Bitwarden CLI npm°üÔ⹩¸øÁ´¹¥»÷

°ä²¼¹¦·ò 2026-04-27

1. ZimbraÓʼþϵͳXSS·ì϶Ôâ³ÖÐø¹¥»÷


4ÔÂ24ÈÕ£¬¾Ý·ÇͶ»ú°²È«×éÖ¯ShadowserverÖҸ棬³¬¹ý10,000¸ö¶³öÔÚÍøÂçÉϵÄZimbra Collaboration SuiteʵÀýÕýÃæ¶Ô³ÖÐøµÄ¿çÕ¾¾ç±¾¹¥»÷¡£¡£ZimbraÊÇÒ»¿îÔÚÈ«ÇòÓµº±¼ûÒÚÓû§µÄÊ¢Ðеç×ÓÓʼþºÍºÏ×÷Èí¼þÌ×¼þ£¬¿í·º·þÎñÓÚÊý°Ù¸öµ±¾Ö»ú¹¹ºÍÊýǧ¼ÒÆóÒµ¡£¡£±»ÀûÓõķì϶±àºÅΪCVE-2025-48700£¬Ó°ÏìZCS 8.8.15¡¢¡¢¡¢9.0¡¢¡¢¡¢10.0ºÍ10.1°æ±¾£¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÔÚÓû§»á»°ÖÐÖ´ÐÐËÁÒâJavaScript´úÂ룬½ø¶øÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£¡£¹©¸øÉÌSynacorÒÑÓÚ2025Äê6Ô°䲼°²È«²¹¶¡£¬²¢ÖÒ¸æ¸Ã·ì϶ÀûÓÃÎÞÐèÓû§½»»¥£¬µ±Óû§ÔÚZimbra Classic UIÖв鿴¶ñÒâ»ú¹ØµÄµç×ÓÓʼþʱ¼´¿É´¥·¢¡£¡£CISA»ùÓÚÏÖʵÀûÓõÄÖ¤¾Ý£¬½«¸Ã·ì϶ÏóÕ÷ΪÒѱ»ÀûÓò¢ÁÐÈëÒÑÖªÀûÓ÷ì϶Ŀ¼£¬Í¬Ê±ºÅÁîÁª°îÃñÊÂÐÐÕþ²¿ÃÅ»ú¹¹ÔÚ4ÔÂ23ÈÕǰʵÏÖZimbra·þÎñÆ÷µÄ°²È«¼Ó¹Ì¡£¡£ÖÜÎ壬Shadowserver½øÒ»²½·¢³öÖҸ棬ÈÔÓг¬¹ý10,500̨¶³öÔÚÍâµÄZimbra·þÎñÆ÷δ´ò²¹¶¡£¬ÆäÖдó²¿ÃÅλÓÚÑÇÖÞ£¨3,794̨£©ºÍÅ·ÖÞ£¨3,793̨£©¡£¡£


https://www.bleepingcomputer.com/news/security/cisa-says-zimbra-flaw-now-exploited-over-10k-servers-vulnerable/


