Python JSON Logger¿âÎó²îÆØ¹â£º4300Íò×°ÖÃÃæÁÙRCEΣº¦
Ðû²¼Ê±¼ä 2025-03-131. Python JSON Logger¿âÎó²îÆØ¹â£º4300Íò×°ÖÃÃæÁÙRCEΣº¦
3ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬Python JSON Logger ¿âÖÐÅû¶ÁËÒ»¸öÑÏÖØÎó²î£¨GHSA-wmxh-pxcx-9w24£©£¬£¬£¬£¬£¬£¬CVSS v3 ÑÏÖØÐÔÆ·¼¶Îª8.8/10£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÔ¼4300Íò¸ö×°ÖÃÃæÁÙÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©¹¥»÷Σº¦¡£¡£¸ÃÎó²îÔ´ÓÚδע²áµÄÒÀÀµÏî¡°msgspec-python313-pre¡±£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓôËÎó²îÔÚÖ´ÐÐÊÜÓ°Ïì°æ±¾£¨3.2.0ºÍ3.2.1£©µÄÈÕÖ¾ÊÊÓóÌÐòµÄϵͳÉÏÖ´ÐÐí§Òâ´úÂë¡£¡£¸ÃÎó²îÊÇÒÀÀµ»ìÏý¹¥»÷µÄµäµä·¶×Ó£¬£¬£¬£¬£¬£¬Ê¹ÓÃÈí¼þ¹©Ó¦Á´ÖеÄÎó²î¡£¡£Ö»¹ÜûÓÐÖ¤¾ÝÅú×¢ÔÚÎó²î´°¿Úʱ´ú±¬·¢Á˶ñÒâʹÓ㬣¬£¬£¬£¬£¬µ«¸Ã¿âµÄÆÕ±é½ÓÄÉ·Å´óÁËDZÔÚÓ°Ïì¡£¡£ÀÖ³ÉʹÓøÃÎó²î½«Ê¹¹¥»÷Õß»ñµÃ¶ÔϵͳµÄÍêÈ«¿ØÖÆÈ¨¡£¡£»£»£»£»£»£»º½â²½·¥°üÀ¨Ðû²¼v3.3.0°æ±¾£¬£¬£¬£¬£¬£¬ÍêÈ«Ïû³ýÁËmsgspec-python313-preÒÀÀµÐÔ£¬£¬£¬£¬£¬£¬²¢ÓëÇå¾²Ñо¿Ô±Ðµ÷×ªÒÆÓÐÕùÒéµÄÈí¼þ°üÃû³ÆµÄËùÓÐȨ¡£¡£Çå¾²ÍŶӽ¨ÒéÁ¬Ã¦Éý¼¶µ½v3.3.0£¬£¬£¬£¬£¬£¬ÎÞ·¨Á¬Ã¦¸üеÄ×éÖ¯Ó¦ÉóºËÆäPythonÇéÐΡ£¡£´ËÎó²î͹ÏÔÁËPythonÉú̬ϵͳÔÚÆ½ºâ¿ÉÓÃÐÔºÍÇå¾²ÐÔ·½ÃæÃæÁÙµÄÒ»Á¬ÌôÕ½£¬£¬£¬£¬£¬£¬²¢´ÙʹÖ÷Òª¿ªÔ´ÉçÇøÖØÐÂÉóÔÄÒÀÀµÖÎÀíʵ¼ù¡£¡£
https://cybersecuritynews.com/popular-python-library-vulnerability/
2. Áè¼Ý300¸öÒªº¦»ù´¡ÉèÊ©×éÖ¯Êܵ½MedusaÀÕË÷Èí¼þ¹¥»÷
3ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬CISA¡¢FBIºÍ¶àÖÝÐÅÏ¢¹²ÏíÓëÆÊÎöÖÐÐÄ(MS-ISAC)ÁªºÏÐû²¼Í¨¸æ³Æ£¬£¬£¬£¬£¬£¬×èÖ¹2025Äê2Ô£¬£¬£¬£¬£¬£¬MedusaÀÕË÷Èí¼þÐж¯ÒÑÓ°ÏìÃÀ¹ú300¶à¸öÒªº¦»ù´¡ÉèÊ©ÁìÓòµÄ×éÖ¯£¬£¬£¬£¬£¬£¬Éæ¼°Ò½ÁÆ¡¢½ÌÓý¡¢Ö´·¨¡¢°ü¹Ü¡¢ÊÖÒÕºÍÖÆÔìÒµµÈ¶à¸öÐÐÒµ¡£¡£Îª·ÀÓùMedusaÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬½¨Òé×éÖ¯½ÓÄÉ»º½â²½·¥£¬£¬£¬£¬£¬£¬°üÀ¨ÐÞ²¹Çå¾²Îó²î¡¢·Ö¶ÎÍøÂç¡¢¹ýÂËÍøÂçÁ÷Á¿µÈ¡£¡£MedusaÀÕË÷Èí¼þÍÅ»ï×Ô2021Äê1Ô·ºÆð£¬£¬£¬£¬£¬£¬2023Äê×îÏÈ»îÔ¾£¬£¬£¬£¬£¬£¬ÒÑÔÚÈ«ÇòÔì³É400¶àÃûÊܺ¦Õߣ¬£¬£¬£¬£¬£¬²¢Í¨¹ýйÃÜÍøÕ¾ºÍÆáºÚÀÕË÷ÃÅ»§ÍøÕ¾ÏòÊܺ¦ÕßʩѹҪÇóÖ§¸¶Êê½ð¡£¡£¸ÃÍÅ»ï½ÓÄÉÀÕË÷Èí¼þ¼´Ð§ÀÍ(RaaS)ÔËÓªºÍͬÃËģʽ£¬£¬£¬£¬£¬£¬ÕÐļ³õʼ»á¼û¾¼ÍÈËÒÔ»ñµÃ¶ÔDZÔÚÊܺ¦Õߵijõʼ»á¼ûȨ¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¶à¸ö¶ñÒâÈí¼þ¼Ò×åºÍÍøÂç·¸·¨Ðж¯¶¼×Ô³ÆÊÇMedusa£¬£¬£¬£¬£¬£¬µ¼Ö¹ØÓÚMedusaÀÕË÷Èí¼þµÄ±¨µÀ·ºÆð»ìÏý¡£¡£ÉϸöÔ£¬£¬£¬£¬£¬£¬CISAºÍFBI»¹Ðû²¼Á˹ØÓÚGhostÀÕË÷Èí¼þ¹¥»÷µÄÁªºÏ¾¯±¨£¬£¬£¬£¬£¬£¬³Æ¶à¸öÐÐÒµÁìÓòµÄÊܺ¦Õß¶¼Êܵ½Á˹¥»÷¡£¡£
https://www.bleepingcomputer.com/news/security/cisa-medusa-ransomware-hit-over-300-critical-infrastructure-orgs/
3. ³¯ÏÊAPT37×éÖ¯ÍÆ³öÐÂÐÍAndroidÌØ¹¤Èí¼þKoSpy
3ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬Ò»ÖÖÃûΪ¡°KoSpy¡±µÄÐÂÐÍAndroidÌØ¹¤Èí¼þÓ볯ÏÊÍþв×éÖ¯APT37£¨ÓÖÃû¡°ScarCruft¡±£©Óйأ¬£¬£¬£¬£¬£¬¸Ã×é֯ͨ¹ýÖÁÉÙÎå¸ö¶ñÒâÓ¦ÓóÌÐòÉøÍ¸µ½Google PlayºÍµÚÈý·½Ó¦ÓÃÊÐËÁAPKPure¡£¡£ÕâЩӦÓóÌÐòαװ³ÉÎļþÖÎÀíÆ÷¡¢Çå¾²¹¤¾ßºÍÈí¼þ¸üгÌÐò£¬£¬£¬£¬£¬£¬Õë¶Ôº«ÓïºÍÓ¢ÓïÓû§¡£¡£Ò»µ©¼¤»î£¬£¬£¬£¬£¬£¬KoSpy»á´ÓFirebase