React Native MetroЧÀÍÆ÷Îó²îÔâºÚ¿ÍʹÓÃ

Ðû²¼Ê±¼ä 2026-02-05

1. React Native MetroЧÀÍÆ÷Îó²îÔâºÚ¿ÍʹÓÃ


2ÔÂ3ÈÕ£¬£¬£¬£¬ £¬£¬ºÚ¿ÍÕýʹÓÃReact NativeĬÈÏ´ò°ü¹¤¾ßMetroЧÀÍÆ÷ÖеÄÑÏÖØÎó²îCVE-2025-11953Ìᳫ¹¥»÷£¬£¬£¬£¬ £¬£¬ÔÚWindowsºÍLinuxϵͳִÐжñÒâ´úÂë¡£¡£¡£¡£ ¡£¡£¸ÃÎó²îÓÉÈí¼þ¹©Ó¦Á´Çå¾²¹«Ë¾JFrogÓÚ2025Äê11Ô·¢Ã÷²¢¹ûÕæ£¬£¬£¬£¬ £¬£¬Ó°Ïì@react-native-community/cli-server-api°æ±¾4.8.0ÖÁ20.0.0-alpha.2£¬£¬£¬£¬ £¬£¬20.0.0¼°ÒÔÉϰ汾ÒÑÐÞ¸´¡£¡£¡£¡£ ¡£¡£¹¥»÷Õßͨ¹ýÏò̻¶µÄ/open-url HTTP¶Ëµã·¢ËͰüÀ¨¶ñÒâURLµÄPOSTÇëÇóʵÑé¹¥»÷¡£¡£¡£¡£ ¡£¡£ÔÚWindowsϵͳÖУ¬£¬£¬£¬ £¬£¬Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÖ±½ÓÖ´ÐÐí§Òâ²Ù×÷ϵͳÏÂÁ£» £»LinuxºÍmacOSϵͳÔò¿ÉÄÜÔËÐÐÊÜÏÞ²ÎÊýµÄí§Òâ¿ÉÖ´ÐÐÎļþ¡£¡£¡£¡£ ¡£¡£Îó²îʹÓõĽ¹µãÔÚÓڶ˵ãδ¶ÔÓû§ÌṩµÄURLÖµ¾ÙÐÐÕûÀí£¬£¬£¬£¬ £¬£¬Ö±½Óת´ï¸ø'open()'º¯Êý£¬£¬£¬£¬ £¬£¬µ¼ÖÂÏÂÁî×¢ÈëΣº¦¡£¡£¡£¡£ ¡£¡£2025Äê12ÔÂ21ÈÕÆð£¬£¬£¬£¬ £¬£¬Îó²îÇ鱨¹«Ë¾VulnCheck¼à²âµ½ÃûΪ"Metro4Shell"µÄ¹¥»÷Ðж¯£¬£¬£¬£¬ £¬£¬¹¥»÷ÕßÓÚ1ÔÂ4ÈÕºÍ21ÈÕÒ»Á¬Ê¹ÓÃÏàÍ¬ÔØºÉ¹¥»÷¡£¡£¡£¡£ ¡£¡£¹¥»÷ÔØºÉΪbase-64±àÂëµÄPowerShell¾ç±¾£¬£¬£¬£¬ £¬£¬½âÂëºóÖ´ÐÐÒÔϲÙ×÷£º½ûÓÃMicrosoft Defender¶ÔÊÂÇéĿ¼ºÍÔÝʱĿ¼µÄ·À»¤£¬£¬£¬£¬ £¬£¬½¨ÉèÓë¹¥»÷Õß¿ØÖÆÐ§ÀÍÆ÷µÄTCPÅþÁ¬£¬£¬£¬£¬ £¬£¬ÏÂÔØ²¢Ö´Ðжþ½øÖÆÎļþ¡£¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-react-native-metro-bug-to-breach-dev-systems/


