WazuhЧÀÍÆ÷³ÉΪMirai½©Ê¬ÍøÂçµÄ¹¥»÷Ä¿µÄ

Ðû²¼Ê±¼ä 2025-06-12

1. WazuhЧÀÍÆ÷³ÉΪMirai½©Ê¬ÍøÂçµÄ¹¥»÷Ä¿µÄ


6ÔÂ10ÈÕ£¬£¬ £¬£¬£¬AkamaiÇå¾²Ç鱨ºÍÏìÓ¦ÍŶӣ¨SIRT£©¿ËÈÕ·¢Ã÷£¬£¬ £¬£¬£¬Mirai½©Ê¬ÍøÂç±äÖÖÕýÔÚʹÓÃWazuhЧÀÍÆ÷ÖеÄÒ»¸öÒªº¦Ô¶³Ì´úÂëÖ´ÐУ¨RCE£©Îó²î£¨CVE-2025-24016£©¾ÙÐй¥»÷»î¶¯¡£¡£¡£¸ÃÎó²î×î³õÓÚ½ñÄê2Ô·ݱ»Åû¶£¬£¬ £¬£¬£¬µ«ÖÁ½ñÉÐδ±»Ìí¼Óµ½ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©µÄÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼ÖС£¡£¡£WazuhÊÇÒ»¸öÓÃÓÚÍþвԤ·À¡¢¼ì²âºÍÏìÓ¦µÄÃâ·Ñ¿ªÔ´Æ½Ì¨£¬£¬ £¬£¬£¬¶ø´Ë´ÎÊÜÓ°ÏìµÄ°æ±¾ÎªWazuh 4.4.0ÖÁ4.9.0£¬£¬ £¬£¬£¬²¹¶¡ÒÑÔÚ4.9.1°æ±¾ÖÐÐû²¼¡£¡£¡£¸ÃÎó²îÔÊÐí¾ßÓÐAPI»á¼ûȨÏÞµÄÔ¶³Ì¹¥»÷Õßͨ¹ýÉÏ´«¶ñÒâJSONÎļþÀ´Ö´ÐÐí§Òâ´úÂë¡£¡£¡£ÏêϸÀ´Ëµ£¬£¬ £¬£¬£¬ÔÚWazuh APIÖУ¬£¬ £¬£¬£¬DistributedAPIµÄ²ÎÊý»á±»ÐòÁл¯ÎªJSON£¬£¬ £¬£¬£¬²¢Ê¹ÓÃÌØ¶¨ÎļþÖеÄas_Wazuh_object¾ÙÐз´ÐòÁл¯¡£¡£¡£¹¥»÷Õß¿ÉÒÔͨ¹ýÔÚDAPIÇëÇóÖÐ×¢Èëδ¾­´¦Öóͷ£µÄ×ÖµäÀ´Ê¹ÓôËÎó²î£¬£¬ £¬£¬£¬½ø¶øµ¼ÖÂí§ÒâPython´úÂëµÄÖ´ÐУ¬£¬ £¬£¬£¬»òÕ߸üͨË×µØËµ£¬£¬ £¬£¬£¬ÓÕÆ­ÏµÍ³ÔËÐжñÒâPython´úÂë¡£¡£¡£Ñо¿Ö°Ô±Ç¿µ÷£¬£¬ £¬£¬£¬¸ÃÎó²î½öÓ°ÏìÔËÐйýʱ°æ±¾µÄ»î¶¯WazuhЧÀÍÆ÷£¬£¬ £¬£¬£¬Òò´Ë±Þ²ßÓû§¾¡¿ì¸üе½Wazuh 4.9.1»ò¸ü¸ß°æ±¾£¬£¬ £¬£¬£¬ÒÔÌá·ÀDZÔÚµÄÇå¾²Íþв¡£¡£¡£


