CVE-2024-27564·ì϶£ºChatGPT»ù´¡ÉèÊ©Ãæ¶ÔSSRF¹¥»÷Íþв

°ä²¼¹¦·ò 2025-03-18

1. CVE-2024-27564·ì϶£ºChatGPT»ù´¡ÉèÊ©Ãæ¶ÔSSRF¹¥»÷Íþв


3ÔÂ17ÈÕ £¬ÍøÂ簲ȫ¹«Ë¾VeritiÔÚÆä×îÐÂ×êÑл㱨ÖнÒʾÁËOpenAIµÄChatGPT»ù´¡ÉèÊ©ÖдæÔÚµÄÒ»¸ö·þÎñÆ÷¶ËÒªÇóαÔ죨SSRF£©·ì϶ £¬¼´CVE-2024-27564 £¬Ö»¹Ü¸Ã·ì϶±»¹éΪÖеÈÑϳÁˮƽ £¬µ«ÔÚÏÖʵÊÀ½çÖÐÒѱ»»ý¼«ÀûÓà ¡£Veriti·¢ÏÖ £¬Ò»ÖÜÄÚ¾ÍÓÐ10,479´Î¹¥»÷³¢ÊÔÔ´×Ôͳһ¶ñÒâIPµØÖ· ¡£´Ë±í £¬35%µÄ×éÖ¯Òò°²ÕûϵͳÅäÖÃÃýÎó¶øÎ´ÄÜ»ñµÃ³ä·Ö±£»¤ £¬ÆäÖÐÃÀ¹úÔâ·êµÄ¹¥»÷×îΪ¼¯ÖÐ £¬Õ¼±È33% £¬Æä´ÎÊǵ¹úºÍÌ©¹ú £¬¾ùΪ7% ¡£¹¥»÷»î¶¯ÔÚ1Ô·ݼ¤Ôö £¬ËæºóÓÐËù½µÂä ¡£½ðÈÚÐÐÒµ³ÉÎªÖØÒª¹¥»÷Ö¸±ê £¬ÒòÆäÑϳÁÒÀÀµAI·þÎñºÍAPI¼¯³É £¬Ò×ÊÜSSRF¹¥»÷Íþв £¬¿ÉÄܵ¼ÖÂÊý¾Ýй¶¡¢Î´¾­ÊÚȨµÄÂòÂô¡¢¼à¹Ü´¦·£ºÍÃûÓþÇÖº¦ ¡£VeritiÇ¿µ÷ £¬²»Ó¦ºöÊÓÖеÈÑϳÁˮƽµÄ·ì϶ £¬ÓÉÓÚ¹¥»÷Õß»áÀûÓÃÈκÎÕÒµ½µÄÈõµã ¡£×êÑÐÖ¸³ö £¬·ì϶ÓÅÏȼ¶ÅÅÐò²»Ó¦½öÒÀÀµÑϳÁˮƽÆÀ·Ö £¬¹¥»÷Ç÷Ïò¿ÉÄÜѸËÙת±ä £¬Ôø±»ÒÔΪÎ޹ؽôÒªµÄ·ì϶¿ÉÄܳÉΪ¹¥»÷ý½é ¡£Òò¶ø £¬VeritiÌṩÁË»ý¼«ÀûÓô˷ì϶µÄIPµØÖ·Áбí £¬½¨Ò鰲ȫÍŶÓÁ¢¼´²é³­IPS¡¢WAFºÍ·À»ðǽÅäÖà £¬»ý¼«¼à¿ØÈÕÖ¾ £¬²éÕÒÀ´×ÔÒѼø±ð¶ñÒâIPµØÖ·µÄ¹¥»÷³¢ÊÔ £¬²¢ÔÚ·çÏÕÖÎÀíÕ½ÊõÖÐÓÅÏÈÆÀ¹ÀÓëAIÓйصݲȫ·ì϶ £¬ÒÔ¼õÇáÓëCVE-2024-27564ÓйصķçÏÕ ¡£


