RubyGemsÔâÀ¬»øÈí¼þ°ü¹¥»÷£¬£¬ÔÝÍ£ÐÂÓû§×¢²á

°ä²¼¹¦·ò 2026-05-14

1.RubyGemsÔâÀ¬»øÈí¼þ°ü¹¥»÷£¬£¬ÔÝÍ£ÐÂÓû§×¢²á


5ÔÂ13ÈÕ£¬£¬Ruby±à³Ì˵»°µÄ¹Ù·½GemÍйܷþÎñRubyGems.org½üÈÕÒòÔâ·ê´ó¹æÄ£ÍøÂç¹¥»÷£¬£¬ÒÑÔÝÍ£ÐÂÕÊ»§×¢²á¡£¡£¡£5ÔÂ12ÈÕ£¬£¬RubyGemsÊØ»¤Õß°ä·¢ÓÉÓÚDDoS¹¥»÷£¬£¬×¢²áÖ°Äܱ»ÁÙʱ¹Ø±Õ¡£¡£¡£½ØÖÁ½ü24Сʱºó£¬£¬×¢²áÖ°ÄÜÒÀÈ»´¦ÓÚ½ûÓÃ״̬£¬£¬ÇÒÔ¤¼Æ¿ÉÄܳÖÐø¹Ø±Õ2ÖÁ3Ì죬£¬Ö±µ½ÕË»§´´½¨ËÙ¶ÈÏ޶ȵõ½¼ÓÇ¿¡¢¡¢¡¢WebÀûÓ÷À»ðǽ£¨WAF£©±£»£»£»¤±»ÆôÓᣡ£¡£¾ÝRubyGemsÊØ»¤Õßй©£¬£¬¸Ã·þÎñ³ÉΪÁËÒ»³¡¡°À¬»øÓʼþ»î¶¯¡±µÄÖ¸±ê£¬£¬¸Ã»î¶¯Öй¥»÷ÕßÀûÓûúеÈËÕË»§ÍÆËÍÁË500¶à¸öÀ¬»øÈí¼þ°ü£¬£¬ÆäÖÐÔ̺¬Ð¯´ø·ì϶ÀûÓ÷¨Ê½µÄ¶ñÒâ°ü¡£¡£¡£ÕâЩ¶ñÒâÈí¼þ°üÒѱ»´Ó×¢²á±íÖÐɾ³ý£¬£¬ÏÖÓÐÈí¼þ°üδÊÜÓ°Ïì¡£¡£¡£Ä¿Ç°¶Ô¸ÃÊÂÎñµÄµ÷²éÈÔÔÚ½øÐÐÖУ¬£¬µ«´ÓÏÖÓÐÐÅÏ¢À´¿´£¬£¬×îÖÕÓû§Ëƺõ²¢·Ç¹¥»÷µÄÖØÒªÖ¸±ê¡£¡£¡£RubyGemsÔÚÆä×´Ì¬Ò³ÃæÉÏÃ÷È·°µÊ¾£¬£¬ÏÖÓÐЧ»§ÈÔ¿ÉÕý³£½øÐÐGem×°ÖúÍÍÆËÍ£¬£¬ÕâЩÖ÷Ìâ²Ù×÷²»ÊÜÓ°Ïì¡£¡£¡£RubyGems°²È«ÍŶӵÄMaciej MensfeldÔÚÉ罻ƽ̨XÉÏ·¢ÎÄÖ¸³ö£¬£¬Õâ´Î¹¥»÷ËÆºõÖ±½ÓÕë¶ÔRubyGemsƽ̨×ÔÉí£¬£¬¹¥»÷ÕßÊÔͼִÐпçÕ¾¾ç±¾£¨XSS£©¹¥»÷ºÍÊý¾ÝÇÔÈ¡¡£¡£¡£


https://www.securityweek.com/hundreds-of-malicious-packages-force-rubygems-to-suspend-registrations/