2. CISAÖÒÑÔÀÕË÷Èí¼þÍÅ»ïʹÓÃVMware ESXiÎó²î


2ÔÂ4ÈÕ£¬£¬£¬£¬ £¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ֤ʵ£¬£¬£¬£¬ £¬£¬ÀÕË÷Èí¼þÍÅ»ïÒÑ×îÏÈʹÓÃVMware ESXiɳÏäÌÓÒݸßΣÎó²î£¨CVE-2025-22225£©Ìᳫ¹¥»÷£¬£¬£¬£¬ £¬£¬¸ÃÎó²î´ËÇ°Ôø±»ÓÃÓÚÁãÈÕ¹¥»÷¡£¡£¡£¡£ ¡£¡£²©Í¨¹«Ë¾ÓÚ2025Äê3ÔÂÐÞ¸´ÁËÕâÒ»í§ÒâдÈëÎó²î£¬£¬£¬£¬ £¬£¬Í¬Ê±ÐÞ¸´ÁËÄÚ´æ×ß©Îó²î£¨CVE-2025-22226£©ºÍTOCTOUÎó²î£¨CVE-2025-22224£©£¬£¬£¬£¬ £¬£¬²¢±ê¼ÇΪÕýÔÚ±»Æð¾¢Ê¹ÓõÄÁãÈÕÎó²î¡£¡£¡£¡£ ¡£¡£¾Ý²©Í¨¹«Ë¾Åû¶£¬£¬£¬£¬ £¬£¬ÔÚVMXÀú³ÌÖÐÓµÓÐÌØÈ¨µÄ¶ñÒâÐÐΪÕ߿ɴ¥·¢í§ÒâÄÚºËдÈ룬£¬£¬£¬ £¬£¬µ¼ÖÂɳÏäÌÓÒÝ¡£¡£¡£¡£ ¡£¡£ÕâЩÎó²îÓ°ÏìVMware ESXi¡¢Fusion¡¢Cloud Foundation¡¢vSphere¡¢Workstation¼°Telco Cloud PlatformµÈ²úÆ·£¬£¬£¬£¬ £¬£¬¹¥»÷Õ߿ɴ®ÁªÎó²îÌÓÀëÐéÄâ»úɳÏä¡£¡£¡£¡£ ¡£¡£ÍøÂçÇå¾²¹«Ë¾HuntressµÄ±¨¸æÖ¸³ö£¬£¬£¬£¬ £¬£¬½²ÖÐÎĵÄÍþвÐÐΪÕß¿ÉÄÜ×Ô2024Äê2ÔÂÆð¾ÍʹÓÃÕâЩÎó²îÌá³«ÖØ´óÁãÈÕ¹¥»÷¡£¡£¡£¡£ ¡£¡£CISAÒѽ«CVE-2025-22225¼ÓÈëÒÑ֪ʹÓÃÎó²î£¨KEV£©Ä¿Â¼£¬£¬£¬£¬ £¬£¬²¢ÒªÇóÁª°î»ú¹¹ÔÚ2025Äê3ÔÂ25ÈÕǰ±£»£» £»¤ÏµÍ³¡£¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/cisa-vmware-esxi-flaw-now-exploited-in-ransomware-attacks/