https://cybernews.com/security/wazuh-servers-targeted-by-mirai-botnets/


2. FacebookÉÏ·¢Ã÷4000¶à¸öÐéÎ±ÍøÕ¾Ðû²¼ÐéαÉúÒâ


6ÔÂ10ÈÕ£¬£¬ £¬£¬£¬Silent PushÍþвÆÊÎöʦ¿ËÈÕ·¢Ã÷ÁËÒ»¸öÃûΪ¡°GhostVendors¡±µÄÖØ´óÐéαÊг¡ÍøÂ磬£¬ £¬£¬£¬Éæ¼°Áè¼Ý4000¸öÕ©Æ­ÍøÕ¾£¬£¬ £¬£¬£¬ÕâÐ©ÍøÕ¾Ã°³äÁ˰üÀ¨ÑÇÂíÑ·¡¢Argos¡¢Costco¡¢Nordstrom¡¢ÀÍÁ¦Ê¿¡¢ÃܶûÎÖ»ù¹¤¾ß£¨Milwaukee Tools£¬£¬ £¬£¬£¬ÔÚÕ©Æ­¹ã¸æÖб»¸Ä¶¯Îª¡°Millaeke¡±£©ÒÔ¼°²ª¿Ï£¨Birkenstock£©µÈÔÚÄÚµÄÊýÊ®¸ö×ÅÃûÆ·ÅÆ¡£¡£¡£Õ©Æ­Õßͨ¹ýFacebook MarketplaceͶ·Å´ó×Ú¹ã¸æ¾ÙÐÐÍÆ¹ã£¬£¬ £¬£¬£¬Ê¹Óü«µÍµÄ¼ÛÇ®ÒýÓÕÏûºÄÕß¡£¡£¡£ËûÃÇÇÉÃîµØÊ¹ÓÃMetaµÄ¹ã¸æÊý¾Ý±£´æ¹æÔò£¬£¬ £¬£¬£¬Ôڻ¿¢ÊºóѸËÙɾ³ýËùÓкۼ££¬£¬ £¬£¬£¬Ê¹µÃ·ÀÓùÕßÄÑÒÔ×·×Ù¡£¡£¡£Õ©Æ­Õß²»µ«¿Ë¡×ÅÃûÆ·ÅÆÍøÕ¾Ä£°å£¬£¬ £¬£¬£¬»¹ÖÆ×÷ÁËÊýÊ®¸öÏàËÆµÄð³ä¸±±¾£¬£¬ £¬£¬£¬Í¨¹ý¡°Çå²Ö¡±»ò¡°½ÚÈÕ´ÙÏú¡±µÈÒªº¦´ÊÒÔ¼°ÁîÈËÄÑÒÔÖÃÐŵÄÓÅ»ÝÉúÒâÀ´ÎüÒý»á¼ûÕß¡£¡£¡£Ò»µ©ÏûºÄÕßÖмƣ¬£¬ £¬£¬£¬Õ©Æ­Õß±ã¿ÉÄܲ»½»¸¶¶©¹ºµÄ²úÆ·»òÇÔÈ¡Æä¸¶¿îÏêϸÐÅÏ¢£¬£¬ £¬£¬£¬ÊµÑé½ðÈÚڲƭ¡£¡£¡£ÓÉÓÚMetaµÄ¹ã¸æÊý¾Ý±£´æ¹æÔòÏà¶ÔËÉи£¬£¬ £¬£¬£¬·ÀÓùÕßÔÚ×·×ÙÕâЩ¿ìËÙÆô¶¯ºÍ×èÖ¹µÄÕ©Æ­»î¶¯Ê±ÃæÁÙÖØ´óÌôÕ½¡£¡£¡£Silent PushÖÒÑԳƣ¬£¬ £¬£¬£¬ºÚ¿ÍÕýÔÚʹÓÃÕâÐ©Ú²Æ­ÍøÕ¾¾ÙÐÐÖÖÖÖÀàÐ͵ĽðÈÚڲƭ£¬£¬ £¬£¬£¬ÇÒÏÖÔÚÏÕЩ²»¿ÉÄÜÖÜȫ׷×Ù¸ÃÍøÂçÉϵĶñÒâ¹ã¸æ¡£¡£¡£Òò´Ë£¬£¬ £¬£¬£¬ÏûºÄÕßÐèÌá¸ßСÐÄ£¬£¬ £¬£¬£¬×èÖ¹ÊÜÆ­ÊÜÆ­£¬£¬ £¬£¬£¬Í¬Ê±£¬£¬ £¬£¬£¬Ïà¹ØÆ½Ì¨Ò²Ó¦ÔöÇ¿î¿Ïµ£¬£¬ £¬£¬£¬ÍêÉÆ¹ã¸æÊý¾Ý±£´æ¹æÔò£¬£¬ £¬£¬£¬ÒÔÓÐÓù¥»÷´ËÀàÕ©Æ­»î¶¯¡£¡£¡£


https://cybernews.com/security/thousands-domains-pushing-phony-deals-on-facebook/