https://hackread.com/hackers-exploit-chatgpt-cve-2024-27564-10000-attacks/


2. ΢Èí·¢ÏÖStilachiRATľÂí£ºÌӱܼì²âÇÔÈ¡Êý¾Ý


3ÔÂ17ÈÕ £¬Î¢Èí½üÆÚ·¢ÏÖÁËÒ»ÖÖÃûΪStilachiRATµÄÐÂÐÍÔ¶³Ì½Ó¼ûľÂí £¬¸Ã¶ñÒâÈí¼þѡȡ¸´ÔÓ¼¼ÊõÌӱܼì²â¡¢Î¬³ÖÓÆ¾ÃÐÔ²¢ÇÔÈ¡Ãô¸ÐÊý¾Ý £¬Ö»¹ÜÉÐδ¿í·º´«²¼ £¬µ«Î¢ÈíÒѹ«¿ª·ÖÏíÈëÇÖÖ¸±ê»ººÍ½âÁìµ¼ ¡£StilachiRATÄÜ´Óä¯ÀÀÆ÷¡¢Êý×ÖÇ®°ü¡¢¼ôÌù°å¼°ÏµÍ³ÖÐÇÔÊØÐÅÏ¢ £¬ÓµÓÐ׳´óµÄ¿úËÅÄÜÁ¦ £¬ÈçÍøÂçϵͳӲ¼þÐÅÏ¢¡¢¼ì²âÉãÏñÍ·¼°RDP»á»°µÈ ¡£Ëü»¹ÄÜͨ¹ýWindows APIÌáÈ¡ChromeÍ´´¦ £¬¼à¿Ø¼ôÌù°åÖеÄÃô¸ÐÐÅÏ¢ £¬²¢ÀûÓÃWindows·þÎñ½ÚÔìÖÎÀíÆ÷»ñµÃÓÆ¾ÃÐÔ ¡£´Ë±í £¬StilachiRATÄܼÙÒâµÇ¼Óû§¼à¿ØRDP»á»° £¬ÊµÏÖÍøÂçÖеĺáÏòÒÆ¶¯ ¡£¸Ã¶ñÒâÈí¼þ»¹¾ß±¸¼ì²â¶ã±ÜºÍ·´È¡Ö¤Ö°ÄÜ £¬Èç¶Ï¸ùÊÂÎñÈÕÖ¾¡¢²é³­É³ºÐ»·¾³µÈ ¡£StilachiRAT¿É½ÓÊÜÀ´×ÔC2·þÎñÆ÷µÄºÅÁî £¬Ö´ÐгÁÆôϵͳ¡¢¶Ï¸ùÈÕÖ¾¡¢ÇÔȡʹ´¦µÈ²Ù×÷ ¡£ÎªÏ÷¼õ¹¥»÷Ãæ £¬Î¢Èí½¨Òé´Ó¹ÙÍøÏÂÔØÈí¼þ £¬²¢Ê¹Óð²È«Èí¼þ×èÖ¹¶ñÒâÓòºÍ¸½¼þ ¡£


https://www.bleepingcomputer.com/news/security/microsoft-new-rat-malware-used-for-crypto-theft-reconnaissance/