3. ÑÇÖÞ¶¥¼¶ÓòÃû¼°Õþ¸®½ÌÓýÍøÕ¾ÔâNGINXÉèÖÃ×¢Èë¹¥»÷


2ÔÂ4ÈÕ£¬£¬£¬£¬ £¬£¬DataDogÇ徲ʵÑéÊÒ¿ËÈÕÅû¶£¬£¬£¬£¬ £¬£¬¹¥»÷ÕßÕýÕë¶ÔÑÇÖÞ¶¥¼¶ÓòÃû£¨Èç.in¡¢.id¡¢.pe¡¢.bd¡¢.th£©¼°Õþ¸®½ÌÓýÍøÕ¾£¨.edu¡¢.gov£©Ê¹ÓõÄNGINXЧÀÍÆ÷£¬£¬£¬£¬ £¬£¬ÒÔ¼°BaotaÖ÷»úÖÎÀíÃæ°å°²ÅŵÄNGINX×°Ö㬣¬£¬£¬ £¬£¬ÌᳫÒþ²ØµÄÁ÷Á¿Ð®Öƹ¥»÷¡£¡£¡£¡£ ¡£¡£¸Ã¹¥»÷ͨ¹ý×¢Èë¶ñÒâ"location"¿éÐÞ¸ÄNGINXÉèÖÃÎļþ£¬£¬£¬£¬ £¬£¬²¶»ñÌØ¶¨URL·¾¶µÄ´«ÈëÇëÇ󣬣¬£¬£¬ £¬£¬ÖØÐ´URLºó¾­"proxy_pass"Ö¸ÁÁ÷Á¿×ª·¢ÖÁ¹¥»÷Õß¿ØÖƵÄÓòÃû£¬£¬£¬£¬ £¬£¬×îÖÕ·ÓÉÖÁºó¶Ë»ù´¡ÉèÊ©¡£¡£¡£¡£ ¡£¡£¹¥»÷ÕßʹÓÃNGINXµÄ¸ºÔØÆ½ºâÌØÕ÷£¬£¬£¬£¬ £¬£¬"proxy_pass"Ö¸Áî³£ÓÃÓÚ·ÓÉÇëÇóÖÁ±¸ÓÃЧÀÍÆ÷ÒÔÌáÉýÐÔÄÜ»ò¿É¿¿ÐÔ£¬£¬£¬£¬ £¬£¬Òò´Ë¸ÃÀÄÓÃÐÐΪ²»»á´¥·¢Çå¾²¾¯±¨¡£¡£¡£¡£ ¡£¡£ÎªÎ±×°Õýµ±Á÷Á¿£¬£¬£¬£¬ £¬£¬¹¥»÷±£´æÁËÇëÇóÍ·£¨ÈçHost¡¢X-Real-IP¡¢User-Agent¡¢Referer£©¡£¡£¡£¡£ ¡£¡£¸Ã¹¥»÷¼«¾ßÒþ²ØÐÔ£º²»ÒÀÀµNGINXÎó²î£¬£¬£¬£¬ £¬£¬¶ñÒâÖ¸ÁîÖ±½ÓǶÈëÉèÖÃÎļþ£¬£¬£¬£¬ £¬£¬ÇÒÓû§Á÷Á¿ÈÔ¿É´ïÔ¤ÆÚÄ¿µÄµØ£¬£¬£¬£¬ £¬£¬½öͨ¹ýרÃÅ¼à¿Ø·½Äܲì¾õ¹¥»÷Õß»ù´¡ÉèÊ©ºÛ¼£¡£¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-compromise-nginx-servers-to-redirect-user-traffic/


4. CISA½ôÆÈ±Þ²ßÐÞ²¹ÎåÄêÆÚGitLab¸ßΣÎó²î


2ÔÂ4ÈÕ£¬£¬£¬£¬ £¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕÐû²¼Ç¿ÖÆÐÔÖ¸Á£¬£¬£¬ £¬£¬ÒªÇóÁª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹ÔÚ2026Äê2ÔÂ24ÈÕǰÐÞ²¹±£´æÎåÄêµÄGitLabЧÀÍÆ÷¶ËÇëÇóαÔ죨SSRF£©Îó²î£¨CVE-2021-39935£©£¬£¬£¬£¬ £¬£¬¸ÃÎó²îÕý±»Æð¾¢Ê¹ÓþÙÐÐÍøÂç¹¥»÷¡£¡£¡£¡£ ¡£¡£GitLabÓÚ2021Äê12ÔÂÐÞ¸´´ËÎó²îʱÅû¶£¬£¬£¬£¬ £¬£¬ÆäÓ°Ïì14.3.6֮ǰµÄ10.5°æ±¾¡¢14.4.4֮ǰµÄ14.4°æ±¾¼°14.5.2֮ǰµÄ14.5°æ±¾£¬£¬£¬£¬ £¬£¬ÔÊÐíδ¾­ÊÚȨµÄÍⲿÓû§Í¨¹ýCI Lint APIÖ´ÐÐЧÀÍÆ÷¶ËÇëÇ󣬣¬£¬£¬ £¬£¬ÓÈÆäÔÚÓû§×¢²áÊÜÏÞʱ£¬£¬£¬£¬ £¬£¬·Ç¿ª·¢Ö°Ô±ÈÔ¿É»á¼û¸ÃAPI£¬£¬£¬£¬ £¬£¬×é³ÉÑÏÖØÇ徲Σº¦¡£¡£¡£¡£ ¡£¡£CISAÒѽ«¸ÃÎó²îÄÉÈë"ÒÑ֪ʹÓÃÎó²î£¨KEV£©"Ŀ¼£¬£¬£¬£¬ £¬£¬²¢Ô®ÒýÔ¼ÊøÐÔ²Ù×÷Ö¸ÁBOD£©22-01ÒªÇóÁª°î»ú¹¹½ÓÄÉÐж¯¡£¡£¡£¡£ ¡£¡£Ö»¹ÜBOD 22-01½öÕë´ºÁª°î»ú¹¹£¬£¬£¬£¬ £¬£¬CISAÇ¿ÁÒ½¨Òé˽Ӫ²¿·Ö×éÖ¯ÓÅÏÈ·À»¤×°±¸£¬£¬£¬£¬ £¬£¬×èÖ¹ÔâÊÜÒ»Á¬¹¥»÷¡£¡£¡£¡£ ¡£¡£»£» £»ú¹¹Ðè×ñÕÕ¹©Ó¦ÉÌÐÞ¸´Ö¸ÄÏ¡¢ÔÆÐ§ÀÍBOD 22-01¹æ·¶£¬£¬£¬£¬ £¬£¬»òÎÞ·¨ÐÞ¸´Ê±Í£ÓÃÏà¹Ø²úÆ·¡£¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/cisa-warns-of-five-year-old-gitlab-flaw-exploited-in-attacks/