3. ·Ñ³ÇMastery SchoolsÔâÀÕË÷¹¥»÷£¬£¬ £¬£¬£¬³¬3.7ÍòÈËÊý¾Ýй¶


6ÔÂ10ÈÕ£¬£¬ £¬£¬£¬·Ñ³ÇÌØÐíÑ§Ð£ÍøÂçMastery SchoolsÓÚ2024Äê9ÔÂÔâÓöÀÕË÷Èí¼þ¹¥»÷£¬£¬ £¬£¬£¬µ¼ÖÂ37,031ÈËСÎÒ˽¼ÒÊý¾Ýй¶¡£¡£¡£´Ë´ÎÊÂÎñÉæ¼°¸ÃѧУÔڷѳǼ°¿¨Ä·µÇÔËÓªµÄ23ËùУ԰£¬£¬ £¬£¬£¬Ô¼14,000ÃûѧÉúÊܵ½Ó°Ïì¡£¡£¡£Ð¹Â¶µÄÃô¸ÐÐÅÏ¢ÆÕ±é£¬£¬ £¬£¬£¬°üÀ¨Éç»á°ü¹ÜºÅ¡¢Ò½ÁƼͼ¡¢Ñ§Éúµµ°¸¡¢ÒøÐм°²ÆÎñÐÅÏ¢¡¢ÉúÎïʶ±ðÊý¾ÝµÈ¡£¡£¡£¹¥»÷µ¼ÖÂѧУ½¹µãÓªÒµÖÐÖ¹£¬£¬ £¬£¬£¬ÀÕË÷×éÖ¯DragonForceÐû³Æ¶ÔÊÂÎñÈÏÕæ£¬£¬ £¬£¬£¬²¢Éù³ÆÇÔÈ¡ÁË171GBÊý¾Ý£¬£¬ £¬£¬£¬µ«Mastery Schoolsδ֤ʵ¸Ã˵·¨£¬£¬ £¬£¬£¬Ò²Î´Í¸Â¶ÈëÇÖ·½·¨»òÊÇ·ñÖ§¸¶Êê½ð¡£¡£¡£Ð£·½ÌåÏÖ£¬£¬ £¬£¬£¬ÒÑÈ·¶¨Î´¾­ÊÚȨÕßÏÂÔØÁ˲¿·ÖÊý¾Ý£¬£¬ £¬£¬£¬µ«ÏÖÔÚÉÐÎÞÖ¤¾ÝÅú×¢Êý¾Ý±»ÓÃÓÚÉí·ÝµÁÓûòڲƭ¡£¡£¡£ÎªÐ­ÖúÊÜÓ°ÏìÖ°Ô±£¬£¬ £¬£¬£¬Mastery Schoolsͨ¹ýExperianµÄIdentityWorksЧÀÍÌṩÃâ·ÑÉí·Ý±£»£»£»£»£»¤£¬£¬ £¬£¬£¬²¢ÔöÇ¿Á˶àÒòËØÈÏÖ¤Ó¦Óá¢ÌáÉýÁËÖÕ¶Ë¼à¿ØÄÜÁ¦£¬£¬ £¬£¬£¬Í¬Ê±ÒýÈëÍâ²¿ÍøÂçÇ徲ר¼ÒÍŶӲ¢ÁªºÏÁª°îÖ´·¨²¿·ÖÉîÈëÊӲ졣¡£¡£ComparitechÊý¾ÝÏÔʾ£¬£¬ £¬£¬£¬2024ÄêÃÀ¹úѧУ¼°´óѧ¹²ÔâÓö79ÆðÀÕË÷¹¥»÷£¬£¬ £¬£¬£¬²¨¼°½ü290ÍòÌõ¼Í¼£¬£¬ £¬£¬£¬´ËÀ๥»÷³£µ¼ÖÂÖØ´óÔËÓªÖÐÖ¹£¬£¬ £¬£¬£¬È翼ÊÔÑÓÆÚ¡¢Ð½×Êϵͳ̱»¾µÈ£¬£¬ £¬£¬£¬¶Ô½ÌÓý»ú½á¹¹³ÉÑÏÖØÓ°Ïì¡£¡£¡£


https://www.infosecurity-magazine.com/news/mastery-schools-data-breach/


4. ¡°Çå¾²Ðж¯¡±¹ú¼ÊÖ´·¨£º¹¥»÷¶à¹úÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ


6ÔÂ11ÈÕ£¬£¬ £¬£¬£¬´úºÅΪ¡°Çå¾²Ðж¯¡±µÄ¹ú¼ÊÖ´·¨Ðж¯ÓÚ2025Äê1ÔÂÖÁ4Ô¿ªÕ¹£¬£¬ £¬£¬£¬Óɹú¼ÊÐ̾¯×é֯ǣͷ£¬£¬ £¬£¬£¬Õë¶Ô26¸ö¹ú¼ÒµÄÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ»ù´¡ÉèÊ©Õö¿ª´ó¹æÄ£¹¥»÷¡£¡£¡£Ðж¯Öص㹥»÷ͨ¹ýÆÕ±éѬȾÇÔÈ¡²ÆÎñºÍСÎÒ˽¼ÒÊý¾ÝµÄÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÍŻ¡£¡£ÐÅÏ¢ÇÔÈ¡ÕßÇÔÈ¡ÕË»§Æ¾Ö¤¡¢ä¯ÀÀÆ÷CookieºÍ¼ÓÃÜÇ®±ÒÇ®°üÏêÇéµÈÊý¾Ý£¬£¬ £¬£¬£¬»ã±à³É¡°ÈÕÖ¾¡±ÔÚÍøÂç·¸·¨Êг¡³öÊÛ»òÓÃÓÚ¶¨Ïò¹¥»÷¸ß¼ÛÖµÊܺ¦Õß¡£¡£¡£´Ë´ÎÐж¯Ð§¹ûÏÔÖø£º¹Ø±Õ³¬20000¸öÓëÐÅÏ¢ÇÔÈ¡ÕßÏà¹ØµÄ¶ñÒâIP/ÓòÃû£¬£¬ £¬£¬£¬²é»ñ41̨֧³ÖÐÅÏ¢ÇÔÈ¡»î¶¯µÄЧÀÍÆ÷£¬£¬ £¬£¬£¬¾Ð²¶32ÃûÏÓÒÉÈË£¬£¬ £¬£¬£¬Ã»ÊÕ100GBÊý¾Ý£¬£¬ £¬£¬£¬²¢Í¨Öª216000ÃûÊܺ¦Õß¡£¡£¡£Õþ¸®»¹·¢Ã÷Ïã¸ÛÓÐ117̨ЧÀÍÆ÷×é³ÉµÄ´óÐͼ¯Èº£¬£¬ £¬£¬£¬±»ÓÃ×÷ÍøÂç´¹ÂÚ¡¢ÍøÂçڲƭºÍÉ罻ýÌåÕ©Æ­Ðж¯µÄÏÂÁîºÍ¿ØÖÆ£¨C2£©»ù´¡ÉèÊ©¡£¡£¡£Ô½ÄϾ¯·½ÔÚ´Ë´ÎÐж¯ÖÐÌåÏÖÍ»³ö£¬£¬ £¬£¬£¬¾Ð²¶18ÃûÏÓÒÉÈË£¬£¬ £¬£¬£¬ÆäÖаüÀ¨Ò»ÃûרÃųöÊÛ¹«Ë¾ÕË»§µÄÍøÂç·¸·¨¼¯ÍÅÍ·Ä¿¡£¡£¡£Ðж¯»¹»ñµÃ¿¨°Í˹»ù¡¢Group-IBºÍÇ÷ÊÆ¿Æ¼¼µÈ˽ÈËÍøÂçÇå¾²ÏàÖúͬ°éµÄЭÖú¡£¡£¡£Group-IBÖ¸³ö£¬£¬ £¬£¬£¬Ðж¯ÒÑÓ°ÏìÓëLumma¡¢RiseProºÍMETA StealerÏà¹ØµÄ»ù´¡ÉèÊ©£¬£¬ £¬£¬£¬Ñо¿Ö°Ô±ÏòÕþ¸®ÌṩҪº¦Ê¹ÃüÇ鱨£¬£¬ £¬£¬£¬²¢×·×ÙÁËÔËÓªÉÌÓÃÓÚÐû´«¶ñÒâÈí¼þºÍ³öÊÛ±»µÁÊý¾ÝµÄTelegramºÍ°µÍøÕË»§¡£¡£¡£


https://www.bleepingcomputer.com/news/security/operation-secure-disrupts-global-infostealer-malware-operations/