2. ¹«ÓÃÊÂÒµ¼¼Êõ¹«Ë¾ItronÔâÍøÂç¹¥»÷


4ÔÂ26ÈÕ£¬¹«ÓÃÊÂÒµ¼¼Êõ¹«Ë¾Itron, Inc.½üÈÕÅû¶£¬Ò»´ÎÍøÂç¹¥»÷µ¼ÖÂδ¾­ÊÚȨµÄµÚÈý·½½Ó¼ûÁËÆä²¿ÃÅÄÚ²¿ÏµÍ³¡£¡£¸Ã¹«Ë¾ÔÚÌá½»¸øÃÀ¹ú֤ȯÂòÂôίԱ»áµÄ8-KÎļþÖаµÊ¾£¬ÉϸöÔ¼ì²âµ½¸Ã»î¶¯ºó£¬Á¢¼´Æô¶¯ÁËÍøÂ簲ȫÏìÓ¦´òË㣬֪ͨÁË·¨Âɲ¿ÃÅ£¬²¢ÀñƸÁËÍⲿÕÕ·÷ÒÔÖ§³Öµ÷²éºÍÊÂÎñ½ÚÖÆ¡£¡£Ä¿Ç°£¬Î´¾­ÊÚȨµÄ»î¶¯Òѱ»×èÖ¹£¬¹«Ë¾°µÊ¾Ã»Óз¢ÏÖÈκκóÐø»î¶¯¡£¡£ItronÊÇÒ»¼Ò×ܲ¿Î»ÓÚ»ªÊ¢¶ÙµÄÉÏÊй«Ë¾£¬ÎªÄÜÔ´ºÍË®×ÊÔ´ÖÎÀíÌṩ¹«ÓÃÊÂÒµ¼¼Êõ²úÆ·ºÍ·þÎñ¡£¡£Ö»¹ÜÕâ´ÎÊÂÎñÉæ¼°ÄÚ²¿ÏµÍ³±»·¸·¨½Ó¼û£¬µ«ItronÇ¿µ÷£¬ÕⲢδ¶ÔÒµÎñÔËÓªÔì³ÉÄÚÈÝÐÔ×ÌÈÅ£¬Ä¿Ç°Ô¤¼ÆÒ²²»»á²úÉúÈκκóÐøÓ°Ïì¡£¡£´ËÍ⣬¸Ã¹«Ë¾Ô¤¼Æ´ó²¿ÃÅÓëÊÂÎñÓйصijɱ¾½«Óɱ£Ïճе£¡£¡£Itron»¹Ö¸³ö£¬Õâ´Îδ¾­ÊÚȨµÄ»î¶¯²¢Î´²¨¼°¿Í»§¡£¡£È»¶ø£¬±ØÒª°ÑÎȵÄÊÇ£¬¶Ô¸ÃÊÂÎñµÄÁìÓòºÍÓ°ÏìµÄµ÷²éÈÔÔÚ½øÐÐÖС£¡£½ØÖÁĿǰ£¬ÉÐÎÞÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü¡£¡£


https://www.bleepingcomputer.com/news/security/american-utility-firm-itron-discloses-breach-of-internal-it-network/