2. MuddyWater¶Ô¶à¹ú³ÛÃû×éÖ¯ÌáÒéÍøÂç¼äµý»î¶¯


5ÔÂ13ÈÕ£¬£¬ÓëÒÁÀÊÓйØÁªµÄºÚ¿Í×éÖ¯MuddyWater£¨±ðÃûSeedworm¡¢¡¢¡¢Static Kitten£©½üÆÚ·¢Õ¹ÁËÒ»³¡¿í·ºµÄÍøÂç¼äµý»î¶¯£¬£¬Ö¸±êº­¸Ç¶à¸öÐÐÒµºÍ¹ú¶ÈµÄÖÁÉپŸö³ÛÃû×éÖ¯¡£¡£¡£Êܺ¦ÕßÔ̺¬º«¹úÒ»¼Ò´óÐ͵ç×Ó²úÆ·ÖÆ×÷ÉÌ¡¢¡¢¡¢µ±¾Ö»ú¹¹¡¢¡¢¡¢Öж«Ä³¹ú¼Ê»ú³¡¡¢¡¢¡¢ÑÇÖ޵Ĺ¤ÒµÖÆ×÷É̼°½ÌÓý»ú¹¹µÈ¡£¡£¡£ÈüÃÅÌú¿ËµÄ×êÑÐÈËԱй©£¬£¬¸ÃÍþвÐÐΪÕßÓÚ2026Äê2ÔÂÔÚÒ»¼Òº«¹ú´óÐ͵ç×Ó²úÆ·ÖÆ×÷É̵ÄÍøÂçÖÐפÁôÁËÕûÕûÒ»ÖÜ¡£¡£¡£ÈüÃÅÌú¿ËÍþвÁÔÊÖÍŶÓÒÔΪ£¬£¬Õâ´Î¹¥»÷ÒÔµý±¨Îªµ¼Ïò£¬£¬¹¥»÷ÕßרһÓÚÇÔÈ¡¹¤ÒµºÍ֪ʶ²úȨ¡¢¡¢¡¢½øÐе±¾ÐÄäµý»î¶¯£¬£¬ÒÔ¼°»ñÈ¡ÏÂÓοͻ§»òÆóÒµÍøÂçµÄ½Ó¼ûȨÏÞ¡£¡£¡£¹¥»÷ÕßʹÓÃÁËÁ½¸öºÏ·¨¶þ½øÖÆÎļþ £º£º£ºÒ»¸öÊÇForemediaµÄÒôƵʵÓ÷¨Ê½¡°fmapp.exe¡±£¬£¬ÁíÒ»¸öÊÇSentinelOneµÄºÏ·¨×é¼þ¡°sentinelmemoryscanner.exe¡±¡£¡£¡£ÓëÖ®¶ÔÓ¦µÄ¶ñÒâDLLÔòÔ̺¬ºóÉøÈ빤¾ßChromElevator£¬£¬ÓÃÓÚÇÔÈ¡´æ´¢ÔÚ»ùÓÚChromeµÄä¯ÀÀÆ÷ÖеÄÊý¾Ý¡£¡£¡£ÈüÃÅÌú¿Ë»¹·¢ÏÖ£¬£¬Ö»¹ÜÓÐÐ§ÔØºÉÊÇͨ¹ýNode.js¼ÓÔØÆ÷¶ø·ÇÖ±½Ó½ÚÖÆ£¬£¬µ«PowerShellÔÚ×î½üµÄÊÂÎñÖÐÒÀÈ»±»´óÁ¿Ê¹Ó㬣¬ÓÃÓÚ²¶»ñÆÁÄ»½ØÍ¼¡¢¡¢¡¢½øÐпúËÅ¡¢¡¢¡¢»ñÈ¡ÆäËûÓÐÐ§ÔØºÉ¡¢¡¢¡¢³ÉÁ¢ÓƾÃÐÔ¡¢¡¢¡¢ÇÔȡʹ´¦ºÍ´´½¨SOCKS5ËíµÀ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/iranian-hackers-targeted-major-south-korean-electronics-maker/