3. LazarusºÚ¿ÍÊÔͼϴǮºóOKXÔÝÍ£ÁËDEX¾ÛºÏÆ÷


3ÔÂ17ÈÕ £¬³¯ÏÊ Lazarus ºÚ¿Í×éÖ¯½üÆÚÖ´ÐÐÁËһ·¼ÛÖµ15ÒÚÃÀÔªµÄ¼ÓÃÜÇ®±Ò͵ÇÔ°¸ £¬ÕâÒ»ÊÂÎñÒýÆðÁË¿í·º¹Ø×¢ ¡£×÷ΪȫÇòµ±ÏȵļÓÃÜÇ®±ÒÂòÂôËùÖ®Ò» £¬OKX Ôڴ˲¼¾°Ï¾ö¶¨ÔÝÍ£ÆäÈ¥ÖÐÐÄ»¯ÂòÂôËù£¨DEX£©¾ÛºÏÆ÷·þÎñ £¬ÒÔ½øÐа²È«Éý¼¶ ¡£OKXÔÚÈ«ÇòÖÐÐÄ»¯ÂòÂôËùÏÖ»õÂòÂôÊг¡·Ý¶îÔ¼Õ¼8.0% £¬ÂòÂôÁ¿¾Þ´ó £¬Î»ÁÐÐÐҵǰÁÐ ¡£Lazarus×éÖ¯ÊÔIJÀûÓÃOKXµÄDEX·þÎñϴ媱»µÁµÄ1ÒÚÃÀÔª¼ÓÃÜÇ®±Ò £¬´ËÊÂÉõÖÁÒý·¢ÁËÅ·Ã˼à¹Ü»ú¹¹µÄµ÷²é ¡£Ö»¹ÜOKX·ñ¶¨ÁËÓйØÖ¸¿Ø £¬²¢Ö¸³öÒѶ³½áÁ÷ÈëÖÐÐÄ»¯ÂòÂôËùµÄÓйØ×ʽ𠣬µ«¹«Ë¾ÈÔ¾ö¶¨²ÉÈ¡Ðж¯ £¬ÒÔÔ¤·À·þÎñ±»ÀÄÓà ¡£OKXÔÚÓë¼à¹Ü»ú¹¹Ð­É̺ó £¬×Ô¶¯ÔÝÍ£ÁËDEX¾ÛºÏÆ÷·þÎñ £¬²¢´òËãÍÆ³ö¼ø±ðºÍ×·×ÙºÚ¿ÍÓйصØÖ·µÄϵͳ £¬Í¬Ê±ÔÚÖÐÐÄ»¯ÂòÂôËùÉÏʵʱ¹Ø±ÕÕâЩµØÖ· ¡£OKXÕýÓëÇø¿éÁ´Ë÷ÇóÕߺÏ×÷ £¬ÒÔÈ·±£ÂòÂôµÃµ½ÕýÈ·ÏóÕ÷²¢Ìá¸ß°²È«ÐÔ ¡£ÕâЩ´ëʩּÔÚ¼ÓÇ¿¼ÓÃÜÇ®±ÒÂòÂôƽ̨µÄ°²È«ÐÔ¡¢Í¨Ã÷¶ÈºÍ¼à¹ÜºÏ¹æÐÔ ¡£È»¶ø £¬Ä¿Ç°Éв»Ã÷ÏÔLazarusÊÇ·ñÄÜÈÆ¹ýÕâЩ´ëÊ© £¬»òÕß³¯ÏʺڿÍÊÇ·ñ»áתÏòÆäËû°²È«³ß¶È½ÏµÍµÄÂòÂôËù ¡£


https://www.bleepingcomputer.com/news/security/okx-suspends-dex-aggregator-after-lazarus-hackers-try-to-launder-funds/