5. ÒÁÀû°ü¹Ü¼¯ÍÅÔâÍøÂç¹¥»÷µ¼ÖÂÓªÒµÖÐÖ¹


6ÔÂ11ÈÕ£¬£¬ £¬£¬£¬ÒÁÀû°ü¹Ü¹«Ë¾£¨Erie Insurance£©ºÍÒÁÀûÅâ³¥¹«Ë¾¿ËÈÕ͸¶£¬£¬ £¬£¬£¬ÖÜÄ©±¬·¢µÄÍøÂç¹¥»÷Êǵ¼ÖÂÆäÍøÕ¾ÓªÒµÖÐÖ¹Ç徲̨̱»¾µÄÔµ¹ÊÔ­ÓÉ¡£¡£¡£ÒÁÀûÅâ³¥¹«Ë¾×÷ΪÒÁÀû°ü¹Ü¼¯ÍŵÄÖÎÀí¹«Ë¾£¬£¬ £¬£¬£¬¸Ã¼¯ÍÅÊÇÒ»¼ÒÓµÓÐÁè¼Ý600Íò·ÝÓÐÓñ£µ¥µÄ¹¤ÒµºÍÒâÍâÏÕ°ü¹Ü¹«Ë¾£¬£¬ £¬£¬£¬Í¨¹ý×ÔÁ¦ÊðÀíÈËÌṩ¶àÖÖ°ü¹ÜЧÀÍ¡£¡£¡£×Ô6ÔÂ7ÈÕÐÇÆÚÁùÆð£¬£¬ £¬£¬£¬Erie Insurance±ãÔâÊÜ´óÃæ»ýÍ£µçºÍÓªÒµÖÐÖ¹£¬£¬ £¬£¬£¬¿Í»§ÎÞ·¨µÇ¼¿Í»§ÃÅ»§£¬£¬ £¬£¬£¬ÔÚÌá³öË÷Åâ»òÎüÊÕÎļþʱÓöµ½ÄÑÌâ¡£¡£¡£ÒÁÀûÅâ³¥¼¯ÍÅÒÑÏòÃÀ¹ú֤ȯÉúÒâίԱ»áÌá½»8-K±í¸ñ£¬£¬ £¬£¬£¬³ÆÔÚ6ÔÂ7ÈÕ¼ì²âµ½¡°Òì³£ÍøÂç»î¶¯¡±¡£¡£¡£ÒÁÀû°ü¹ÜÍøÕ¾Ò²Ðû²¼Í¨Öª£¬£¬ £¬£¬£¬³ÆÐÅÏ¢Çå¾²ÍŶÓÔÚ6ÔÂ7ÈÕ·¢Ã÷Òì³£ÍøÂç»î¶¯£¬£¬ £¬£¬£¬²¢Á¬Ã¦½ÓÄÉÐж¯Ó¦¶Ô£¬£¬ £¬£¬£¬ÒÔ±£»£»£»£»£»¤ÏµÍ³ºÍÊý¾Ý¡£¡£¡£¹«Ë¾ÒÑÆô¶¯ÊÂÎñÏìӦЭÒ飬£¬ £¬£¬£¬²¢½ÓÄɱ£»£»£»£»£»¤²½·¥È·±£ÏµÍ³Çå¾²¡£¡£¡£ÏÖÔÚ£¬£¬ £¬£¬£¬ÒÁÀû°ü¹ÜÕýÔÚÓëÖ´·¨²¿·ÖÏàÖú£¬£¬ £¬£¬£¬²¢ÔÚÍøÂçÇ徲ר¼ÒµÄЭÖúϾÙÐÐÖÜÈ«µÄȡ֤ÆÊÎö£¬£¬ £¬£¬£¬ÒÔÖÜÈ«ÏàʶÊÂÎñ¡£¡£¡£¹«Ë¾ÖÒÑԳƣ¬£¬ £¬£¬£¬ÔÚÍ£µçʱ´ú²»»áÖµç»ò·¢Ë͵ç×ÓÓʼþ¸ø¿Í»§ÒªÇ󸶿£¬ £¬£¬£¬²¢½¨Òé¿Í»§²»Òªµã»÷δ֪ȪԴµÄÁ´½Ó»òÌṩСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¹ØÓÚÐèÒªÌá³öË÷ÅâµÄͶ±£ÈË£¬£¬ £¬£¬£¬¹«Ë¾ÌṩÁËÁªÏµÍâµØÊðÀíÈË»òERIEÊ×´ÎËðʧ֪ͨÍŶӵĵ绰£¬£¬ £¬£¬£¬ÒÔ¼°¿Í»§Ð§À͵绰¡£¡£¡£ÏÖÔÚ£¬£¬ £¬£¬£¬ÉÐδȷ¶¨´Ë´Î¹¥»÷ÊÇ·ñΪÀÕË÷Èí¼þ¹¥»÷£¬£¬ £¬£¬£¬Ò²Î´Í¸Â¶Êý¾ÝÊÇ·ñÔÚ¹¥»÷Àú³ÌÖб»µÁ¡£¡£¡£ÒÁÀûÌåÏÖ£¬£¬ £¬£¬£¬¸ÃÊÂÎñµÄËùÓйæÄ£¡¢ÐÔ×ÓºÍÓ°ÏìÈÔÓдý½øÒ»²½È·¶¨¡£¡£¡£


https://www.bleepingcomputer.com/news/security/erie-insurance-confirms-cyberattack-behind-business-disruptions/