FirestoreÊý¾Ý¿âÖмìË÷¼ÓÃÜÉèÖÃÎļþ£¬£¬£¬£¬£¬£¬ÅþÁ¬µ½ÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷£¬£¬£¬£¬£¬£¬²¢ÔËÐÐÖÖÖÖÊý¾ÝÍøÂ繦Ч£¬£¬£¬£¬£¬£¬Èç×èµ²¶ÌÐźÍͨ»°¼Í¼¡¢ÊµÊ±×·×ÙGPSλÖá¢ÇÔÈ¡Îļþ¡¢Â¼ÖÆÒôƵºÍÊÓÆµµÈ¡£¡£Ö»¹ÜÕâЩӦÓóÌÐòÒÑ´ÓGoogle PlayºÍAPKPureÖÐÒÆ³ý£¬£¬£¬£¬£¬£¬µ«Óû§ÈÔÐèÊÖ¶¯Ð¶Ôز¢Ê¹ÓÃÇå¾²¹¤¾ßɨÃè×°±¸¡£¡£Google Play ProtectÄܹ»×èÖ¹ÒÑÖªµÄ¶ñÒâÓ¦ÓóÌÐò£¬£¬£¬£¬£¬£¬×ÊÖúÌá·ÀKoSpy¡£¡£¹È¸èÒÑÈ·ÈÏËùÓÐKoSpyÓ¦ÓÃÒÑ´ÓGoogle PlayÖÐɾ³ý£¬£¬£¬£¬£¬£¬ÏìÓ¦µÄFirebaseÏîĿҲÒѱ»³·Ï¡£¡£Ê¹ÓÃÇøÓòÓïÑÔÅú×¢ÕâÊÇÓÐÕë¶ÔÐԵĶñÒâÈí¼þ£¬£¬£¬£¬£¬£¬Google Play Protect»á×Ô¶¯±£»£»£»£»£»£»¤AndroidÓû§ÃâÊÜÒÑÖª°æ±¾µÄ¶ñÒâÈí¼þË𺦡£¡£
https://www.bleepingcomputer.com/news/security/new-north-korean-android-spyware-slips-onto-google-play/
4. MozillaÖÒÑÔ£ºFirefoxÓû§Ðè¸üÐÂä¯ÀÀÆ÷ÒÔ×èÖ¹Ç徲Σº¦
3ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬Mozilla½üÆÚÖÒÑÔFirefoxÓû§£¬£¬£¬£¬£¬£¬Îñ±Ø½«Æää¯ÀÀÆ÷¸üе½×îа汾£¬£¬£¬£¬£¬£¬ÒÔ×èÖ¹Òò¹«Ë¾µÄÒ»¸ö¸ùÖ¤Êé¼´½«µ½ÆÚ¶ø¿ÉÄܵ¼ÖµÄÖÐÖ¹ºÍÇ徲Σº¦¡£¡£¸Ã¸ùÖ¤ÊéÓÃÓÚÇ©Êð°üÀ¨Firefox×Ô¼º¼°MozillaÏîÄ¿¸½¼Ó×é¼þÔÚÄÚµÄÄÚÈÝ£¬£¬£¬£¬£¬£¬½«ÓÚ2025Äê3ÔÂ14ÈÕµ½ÆÚ¡£¡£ÎªÈ·±£Õý³£Ê¹Óø½¼Ó×é¼þ²¢×èÖ¹Ç徲Σº¦£¬£¬£¬£¬£¬£¬Óû§Ð轫ä¯ÀÀÆ÷¸üÐÂÖÁFirefox 128£¨2024Äê7ÔÂÐû²¼£©»ò¸ü¸ß°æ±¾£¬£¬£¬£¬£¬£¬ÒÔ¼°¡°À©Õ¹Ö§³Ö°æ±¾¡±£¨ESR£©Óû§µÄESR 