4. tj-actionsÔ⹩¸øÁ´¹¥»÷ £¬CI/CD»úÃÜй¶·çÏÕ¸ß


3ÔÂ17ÈÕ £¬¿í·ºÊ¹ÓõÄGitHub Action¡°tj-actions/changed-files¡±½üÆÚÔâ·êÁ˹©¸øÁ´¹¥»÷ £¬µ¼ÖÂCI/CD»úÃÜ¿ÉÄÜ´ÓGitHub Actions¹¹½¨ÈÕÖ¾Öб»ÇÔÈ¡ ¡£¸Ã¹¤¾ßÔÊÐí¿ª·¢ÈËԱƾ¾ÝÀ­È¡ÒªÇó»òÌá½»Öиü¸ÄµÄÎļþ²ÉÈ¡Ðж¯ £¬³£ÓÃÓÚ²âÊÔ¡¢¹¤×÷Á÷³Ì´¥·¢¼°´úÂëÑéÖ¤ ¡£ÔÚ2025Äê3ÔÂ14ÈÕ £¬¹¥»÷Õßͨ¹ýÅú¸Ä¹¤¾ß´úÂë²¢Ïò¶à¸ö°æ±¾±êÇ©Ôö³¤¶ñÒâÌá½» £¬³É¹¦½«CI/CD»úÃÜ´ÓRunner Worker¹ý³Ìת´¢µ½Ê¹ÓøòÙ×÷µÄÈκÎÏîÖ÷ÕÅ´æ´¢¿âÖÐ ¡£ÈôÊǹ¤×÷Á÷ÈÕÖ¾¿É¹«¿ª½Ó¼û £¬ÈκÎÈ˶¼Äܹ»¶ÁÈ¡ºÍÇÔÈ¡ÕâЩ¶³öµÄ»úÃÜ ¡£¹¥»÷Õß»¹ÈëÇÖÁËÓµÓнӼû¸Ã¹¤¾ß´æ´¢¿âÌØÈ¨µÄGitHub»úеÈË(@tj-actions-bot)µÄÓ×ÎÒ½Ó¼ûÁîÅÆ(PAT) £¬µ«ÈëÇÖ·½Ê½Éв»Ã÷ÏÔ ¡£GitHubËæºóɾ³ýÁ˱»ÈëÇֵIJÙ×÷ £¬²¢¸´Ô­ÁË´æ´¢¿â £¬µ«¸Ã·ì϶¶ÔÊÜÓ°ÏìµÄÈí¼þÏîÄ¿²úÉúÁËÓÆ¾ÃÓ°Ïì £¬²¢±»·ÖÅäÁËÒ»¸öCVE ID£¨CVE-2025-30066£©ÒÔ±ã¸ú×Ù ¡£¶ñÒâ´úÂ벢佫ÄÚ´æÊä³öй¶µ½Ô¶³Ì·þÎñÆ÷ £¬¶øÊÇʹÆäÔڿɹ«¿ª½Ó¼ûµÄ´æ´¢¿âÖпɼû ¡£ÎªÁËÔ¤·ÀÀàËÆÐ¹Â¶ £¬tj-actions´æ´¢¿â½øÐÐÁ˸üР£¬ÌṩÁËÊÜÓ°ÏìÓû§±ØÒªÖ´ÐеIJÙ×÷×¢Ã÷ £¬GitHubÒ²½¨Ò齫ËùÓÐGitHub Actions pingµ½Ìض¨µÄÌá½»¹þÏ£¶ø²»Êǰ汾±êÇ© £¬²¢Ê¹ÓÃÔÊÐíÁбíÖ°ÄÜÀ´×èֹδ¾­ÊÚȨ/²»ÊÜÐÅÀµµÄGitHub Actions ¡£


https://www.bleepingcomputer.com/news/security/supply-chain-attack-on-popular-github-action-exposes-ci-cd-secrets/


5. ÐÂÐͼÓÃÜÍÚ¾ò»î¶¯ÀûÓÃÃýÎóÅäÖÃJupyter Notebook¹¥»÷


3ÔÂ15ÈÕ £¬½üÆÚ £¬Ò»ÖÖÐÂÐͼÓÃÜÍÚ¾ò»î¶¯±»·¢ÏÖ £¬¸Ã»î¶¯ÀûÓÃÃýÎóÅäÖõÄJupyter NotebooksÕë¶ÔWindowsºÍLinuxϵͳ ¡£¹¥»÷Õßͨ¹ý¶³öµÄJupyter NotebookÊ·ýÖ´ÐкÅÁî £¬³¢ÊÔ×°ÖöñÒâÈí¼þ ¡£¶ÔÓÚWindowsϵͳ £¬¹¥»÷»áÏÂÔØÒ»¸öÔ̺¬ÃûΪ¡°Binary.freedllbinary¡±µÄ64λ¿ÉÖ´ÐÐÎļþµÄMSI×°Ö÷¨Ê½ £¬¸ÃÖ´ÐÐÎļþ»á¼ÓÔØÃûΪ¡°java.exe¡±µÄ¸¨ÖúÓÐЧ¸ºÔØ £¬ÏÖʵÉÏÊÇÒ»¸öʹÓÃUPX´ò°üµÄ¶ñÒâ¶þ½øÔìÎļþ £¬ÓÃÓÚ´Ó¶à¸ö´æ´¢¿âÖмìË÷ÃûΪ¡°x2.dat¡±µÄ¼ÓÃÜblob ¡£¶ÔÓÚLinuxϵͳ £¬¹¥»÷»áÏÂÔØÒ»¸öbash¾ç±¾ £¬¸Ã¾ç±¾»á¼ìË÷Á½¸öELF¶þ½øÔìÎļþ²¢ÉèÖÃcronjobsÒÔÈ·Î¬ÓÆ¾ÃÐÔ ¡£¹¥»÷Õßѡȡ¸´ÔӵļÓÃܼ¼Êõ°µ²ØÆäÓÐÐ§ÔØºÉ £¬Ö¸±êÔ̺¬Monero¡¢Sumokoin¡¢ArQmaµÈ¶àÖÖ¼ÓÃÜÇ®±Ò ¡£Cado°²È«³¢ÊÔÊÒÖ¸³ö £¬Õâ´Î»î¶¯´ú±íÁËÒ»ÖÖÒÔǰ´Óδ±¨Â·¹ýµÄ¼ÓÃÜÍÚ¾ò¹¥»÷µÄÐÂÔØÌå ¡£×éÖ¯Ó¦Ö´ÐÐÇ¿Éí·ÝÑéÖ¤ £¬½ûÓöÔJupyterÊ·ýµÄ¹«¹²½Ó¼û £¬²¢¶¨ÆÚ¼à¿ØÔÆ»·¾³ÖеÄÒì³£»î¶¯ £¬ÒÔ¼õÇáÕâЩ¹¥»÷ ¡£