3. OpenLoop HealthÔâºÚ¿ÍÈëÇÖ£¬£¬71.6ÍòÈËÐÅϢй¶


5ÔÂ13ÈÕ£¬£¬Ô¶³ÌÒ½ÁÆÆ½Ì¨OpenLoop Health½ñÄê1ÔÂÔâ·êºÚ¿ÍÈëÇÖ£¬£¬µ¼ÖÂÔ¼71.6ÍòÈ˵ÄСÎÒÐÅÏ¢±»ÇÔÈ¡¡£¡£¡£¸ÃÊÂÎñ×î³õÓÚ3ÔÂÏòÓйص±¾ÖÅû¶£¬£¬µ«ÊÜÓ°ÏìÈËÊýÖ±µ½±¾Öܲű»Ôö³¤µ½ÃÀ¹úÎÀÉúÓ빫¼Ò·þÎñ²¿µÄÎ¥¹æÊÂÎñÃÅ»§ÍøÕ¾ÉÏ¡£¡£¡£¸Ã¹«Ë¾°µÊ¾£¬£¬ºÚ¿ÍÔÚ1ÔÂ7ÈÕÖÁ1ÔÂ8ÈÕÆÚ¼äÈëÇÖÁËÆäϵͳ£¬£¬ÇÔÈ¡µÄÐÅÏ¢Ô̺¬ÐÕÃû¡¢¡¢¡¢µØÖ·¡¢¡¢¡¢µç×ÓÓʼþµØÖ·¡¢¡¢¡¢µ®ÉúÈÕÆÚºÍÒ½ÁÆÊý¾ÝµÈСÎÒÃô¸ÐÐÅÏ¢¡£¡£¡£ÖµÍ×ÌùÐĵÄÊÇ£¬£¬Í¨ÖªÐÅÖÐÃ÷È·°µÊ¾ £º£º£º¡°Õâ´ÎÊÂÎñ²»Éæ¼°½Ó¼ûÄúµÄµç×Ó½¡¿µ¼Í¼¡¢¡¢¡¢Éç»á±£ÏÕºÅÂë»ò²ÆÕþÕË»§ÐÅÏ¢¡£¡£¡£¡±ÕâÒâζ×Å×îÖ÷ÌâµÄÃô¸Ðƾ֤²¢Î´ÔÚÕâ´Î¹¥»÷ÖÐй¶¡£¡£¡£ÊÂÎñ²úÉúºó£¬£¬OpenLoop HealthÁ¢¼´²ÉÈ¡ÁËÓ¦¶Ô´ëÊ©£¬£¬ÖÕÖ¹ÁËδ¾­ÊÚȨµÄ½Ó¼û£¬£¬²¢ÔÚÍâ²¿ÍøÂ簲ȫר¼ÒµÄЭÖúÏ·¢Õ¹È«Ãæµ÷²é¡£¡£¡£Óë´Ëͬʱ£¬£¬¸Ã¹«Ë¾»¹¼ÓÇ¿Á˰²È«½ÚÖÆ´ëÊ©£¬£¬²¢Óë·¨Âɲ¿ÃŽøÐÐÁËЭµ÷¹²Í¬¡£¡£¡£¸Ã¹«Ë¾ÎªÊÜÓ°ÏìµÄÓû§ÌṩÁËÒ»ÄêµÄÃâ·ÑÉí·ÝºÍÐÅÓþ¼à¿Ø·þÎñ£¬£¬ÒÔÔ®ÊÖ½µµÍDZÔÚ·çÏÕ¡£¡£¡£½ñÄêÔçЩʱ³½ÔøÓÐÒ»ÃûÍþвÐÐΪÕßÐû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü£¬£¬²¢Ðû³ÆÆäÇÔÈ¡ÁË160ÍòÈ˵ÄÐÅÏ¢¡£¡£¡£