6. Roundcube RCEÎó²î²¹¶¡ºóÔâʹÓ㬣¬ £¬£¬£¬³¬8Íǫ̀ЧÀÍÆ÷ÊÜÓ°Ïì


6ÔÂ11ÈÕ£¬£¬ £¬£¬£¬RoundcubeÕâһʢÐÐWebÓʼþƽ̨¿ËÈÕÆØ³öÑÏÖØÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©Îó²î£¨±àºÅCVE-2025-49113£©£¬£¬ £¬£¬£¬¸ÃÎó²îÔÚ²¹¶¡Ðû²¼½ö¼¸Ììºó¾Í±»ÍþвÐÐΪÕßʹÓ㬣¬ £¬£¬£¬¹¥»÷ÁËÁè¼Ý80,000Ì¨ÃæÏò»¥ÁªÍøµÄЧÀÍÆ÷¡£¡£¡£¸ÃÎó²îCVSSÆÀ·Ö¸ß´ï9.9£¬£¬ £¬£¬£¬´ËǰÒÑDZÔÚÊ®ÓàÄ꣬£¬ £¬£¬£¬¹¥»÷Õ߿ɽè´Ë¿ØÖÆÊÜÓ°Ïìϵͳ²¢ÔËÐжñÒâ´úÂ룬£¬ £¬£¬£¬¶ÔÓû§ºÍ×éÖ¯×é³ÉÖØ´óΣº¦¡£¡£¡£FearsOffÊ×´´È˼æÊ×ϯִÐйÙKirill Firsov·¢Ã÷ÁË´ËÎó²î£¬£¬ £¬£¬£¬ËûÔ¤¼Æ¸ÃÎó²îÓ°ÏìÁè¼Ý5300Íǫ̀Ö÷»ú£¬£¬ £¬£¬£¬°üÀ¨Ê¹ÓÃcPanel¡¢PleskµÈ¹¤¾ßµÄЧÀÍÆ÷¡£¡£¡£NISTÐû²¼µÄÇ徲ͨ¸æÖ¸³ö£¬£¬ £¬£¬£¬Roundcube Webmail 1.5.10֮ǰµÄ°æ±¾ºÍ1.6.11֮ǰµÄ1.6.x°æ±¾±£´æ´ËÎó²î£¬£¬ £¬£¬£¬ÒòURLÖеÄ_from²ÎÊýδÔÚÌØ¶¨ÎļþÖÐÑéÖ¤£¬£¬ £¬£¬£¬µ¼ÖÂPHP¹¤¾ß·´ÐòÁл¯£¬£¬ £¬£¬£¬´Ó¶øÔÊÐí¾­ÓÉÉí·ÝÑéÖ¤µÄÓû§Ö´ÐÐÔ¶³Ì´úÂë¡£¡£¡£¸ÃÎó²îÒÑÔÚRoundcube 1.6.11ºÍ1.5.10 LTS°æ±¾ÖлñµÃÐÞ¸´¡£¡£¡£Îó²îÅû¶ºó£¬£¬ £¬£¬£¬Positive TechnologiesÑо¿Ö°Ô±Àֳɸ´ÏÖÁ˸ÃÎó²î£¬£¬ £¬£¬£¬²¢±Þ²ßÓû§Á¬Ã¦¸üÐÂÖÁ×îа汾¡£¡£¡£È»¶ø£¬£¬ £¬£¬£¬Shadowserver»ù½ð»áÑо¿Ö°Ô±ÖÒÑԳƣ¬£¬ £¬£¬£¬»¥ÁªÍøÉÏÈÔÓÐԼĪ84,000¸öRoundcubeʵÀýδ»ñµÃÐÞ²¹£¬£¬ £¬£¬£¬±£´æÑÏÖØÇå¾²Òþ»¼¡£¡£¡£


https://securityaffairs.com/178887/hacking/over-80000-servers-hit-as-roundcube-rce-bug-gets-rapidly-exploited.html