5. ÍøÂç´¹ÂڻÃé×¼ÆóÒµDropboxÕËºÅÆ¾Ö¤


2ÔÂ3ÈÕ£¬£¬£¬£¬ £¬£¬Forcepoint X-LabsÕ¹ÏÖÒ»³¡Ê¹ÓÃÒþ²ØÊÖÒÕ¹æ±ÜÇå¾²¼ì²âµÄ¶à½×¶ÎÍøÂç´¹ÂÚ¹¥»÷ÕýÔÚÒ»Á¬¾ÙÐУ¬£¬£¬£¬ £¬£¬Æä½¹µãÄ¿µÄÊÇÇÔÈ¡×ÅÃûÔÆ´æ´¢Ð§ÀÍ£¨ÈçDropbox£©µÄÆóÒµÕËºÅÆ¾Ö¤¡£¡£¡£¡£ ¡£¡£¸Ã¹¥»÷ÒÔαÔì½ôÆÈ¹«Îñ»òÉÌÎñ²É¹ºÏà¹Ø´¹ÂÚÓʼþΪÆðµã£¬£¬£¬£¬ £¬£¬ÓʼþÄÚÈݼò¶Ìµ«¸ß¶È·ÂÕæÄ¿µÄÓû§ÊìϤ»ú¹¹»òÁªÏµÈ˵ÄÑùʽ£¬£¬£¬£¬ £¬£¬Í¨¹ý"½ôÆÈËßÇó"ÓÕµ¼ÊÕ¼þÈË·­¿ªPDF¸½¼þ¡£¡£¡£¡£ ¡£¡£ÕâÖÖ¾«Á·Éè¼ÆÊ¹ÆäÀÖ³ÉÈÆ¹ýSPF¡¢DKIM¡¢DMARCµÈÓʼþÉí·ÝÈÏÖ¤»úÖÆ¡£¡£¡£¡£ ¡£¡£µ±Óû§·­¿ªPDFʱ£¬£¬£¬£¬ £¬£¬»á±»Ö¸µ¼µã»÷ÄÚǶµÄ¶ñÒâÁ´½Ó£¬£¬£¬£¬ £¬£¬¸ÃÁ´½Ó»ùÓÚAcro±íµ¥±àд£¬£¬£¬£¬ £¬£¬´ó·ù½µµÍÇå¾²Èí¼þɨÃè¼ì²âÄÜÁ¦¡£¡£¡£¡£ ¡£¡£Á´½Ó×îÖÕ½«Óû§µ¼Ïòαװ³É"¿ÉÐÅÔÆ´æ´¢"ƽ̨µÄÒ³Ãæ£¬£¬£¬£¬ £¬£¬²¢Ìø×ªÖÁ¼«¾ßÒÉ»óÐÔµÄαÔìDropboxµÇ¼½çÃæ¡£¡£¡£¡£ ¡£¡£Forcepoint¸ß¼¶Çå¾²Ñо¿Ô±Hassan FaizanÖ¸³ö£¬£¬£¬£¬ £¬£¬¹¥»÷Õßͨ¹ýÕýµ±ÔÆ»ù´¡ÉèÊ©½µµÍÓû§Ð¡ÐÄÐÔ£¬£¬£¬£¬ £¬£¬Èƹý»ùÓÚÐÅÓþÆÀ¼¶ºÍÒÑÖª¶ñÒâÖ¸±êµÄ×Ô¶¯»¯Çå¾²¼ì²â¡£¡£¡£¡£ ¡£¡£Ò»µ©Óû§ÊäÈëµÇ¼ƾ֤£¬£¬£¬£¬ £¬£¬ÆäÓû§ÃûºÍÃÜÂ뽫±»·¢ËÍÖÁ¹¥»÷Õß¿ØÖƵÄTelegramƵµÀ¡£¡£¡£¡£ ¡£¡£