115.13»ò¸ü¸ß°æ±¾¡£¡£ÕâЩΣº¦°üÀ¨¶ñÒâ²å¼þ¿ÉÄÜÈÆ¹ýÇå¾²±£»£»£»£»£»£»¤Ð¹Â¶Óû§Êý¾Ý¡¢²»ÊÜÐÅÈεÄÖ¤Êé¿ÉÄÜÔÊÐíÓû§»á¼ûڲƻò²»Çå¾²µÄÍøÕ¾£¬£¬£¬£¬£¬£¬ÒÔ¼°ÃÜÂëй¶¾¯±¨¿ÉÄÜ×èÖ¹ÊÂÇéµÈ¡£¡£Óû§¿Éͨ¹ýä¯ÀÀÆ÷²Ëµ¥¼ì²é²¢È·Èϰ汾£¬£¬£¬£¬£¬£¬´Ë²Ù×÷Ò²»á×Ô¶¯´¥·¢¸üмì²é¡£¡£¸ÃÎÊÌâÓ°ÏìËùÓÐÆ½Ì¨ÉϵÄFirefox£¬£¬£¬£¬£¬£¬µ«iOS³ýÍâ¡£¡£Mozilla½¨ÒéÓû§¸üе½×îа汾ÒÔÈ·±£ä¯ÀÀÆ÷Çå¾²¸ßЧ£¬£¬£¬£¬£¬£¬²¢ÎªÓöµ½ÎÊÌâµÄÓû§ÉèÖÃÁËÖ§³ÖÏ̡߳£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬»ùÓÚFirefoxµÄä¯ÀÀÆ÷ÈçTor¡¢LibreWolfºÍWaterfoxµÄÓû§Ò²Ó¦È·±£ÔËÐеÄÊÇ»ùÓÚFirefox 128¼°¸ü¸ß°æ±¾µÄ°æ±¾¡£¡£
https://www.bleepingcomputer.com/news/software/mozilla-warns-users-to-update-firefox-before-certificate-expires/
5. ÈÕ±¾Ôâ¡°MirrorFace¡±APT¹¥»÷£¬£¬£¬£¬£¬£¬Ê¹ÓÃWindows SandboxÌӱܼì²â
3ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬ÈÕ±¾¹ú¼Ò¾¯Ô±ÌüºÍ¹ú¼ÒÍøÂçÇå¾²ÊÂÎñ×¼±¸ºÍÕ½ÂÔÖÐÐÄÐû²¼ÁËÒ»·ÝÇ徲ͨ¸æ£¬£¬£¬£¬£¬£¬ÖÒÑÔÈÕ±¾×éÖ¯ÃæÁÙÀ´×Ô¡°MirrorFace¡±ÕâÒ»APT10×Ó×éÖ¯µÄ¸ß¼¶Ò»Á¬ÐÔÍþв¹¥»÷¡£¡£¸Ã×é֯ʹÓÃWindows SandboxºÍVisual Studio CodeÖ´ÐжñÒâ»î¶¯£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃÁËÃûΪ¡°LilimRAT¡±µÄ¶¨ÖƶñÒâÈí¼þ£¬£¬£¬£¬£¬£¬×¨ÃÅÉè¼ÆÔÚWindows SandboxÖÐÔËÐУ¬£¬£¬£¬£¬£¬ÒÔÌÓ±ÜÖ÷»úϵͳÉÏÇå¾²¹¤¾ßµÄ¼ì²â¡£¡£¹¥»÷Õßͨ¹ýÆôÓÃWindows Sandbox¡¢½¨Éè×Ô½ç˵ÉèÖÃÎļþºÍÔÚ¸ôÀëÇéÐÎÖÐÖ´ÐжñÒâÈí¼þµÈÖØ´óµÄ¶à½×¶Î¹¥»÷Á÷³Ì£¬£¬£¬£¬£¬£¬ÔÚÊÜѬȾϵͳÉϼá³Ö³¤ÆÚÐÔ²¢×î´óÏ޶ȵØïÔ̻ºÛ¼£¡£¡£ÓÉÓÚWindows SandboxĬÈϽûÓÃÇÒWindows DefenderÔÚÆäÖÐҲĬÈϽûÓ㬣¬£¬£¬£¬£¬Îª¹¥»÷ÕßÌṩÁËÒ»¸ö²»Çå¾²µÄ²Ù×÷ÇéÐΡ£¡£Ç徲ר¼Ò½¨Òé¼á³ÖWindows Sandbox½ûÓÃ״̬£¬£¬£¬£¬£¬£¬¼à¿ØÏà¹ØÀú³Ì£¬£¬£¬£¬£¬£¬ÏÞÖÆÖÎÀíȨÏÞ£¬£¬£¬£¬£¬£¬²¢ÊµÑéAppLockerÕ½ÂÔ£¬£¬£¬£¬£¬£¬ÒÔ±ÜÃâδ¾ÊÚȨִÐÐWindows Sandbox¡£¡£
