionsÔ⹩ӦÁ´¹¥»÷£¬£¬£¬£¬£¬£¬£¬CI/CDÉñÃØÐ¹Â¶Î£º¦¸ß
3ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬ÆÕ±éʹÓõÄGitHub Action¡°tj-actions/changed-files¡±½üÆÚÔâÊÜÁ˹©Ó¦Á´¹¥»÷£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂCI/CDÉñÃØ¿ÉÄÜ´ÓGitHub Actions¹¹½¨ÈÕÖ¾Öб»ÇÔÈ¡¡£¡£¡£¡£¡£¸Ã¹¤¾ßÔÊÐí¿ª·¢Ö°Ô±Æ¾Ö¤ÀÈ¡ÇëÇó»òÌá½»Öиü¸ÄµÄÎļþ½ÓÄÉÐж¯£¬£¬£¬£¬£¬£¬£¬³£ÓÃÓÚ²âÊÔ¡¢ÊÂÇéÁ÷³Ì´¥·¢¼°´úÂëÑéÖ¤¡£¡£¡£¡£¡£ÔÚ2025Äê3ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÐ޸Ť¾ß´úÂë²¢Ïò¶à¸ö°æ±¾±êÇ©Ìí¼Ó¶ñÒâÌá½»£¬£¬£¬£¬£¬£¬£¬Àֳɽ«CI/CDÉñÃØ´ÓRunner WorkerÀú³Ìת´¢µ½Ê¹ÓøòÙ×÷µÄÈκÎÏîÄ¿µÄ´æ´¢¿âÖС£¡£¡£¡£¡£ÈôÊÇÊÂÇéÁ÷ÈÕÖ¾¿É¹ûÕæ»á¼û£¬£¬£¬£¬£¬£¬£¬ÈκÎÈ˶¼¿ÉÒÔ¶ÁÈ¡ºÍÇÔÈ¡ÕâЩ̻¶µÄÉñÃØ¡£¡£¡£¡£¡£¹¥»÷Õß»¹ÈëÇÖÁ˾ßÓлá¼û¸Ã¹¤¾ß´æ´¢¿âÌØÈ¨µÄGitHub»úеÈË(@tj-actions-bot)µÄСÎÒ˽¼Ò»á¼ûÁîÅÆ(PAT)£¬£¬£¬£¬£¬£¬£¬µ«ÈëÇÖ·½·¨Éв»ÇåÎú¡£¡£¡£¡£¡£GitHubËæºóɾ³ýÁ˱»ÈëÇֵIJÙ×÷£¬£¬£¬£¬£¬£¬£¬²¢»Ö¸´ÁË´æ´¢¿â£¬£¬£¬£¬£¬£¬£¬µ«¸ÃÎó²î¶ÔÊÜÓ°ÏìµÄÈí¼þÏîÄ¿±¬·¢Á˳¤ÆÚÓ°Ï죬£¬£¬£¬£¬£¬£¬²¢±»·ÖÅÉÁËÒ»¸öCVE ID£¨CVE-2025-30066£©ÒÔ±ã¸ú×Ù¡£¡£¡£¡£¡£¶ñÒâ´úÂ벢佫ÄÚ´æÊä³öй¶µ½Ô¶³ÌЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬¶øÊÇʹÆäÔڿɹûÕæ»á¼ûµÄ´æ´¢¿âÖпɼû¡£¡£¡£¡£¡£ÎªÁ˱ÜÃâÀàËÆÐ¹Â¶£¬£¬£¬£¬£¬£¬£¬tj-actions´æ´¢¿â¾ÙÐÐÁ˸üУ¬£¬£¬£¬£¬£¬£¬ÌṩÁËÊÜÓ°ÏìÓû§ÐèÒªÖ´ÐеIJÙ×÷˵Ã÷£¬£¬£¬£¬£¬£¬£¬GitHubÒ²½¨Ò齫ËùÓÐGitHub Actions pingµ½Ìض¨µÄÌá½»¹þÏ£¶ø²»Êǰ汾±êÇ©£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃÔÊÐíÁÐ±í¹¦Ð§À´×èֹδ¾ÊÚȨ/²»ÊÜÐÅÈεÄGitHub Actions¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/supply-chain-attack-on-popular-github-action-exposes-ci-cd-secrets/