https://www.infosecurity-magazine.com/news/password-stealing-phishing-pdf/


6. ³¬4ÍòWordPressÍøÕ¾ÊÜQuiz²å¼þSQL×¢ÈëÎó²îÍþв


2ÔÂ4ÈÕ£¬£¬£¬£¬ £¬£¬ÍøÂçÇå¾²»ú¹¹Åû¶£¬£¬£¬£¬ £¬£¬³¬40,000¸öʹÓÃQuiz and Survey Master£¨QSM£©²å¼þµÄWordPressÍøÕ¾ÕýÃæÁÙCVE-2025-67987 SQL×¢ÈëÎó²îΣº¦¡£¡£¡£¡£ ¡£¡£¸ÃÎó²î±£´æÓÚ10.3.1¼°¸üÔç°æ±¾ÖУ¬£¬£¬£¬ £¬£¬ÔÊÐí¾ßÓж©ÔÄÕß¼¶±ð»ò¸ü¸ßȨÏÞµÄÒÑÈÏÖ¤Óû§Í¨¹ýδÂÄÀúÖ¤µÄREST API²ÎÊýʵÑéÊý¾Ý¿â×¢Èë¹¥»÷£¬£¬£¬£¬ £¬£¬ÎÞÐèÖÎÀíԱȨÏÞ¼´¿É×ÌÈÅÅÌÎÊÂß¼­¡£¡£¡£¡£ ¡£¡£QSM×÷ΪÆÕ±éÓÃÓÚ½¨É迼ÊÔ¡¢ÊÓ²ìµÄ²å¼þ£¬£¬£¬£¬ £¬£¬ÆäÎó²îÔ´ÓÚÈÏÕæ¼ìË÷¿¼ÊÔÌâÊý¾ÝµÄREST APIº¯Êý¡£¡£¡£¡£ ¡£¡£¹¥»÷Õß¿ÉʹÓÃÃûΪ"is_linking"µÄÇëÇó²ÎÊý£¬£¬£¬£¬ £¬£¬Í¨¹ý½á¹¹°üÀ¨¶ñÒâSQLÏÂÁîµÄÊäÈëÖµ£¬£¬£¬£¬ £¬£¬ÔÚδʹÓÃÔ¤´¦Öóͷ£Óï¾äµÄÇéÐÎÏÂÖ±½ÓÆ´½ÓÖÁÅÌÎÊÓï¾äÖС£¡£¡£¡£ ¡£¡£Êý¾Ý¿â»á½«×¢ÈëÄÚÈÝÊÓΪÅÌÎÊÖ¸ÁîÖ´ÐУ¬£¬£¬£¬ £¬£¬´Ó¶ø¿ÉÄÜʵÏÖÊý¾Ýй¶¡¢¸Ä¶¯»òÌáȨµÈ¶ñÒâ²Ù×÷¡£¡£¡£¡£ ¡£¡£ÐÞ¸´°æ±¾10.3.2ÓÚ12ÔÂ4ÈÕÐû²¼£¬£¬£¬£¬ £¬£¬Í¨¹ýÇ¿ÖÆÊ¹ÓÃintvalº¯Êý½«"is_linking"²ÎÊýת»»ÎªÕûÊý£¬£¬£¬£¬ £¬£¬È·±£ÅÌÎʽö´¦Öóͷ£ÊýÖµÐÍÊý¾Ý£¬£¬£¬£¬ £¬£¬³¹µ××è¶Ï×¢Èë·¾¶¡£¡£¡£¡£ ¡£¡£


https://www.infosecurity-magazine.com/news/wordpress-sql-injection-flaw-40000/