3. ADTÔâÊý¾Ýй¶£¬ShinyHuntersÀÕË÷ǧÍò±Ê¼Í¼


4ÔÂ24ÈÕ£¬¼ÒÍ¥°²È«¾ÞÍ·ADT½üÈÕ֤ʵ²úÉúÁËһ·Êý¾Ýй¶ÊÂÎñ£¬´ËǰÀÕË÷×éÖ¯ShinyHuntersÍþв³Æ£¬³ý·ÇÖ§¸¶Êê½ð£¬²»È»½«¹«¿ª±»µÁÊý¾Ý¡£¡£ADTÓÚ4ÔÂ20ÈÕ¼ì²âµ½Î´¾­ÊÚȨ½Ó¼û¿Í»§ºÍDZÔÚ¿Í»§Êý¾ÝµÄÐÐΪ£¬ËæºóÁ¢¼´ÖÕÖ¹ÁËÈëÇÖ²¢·¢Õ¹µ÷²é¡£¡£µ÷²éÁ˾ÖÏÔʾ£¬Õâ´ÎÊÂÎñÖÐСÎÒÐÅÏ¢±»µÁ£¬µ«ÁìÓòÓÐÏÞ¡£¡£ADT°µÊ¾£¬Ð¹Â¶µÄÐÅÏ¢½öÏÞÓÚÐÕÃû¡¢¡¢¡¢µç»°ºÅÂëºÍµØÖ·£¬ÔÚ¼«ÉÙÊýÇé¿öÏ»¹Ô̺¬µ®ÉúÈÕÆÚºÍÉç±£º£ºÅÂë»ò˰ºÅµÄºóËÄλ¡£¡£ÖÁ¹ØÖØÒªµÄÒ»µãÊÇ£¬Ã»ÓÐÈκÎÖ§¸¶ÐÅÏ¢£¨Ô̺¬ÒøÐÐÕË»§»òÐÅÓþ¿¨ÐÅÏ¢£©±»»ñÈ¡£¬¿Í»§µÄ°²ÕûϵͳҲδÊܵ½ÈκÎÓ°Ïì»òÇÖº¦¡£¡£ADTÇ¿µ÷ÒÑÁªÏµËùÓÐÊÜÓ°ÏìÈËÔ±¡£¡£´Ëǰ£¬ShinyHuntersÒÑÔÚÆäÊý¾ÝÐ¹Â¶ÍøÕ¾Éϰ䲼ADT£¬Ðû³ÆÇÔÈ¡ÁËÔ̺¬1000ÍòÌõ¿Í»§Ð¡ÎÒÉí·ÝÐÅÏ¢¼°ÆäËûÄÚ²¿¹«Ë¾Êý¾ÝµÄ¼Í¼£¬²¢°ä²¼ÁË×îºóͨ뺣¬ÒªÇóADTÔÚ2026Äê4ÔÂ27ÈÕǰÓëÆäÁªÏµ²¢Ö§¸¶Êê½ð£¬²»È»½«¹«¿ªÊý¾Ý¡£¡£ADT²¢Î´Ö¤Êµ¹¥»÷ÕßÐû³ÆµÄÊý¾ÝÇÔÈ¡Á¿¡£¡£ShinyHuntersй©£¬ËûÃÇͨ¹ýÓïÒô´¹µö¹¥»÷ÈëÇÖADT£¬µ¼ÖÂÒ»ÃûÔ±¹¤µÄOktaµ¥µãµÇ¼ÕË»§±»µÁ£¬½ø¶øÀûÓøÃÕË»§½Ó¼û²¢ÇÔÈ¡ÁËADT SalesforceϵͳÖеÄÊý¾Ý¡£¡£


https://www.bleepingcomputer.com/news/security/adt-confirms-data-breach-after-shinyhunters-leak-threat/


4. ÀÕË÷×éÖ¯BlackFile½èÓïÒô´¹µö¹¥»÷ÁãÊÛÓë¾ÆµêÒµ


4ÔÂ24ÈÕ£¬×Ô2026Äê2ÔÂÒÔÀ´£¬Ò»¸öÃûΪBlackFileµÄÒÔ¾­¼ÃÀûÒæÎªÖ÷ÕŵÄÐÂÐ˺ڿÍ×éÖ¯ÓëһϵÁÐÕë¶ÔÁãÊۺ;ƵêÒµµÄÊý¾Ý͵ÇÔ¼°ÀÕË÷¹¥»÷ÓйØ¡£¡£¾ÝPalo Alto NetworksµÄUnit 42ÓëÁãÊۺ;ƵêÐÅÏ¢¹²ÏíÓë·ÖÎöÖÐÐÄÅû¶£¬¸Ã×éÖ¯£¨Òà³ÆCL-CRI-1116¡¢¡¢¡¢UNC6671ºÍCordial Spider£©Í¨¹ý¼ÙÒâÆóÒµIT·þÎñ̨ÈËÔ±ÇÔȡԱ¹¤Æ¾Ö¤£¬²¢ÏòÊܺ¦ÕßË÷ÒªÆßλÊýÊê½ð¡£¡£BlackFileµÄ¹¥»÷ʼÓÚʹÓÃαÔìºÅÂë¸øÔ±¹¤´òµç»°£¬ÍþвÕß¼ÙÒâITÖ§³ÖÈËÔ±£¬ÓÕÆ­Ô±¹¤½Ó¼ûÐéαµÄÆóÒµµÇÂ¼Ò³Ãæ£¬ÒªÇóÊäÈëÍ´´¦ºÍÒ»´ÎÐÔÃÜÂë¡£¡£¹¥»÷ÕßÀûÓÃÇÔÈ¡µÄƾ֤ע²á×Ô¼ºµÄÉ豸ÒÔÈÆ¹ý¶à³É·ÖÈÏÖ¤£¬Ëæºóͨ¹ýץȡÄÚ²¿Ô±¹¤Ä¿Â¼ÌáÉý¶Ô¸ß¹Ü¼¶ÕË»§µÄ½Ó¼ûȨÏÞ¡£¡£¸Ã×é֯ʹÓó߶ÈAPIº¯Êý´ÓÊܺ¦ÕßµÄSalesforceºÍSharePoint·þÎñÆ÷ÇÔÈ¡Êý¾Ý£¬×¨ÃÅËÑË÷Ô̺¬¡°»úÃÜ¡±ºÍ¡°SSN¡±µÈÃô¸ÐÊõÓïµÄÎļþ¡£¡£ÇÔÈ¡µÄÎļþ±»ÏÂÔØµ½¹¥»÷Õß½ÚÖÆµÄ·þÎñÆ÷£¬²¢°ä²¼µ½¸ÃÍÅ»ïµÄ°µÍøÊý¾ÝÐ¹Â¶ÍøÕ¾£¬ËæºóÊܺ¦Õß»áͨ¹ý±»ÈëÇÖµÄÔ±¹¤µç×ÓÓʼþÕË»§»òËæ»úÌìÉúµÄGmailµØÖ·ÊÕµ½Êê½ðÒªÇ󡣡£