https://cybersecuritynews.com/hackers-attacking-exposed-jupyter-notebooks/


6. Apache Tomcat RCE·ì϶£¨CVE-2025-24813£©±»»ý¼«ÀûÓÃ


3ÔÂ17ÈÕ £¬Apache TomcatÖдæÔÚÒ»¸öÑϳÁµÄÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©·ì϶£¨CVE-2025-24813£© £¬¹¥»÷Õß¿Éͨ¹ýµ¥Ò»µÄPUTÒªÇóÊÕÊÜ·þÎñÆ÷ ¡£·ì϶Åû¶½ö30Ó×ʱºó £¬GitHubÉϾͰ䲼Á˸ÅÏëÑéÖ¤£¨PoC£©·ì϶ £¬ºÚ¿ÍÒÑÆðÍ·ÀûÓø÷ì϶ ¡£Wallarm°²È«×êÑÐÈËԱ֤ʵ £¬ÓÉÓÚPUTÒªÇó¿´ËÆÕý³£ÇÒ¶ñÒâÄÚÈÝʹÓÃbase64±àÂë»ìºÏ £¬´«Í³°²È«¹¤¾ßÄÑÒÔ¼ì²â ¡£¹¥»÷Õß·¢ËÍÔ̺¬base64±àÂëÐòÁл¯JavaÓÐЧ¸ºÔصÄPUTÒªÇó±£Áôµ½Tomcat»á»°´æ´¢ÖÐ £¬ÔÙ·¢ËÍ´øÓÐÖ¸Ïò»á»°ÎļþµÄJSESSIONID cookieµÄGETÒªÇó £¬ÆÈʹTomcat·´ÐòÁл¯²¢Ö´ÐжñÒâ´úÂë £¬ÎÞÐèÉí·ÝÑéÖ¤ ¡£¸Ã·ì϶ÓÉÓÚTomcat½ÓÊܲ¿ÃÅPUTÒªÇó¼°Ä¬ÈÏ»á»°ÓÆ¾ÃÐÔÒýÆð £¬Ó°Ïì¶à¸öTomcat°æ±¾ ¡£ApacheÒѰ䲼²¹¶¡ £¬½¨ÒéÓû§Éý¼¶ÖÁÒѽ¨²¹°æ±¾ £¬²¢Í¨¹ý¸´Ô­Ä¬ÈÏservletÅäÖᢹعز¿ÃÅPUTÖ§³Ö¼°Ô¤·À½«°²È«Ãô¸ÐÎļþ´æ´¢ÔÚ¹«¹²ÉÏ´«õè¾¶µÄ×ÓĿ¼ÖÐÀ´»º½âÎÊÌâ ¡£WallarmÖÒ¸æ £¬¹¥»÷Õß½«×ª±äÕ½Êõ £¬ÉÏ´«¶ñÒâJSPÎļþ¡¢Åú¸ÄÅäÖò¢ÔڻỰ´æ´¢Ö®±íÖ²ÈëºóÃÅ £¬ÕâÖ»ÊǵÚÒ»²¨¹¥»÷ ¡£


https://www.bleepingcomputer.com/news/security/critical-rce-flaw-in-apache-tomcat-actively-exploited-in-attacks/