5. ÐÂÐͼÓÃÜÍÚ¾ò»î¶¯Ê¹ÓùýʧÉèÖÃJupyter Notebook¹¥»÷
3ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬£¬½üÆÚ£¬£¬£¬£¬£¬£¬£¬Ò»ÖÖÐÂÐͼÓÃÜÍÚ¾ò»î¶¯±»·¢Ã÷£¬£¬£¬£¬£¬£¬£¬¸Ã»î¶¯Ê¹ÓùýʧÉèÖõÄJupyter NotebooksÕë¶ÔWindowsºÍLinuxϵͳ¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ý̻¶µÄJupyter NotebookʵÀýÖ´ÐÐÏÂÁ£¬£¬£¬£¬£¬£¬ÊµÑé×°ÖöñÒâÈí¼þ¡£¡£¡£¡£¡£¹ØÓÚWindowsϵͳ£¬£¬£¬£¬£¬£¬£¬¹¥»÷»áÏÂÔØÒ»¸ö°üÀ¨ÃûΪ¡°Binary.freedllbinary¡±µÄ64λ¿ÉÖ´ÐÐÎļþµÄMSI×°ÖóÌÐò£¬£¬£¬£¬£¬£¬£¬¸ÃÖ´ÐÐÎļþ»á¼ÓÔØÃûΪ¡°java.exe¡±µÄ¸¨ÖúÓÐÓøºÔØ£¬£¬£¬£¬£¬£¬£¬ÏÖʵÉÏÊÇÒ»¸öʹÓÃUPX´ò°üµÄ¶ñÒâ¶þ½øÖÆÎļþ£¬£¬£¬£¬£¬£¬£¬ÓÃÓÚ´Ó¶à¸ö´æ´¢¿âÖмìË÷ÃûΪ¡°x2.dat¡±µÄ¼ÓÃÜblob¡£¡£¡£¡£¡£¹ØÓÚLinuxϵͳ£¬£¬£¬£¬£¬£¬£¬¹¥»÷»áÏÂÔØÒ»¸öbash¾ç±¾£¬£¬£¬£¬£¬£¬£¬¸Ã¾ç±¾»á¼ìË÷Á½¸öELF¶þ½øÖÆÎļþ²¢ÉèÖÃcronjobsÒÔÈ·¼á³¤ÆÚÐÔ¡£¡£¡£¡£¡£¹¥»÷Õß½ÓÄÉÖØ´óµÄ¼ÓÃÜÊÖÒÕÒþ²ØÆäÓÐÓÃÔØºÉ£¬£¬£¬£¬£¬£¬£¬Ä¿µÄ°üÀ¨Monero¡¢Sumokoin¡¢ArQmaµÈ¶àÖÖ¼ÓÃÜÇ®±Ò¡£¡£¡£¡£¡£CadoÇ徲ʵÑéÊÒÖ¸³ö£¬£¬£¬£¬£¬£¬£¬´Ë´Î»î¶¯´ú±íÁËÒ»ÖÖÒÔǰ´Ó䱨µÀ¹ýµÄ¼ÓÃÜÍÚ¾ò¹¥»÷µÄÐÂÔØÌå¡£¡£¡£¡£¡£×é֯ӦʵÑéÇ¿Éí·ÝÑéÖ¤£¬£¬£¬£¬£¬£¬£¬½ûÓöÔJupyterʵÀýµÄ¹«¹²»á¼û£¬£¬£¬£¬£¬£¬£¬²¢°´ÆÚ¼à¿ØÔÆÇéÐÎÖеÄÒì³£»£»£»£»£»£»î¶¯£¬£¬£¬£¬£¬£¬£¬ÒÔ¼õÇáÕâЩ¹¥»÷¡£¡£¡£¡£¡£
https://cybersecuritynews.com/hackers-attacking-exposed-jupyter-notebooks/
6. Apache Tomcat RCEÎó²î£¨CVE-2025-24813£©±»Æð¾¢Ê¹ÓÃ
3ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬Apache TomcatÖб£´æÒ»¸öÑÏÖØµÄÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©Îó²î£¨CVE-2025-24813£©£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿Éͨ¹ý¼òÆÓµÄPUTÇëÇó½ÓÊÜЧÀÍÆ÷¡£¡£¡£¡£¡£Îó²îÅû¶½ö30Сʱºó£¬£¬£¬£¬£¬£¬£¬GitHubÉϾÍÐû²¼ÁË¿´·¨ÑéÖ¤£¨PoC£©Îó²î£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÒÑ×îÏÈʹÓøÃÎó²î¡£¡£¡£¡£¡£WallarmÇå¾²Ñо¿Ö°Ô±Ö¤Êµ£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚPUTÇëÇó¿´ËÆÕý³£ÇÒ¶ñÒâÄÚÈÝʹÓÃbase64±àÂë»ìÏý£¬£¬£¬£¬£¬£¬£¬¹Å°åÇå¾²¹¤¾ßÄÑÒÔ¼ì²â¡£¡£¡£¡£¡£¹¥»÷Õß·¢ËͰüÀ¨base64±àÂëÐòÁл¯JavaÓÐÓøºÔصÄPUTÇëÇóÉúÑĵ½Tomcat»á»°´æ´¢ÖУ¬£¬£¬£¬£¬£¬£¬ÔÙ·¢ËÍ´øÓÐÖ¸Ïò»á»°ÎļþµÄJSESSIONID cookieµÄGETÇëÇ󣬣¬£¬£¬£¬£¬£¬ÆÈʹTomcat·´ÐòÁл¯²¢Ö´ÐжñÒâ´úÂ룬£¬£¬£¬£¬£¬£¬ÎÞÐèÉí·ÝÑéÖ¤¡£¡£¡£¡£¡£¸ÃÎó²îÓÉÓÚTomcat½ÓÊܲ¿·ÖPUTÇëÇó¼°Ä¬ÈϻỰ³¤ÆÚÐÔÒýÆð£¬£¬£¬£¬£¬£¬£¬Ó°Ïì¶à¸öTomcat°æ±¾¡£¡£¡£¡£¡£ApacheÒÑÐû²¼²¹¶¡£¬£¬£¬£¬£¬£¬£¬½¨ÒéÓû§Éý¼¶ÖÁÒÑÐÞ²¹°æ±¾£¬£¬£¬£¬£¬£¬£¬²¢Í¨¹ý»Ö¸´Ä¬ÈÏservletÉèÖᢹرղ¿·ÖPUTÖ§³Ö¼°×èÖ¹½«Çå¾²Ãô¸ÐÎļþ´æ´¢ÔÚ¹«¹²ÉÏ´«Â·¾¶µÄ×ÓĿ¼ÖÐÀ´»º½âÎÊÌâ¡£¡£¡£¡£¡£WallarmÖÒÑÔ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß½«×ª±äÕ½ÂÔ£¬£¬£¬£¬£¬£¬£¬ÉÏ´«¶ñÒâJSPÎļþ¡¢ÐÞ¸ÄÉèÖò¢ÔڻỰ´æ´¢Ö®ÍâÖ²ÈëºóÃÅ£¬£¬£¬£¬£¬£¬£¬ÕâÖ»ÊǵÚÒ»²¨¹¥»÷¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/critical-rce-flaw-in-apache-tomcat-actively-exploited-in-attacks/


¾©¹«Íø°²±¸11010802024551ºÅ