https://www.bleepingcomputer.com/news/security/new-blackfile-extortion-gang-targets-retail-and-hospitality-orgs/


5. ShinyHuntersÐû³ÆÈëÇÖÔÚÏßѧϰƽ̨Udemy


4ÔÂ24ÈÕ£¬ÀÕË÷×éÖ¯ShinyHunters½üÈÕÐû³ÆÒѳɹ¦ÈëÇÖÔÚÏßѧϰƽ̨Udemy£¬²¢ÍþвҪ°ä²¼³¬¹ý140ÍòÌõÔ̺¬Ð¡ÎÒÉí·ÝÐÅÏ¢¼°ÆäËûÄÚ²¿¹«Ë¾Êý¾ÝµÄ¼Í¼¡£¡£2026Äê4ÔÂ24ÈÕ£¬¸Ã³ôÃûÔ¶ÑïµÄÍøÂç·¸×ïÍŻォUdemyÁÐÈëÆä°µÍøÊܺ¦ÕßÃûµ¥£¬²¢·¢³ö×îºóͨ뺣¬ÒªÇó¹«Ë¾ÔÚ2026Äê4ÔÂ27ÈÕǰÁªÏµËûÃDz¢Ö§¸¶Êê½ð£¬²»È»½«¹«¿ªÐ¹Â¶Êý¾Ý¡£¡£½ØÖÁĿǰ£¬¸Ã˵·¨ÉÐδµÃµ½¹Ù·½Ö¤Êµ£¬ShinyHuntersҲδÏñ´Ëǰ¹¥»÷ÆäËû¹«Ë¾Ê±ÄÇÑù¸½ÉÏÑù±¾Êý¾Ý»ò½ØÍ¼ÒÔ×ôÖ¤ÆäÖ÷ÕÅ¡£¡£UdemyÊÇÈ«Çòµ±ÏȵÄÔÚÏßѧϰƽ̨֮һ£¬2024Äê¹À¼ÆÕ¼ÓÐ7700ÍòÔÚÏßѧϰÕߣ¬×ÔÄÇʱÆðÕâÒ»Êý×Ö¿ÉÄÜ»¹ÔÚÔö³¤¡£¡£Ä¿Ç°Éв»Ã÷ÏԾݳÆÐ¹Â¶µÄ140Íò±Ê¼Í¼¾ßÌåÔ̺¬ÄÄЩÓû§ÈºÌåµÄÐÅÏ¢£¬¿ÉÄÜÊÇͨ³£Ñ§Ô±¡¢¡¢¡¢½²Ê¦¡¢¡¢¡¢Ô±¹¤»òÕâЩȺÌåµÄ×éºÏ¡£¡£µ«ÎÞÂÛÈôºÎ£¬140Íò±Ê¼Í¼¶¼ÊÇÒ»¸öÖØ´óµÄÊý×Ö£¬ÆäDZÔÚºó¹û¼«¶ÈÑÏÖØ£¬³ýÁ˲»ÑÔ¶øÓ÷µÄÚ¿Æ­ºÍ½ðÈÚڲƭ·çÏÕÍ⣬ÕâЩÊý¾Ý»¹¿ÉÄÜΪ¹¥»÷ÕßÌṩ¿úËÅËØ²Ä£¬ÓÉÓںܶàÈËʹÓÃUdemy¿Î³ÌÀ´ÌáÉýÖ°Òµ¼¼Êõ¡£¡£