https://cybersecuritynews.com/mirrorface-apt-hackers-exploited-windows-sandbox-visual-studio-code/
6. FacebookÖÒÑÔ£ºFreeType×ÖÌå¿â¸ßΣÎó²îÐè½ôÆÈÉý¼¶
3ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬Facebook¿ËÈÕ·¢³öÖÒÑÔ£¬£¬£¬£¬£¬£¬Ö¸³öÔÚFreeType 2.13¼°ÒÔÉϰ汾Öб£´æÒ»¸ö¸ßΣÎó²î£¨CVE-2025-27363£©£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂí§Òâ´úÂëÖ´ÐУ¬£¬£¬£¬£¬£¬ÇÒÒÑÓб¨¸æ³Æ¸ÃÎó²îÕýÔÚ±»Æð¾¢Ê¹ÓþÙÐй¥»÷¡£¡£FreeTypeÊÇÒ»¸öÆÕ±éʹÓõĿªÔ´×ÖÌåäÖȾ¿â£¬£¬£¬£¬£¬£¬×°ÖÃÔÚ°üÀ¨Linux¡¢AndroidµÈ¶à¸öϵͳºÍЧÀÍÖС£¡£¸ÃÎó²îÔÚʵÑéÆÊÎöTrueType GXºÍ¿É±ä×ÖÌåÎļþÏà¹ØµÄ×ÖÌå×Ó×ÖÐνṹʱ±¬·¢Ô½½çдÈ룬£¬£¬£¬£¬£¬±£´æÓÚFreeType 2.13.0¼°ÒÔϰ汾ÖУ¬£¬£¬£¬£¬£¬µ«ÒÑÔÚ2.13.0°æ±¾µÄ¸üÐÂÖеÃÒÔÐÞ¸´¡£¡£Ö»¹Ü×îеÄÒ×Êܹ¥»÷°æ±¾ÒÑÓÐÁ½ÄêÀúÊ·£¬£¬£¬£¬£¬£¬µ«¾ÉµÄ¿â°æ±¾ÔÚÈí¼þÏîÄ¿ÖпÉÄܺã¾Ã±£´æ£¬£¬£¬£¬£¬£¬Òò´ËÈí¼þ¿ª·¢Ö°Ô±ºÍÏîÄ¿ÖÎÀíÔ±Ð辡¿ìÉý¼¶µ½×îа汾FreeType 2.13.3£¬£¬£¬£¬£¬£¬ÒÔ×èֹDZÔÚµÄÇ徲Σº¦¡£¡£FacebookÌåÏÖ£¬£¬£¬£¬£¬£¬ËûÃÇ·¢Ã÷´ËÎó²îºó¾ÙÐÐÁ˱¨¸æ£¬£¬£¬£¬£¬£¬Ö¼ÔÚÔöǿÿСÎÒ˽¼ÒµÄÔÚÏßÇå¾²£¬£¬£¬£¬£¬£¬²¢ÖÂÁ¦ÓÚ±£»£»£»£»£»£»¤Óû§µÄ˽ÈËͨѶ¡£¡£¿£¿£¿£¿£Ë¼Á¿µ½FreeTypeµÄÆÕ±éÓ¦Ó㬣¬£¬£¬£¬£¬¾¡¿ì½â¾ö¸ÃÎó²î¹ØÓÚ°ü¹ÜÍøÂçÇå¾²ÖÁ¹ØÖ÷Òª¡£¡£
https://www.bleepingcomputer.com/news/security/facebook-discloses-freetype-2-flaw-exploited-in-attacks/


¾©¹«Íø°²±¸11010802024551ºÅ