https://cybernews.com/security/shinyhunters-claim-udemy-data-theft/


6. Bitwarden CLI npm°üÔ⹩¸øÁ´¹¥»÷


4ÔÂ24ÈÕ£¬³ÖÐø²»ÐݵÄÈí¼þ¹©¸øÁ´ºÚ¿Í¹¥»÷º£³±Èç½ñ²¨¼°µ½ÁË×îÊÜ»¶Ó­µÄÃÜÂëÖÎÀíÆ÷Ö®Ò»Bitwarden¡£¡£¹¥»÷ÕßÔÚÆäºÅÁîÐй¤¾ßµÄnpm°üÖÐÖ²ÈëÁ˶ñÒâÈí¼þ¡£¡£Bitwarden°µÊ¾£¬Óû§ÃÜÂë¿âÊý¾ÝÒÀÈ»ÎÞȱÎÞËð£¬Í¨³£Óû§Î´ÊÜÓ°Ï죬µ«²¿ÃŸô·¢Õß±ØÒª¾¯Ìè¡£¡£ÄÇЩ´ËǰÈëÇÖCheckmarx°²È«¹¤¾ßµÄ¹¥»÷Õߣ¬Í¬ÑùÕÒµ½ÁËÈëÇÖBitwarden npm°üµÄ²½Ö裬ÔÚnpm´úÂë¿âÖа䲼ÁËÒ»¸ö´øÓжñÒâÈí¼þµÄCLI°æ±¾¡£¡£Bitwarden CLIÊǹ©¸ß¼¶Óû§»òϵͳÖÎÀíÔ±ÒÔ±à³Ì·½Ê½ÓëÃÜÂëÖÎÀíÆ÷½»»¥µÄÖն˹¤¾ß¡£¡£Bitwarden°²È«ÍŶÓÈ·ÈÏ£¬ÊÂÎñ²úÉúÔÚ2026Äê4ÔÂ22ÈÕÏÂÎç5:57ÖÁÍíÉÏ7:30£¨ÃÀ¹ú¶«²¿¹¦·ò£©Ö®¼ä¡£¡£ÔÚ¶ÌÔݵĴ°¿°¢ÚÄÚÏÂÔØÁËCLI°æ±¾2026.4.0µÄÓû§£¬Îñ±Ø½«ÏµÍ³ÊÓΪÒѱ»ÈëÇÖ²¢Èç¹ûÍ´´¦ÒÑй¶¡£¡£¾ÝArnica½áºÏÊ×´´È˼æÊ×ϯ¼¼Êõ¹ÙEran Medanй©£¬¹ÌÈ»³¬¹ý1000ÍòÓû§Ê¹ÓÃBitwardenµÄ¿ªÔ´ÃÜÂëÖÎÀíÆ÷£¬µ«Ö»ÓÐ334λ¿ª·¢ÕßÏÂÔØÁ˶ñÒâCLI¹¤¾ß¡£¡£StepSecurity·ÖÎöÖ¸³ö£¬Õâ´ÎÍøÂç¹¥»÷Ô´ÓÚBitwardenÒ»Ãû¹¤³ÌʦµÄGitHubÕË»§±»µÁÓᣡ£


https://cybernews.com/security/bitwarden-cli-npm-package-compromised-with-malware/