https://www.securityweek.com/716000-impacted-by-openloop-health-data-breach/


4. EximÆØÑÏÖØ·ì϶£¬£¬¿ÉÖÂδÊÚȨԶ³Ì´úÂëÖ´ÐÐ


5ÔÂ13ÈÕ£¬£¬¿í·º²¿ÊðµÄ¿ªÔ´Óʼþ´«Êä´úÀíExim±»ÆØ´æÔÚÒ»¸öÑÏÖØ°²È«·ì϶£¬£¬±àºÅΪCVE-2026-45185¡£¡£¡£¸Ã·ì϶ӰÏ첿ÃÅʹÓÃĬÈÏGNU´«Êä²ã°²È«¿â½øÐа²È«Í¨Ñ¶µÄExim°æ±¾£¨4.99.3֮ǰ£©£¬£¬Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓø÷ì϶ִÐÐËÁÒâ´úÂë¡£¡£¡£ÕâÊÇÒ»¸öµäÐ͵ĿªÊͺóʹÓ÷ì϶£¬£¬ÔÚ´¦ÖÃBDAT·Ö¿éSMTPÁ÷Á¿Ê±£¬£¬TLS¹Ø±ÕÆÚ¼ä»á±»´¥·¢¡£¡£¡£¾ßÌå¶øÑÔ£¬£¬Exim¿ªÊÍÁËÒ»¸öTLS´«Ê仺³åÇø£¬£¬µ«Ëæºó³ÖÐøÊ¹ÓùýÆÚµÄ»Øµ÷ÒýÓ㬣¬ÕâЩÒýÓÿɽ«Êý¾ÝдÈëÒÑ¿ªÊ͵ÄÄÚ´æÇøÓò£¬£¬´Ó¶øµ¼ÖÂδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¸Ã·ì϶ÓÉXBOW×êÑÐÔ±Federico Kirschbaum·¢ÏÖ²¢»ã±¨£¬£¬Ó°ÏìʹÓÃGnuTLS±àÒëÇÒÆôÓÃÁËSTARTTLSºÍCHUNKINGµÄExim°æ±¾4.97ÖÁ4.99.2¡£¡£¡£»£»£»ùÓÚOpenSSLµÄ°æ±¾²»ÊÜÓ°Ïì¡£¡£¡£ÀûÓô˷ì϶µÄ¹¥»÷ÕßÄܹ»ÔÚ·þÎñÆ÷ÉÏÖ´ÐкÅÁ£¬½Ó¼ûEximÊý¾ÝºÍµç×ÓÓʼþ£¬£¬²¢ÓпÉÄÜÆ¾¾Ý·þÎñÆ÷ȨÏÞºÍÅäÖýøÒ»²½ÉøÈëµ½ÄÚ²¿»·¾³ÖС£¡£¡£XBOWÓÚ5ÔÂ1ÈÕÏòEximÊØ»¤ÈËÔ±»ã±¨Á˸÷ì϶£¬£¬5ÔÂ5ÈÕÊÕµ½È·ÈÏ£¬£¬ÊÜÓ°ÏìµÄLinux¿¯ÐаæÔÚÈýÌìºóÒ²½Óµ½ÁË֪ͨ¡£¡£¡£Ä¿Ç°£¬£¬EximÒÑÔÚ°æ±¾4.99.3Öа䲼ÁËÕë¶ÔCVE-2026-45185µÄÐÞ¸´²¹¶¡¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-critical-exim-mailer-flaw-allows-remote-code-execution/


5. Ì©À××ȼ¯ÍŹØÁªÊý¾Ýй¶£¬£¬Òý·¢Éí·Ý»ù´¡ÉèÊ©ÓÇÓô


5ÔÂ13ÈÕ£¬£¬¾Ý³ÆÓë±±Ô¼¹ØÁªµÄ·¨¹ú¹ú·À¾ÞÍ·Ì©À××ȼ¯ÍÅÓйصÄÊý¾Ý¼¯³Ê´Ë¿Ì³ÛÃûÍøÂç·¸×ïÂÛ̳ÉÏ£¬£¬½öÔ̺¬Á½±Ê¼Í¼µÄÑù±¾£¬£¬µ«ÕâÒ»ÊÂÎñÒÑÒý·¢Íâ½ç¶ÔÅ·ÖÞÁйúµ±¾ÖËùʹÓõÄÃô¸ÐÉí·Ý»ù´¡ÉèÊ©¿ÉÄÜÔâµ½ÈëÇÖµÄÐÂµÄ¿í·ºÓÇÓô¡£¡£¡£Ì©À××ȼ¯ÍÅÊÇÈ«Çòµ±ÏȵĹú·Àµç×Ӻͺ½¿Õº½ÌìÆóÒµ£¬£¬ÄêÊÕÈë´ï258ÒÚÃÀÔª£¬£¬Õ¼Óг¬¹ý85000ÃûÔ±¹¤£¬£¬¶Ô·¨¹úºÍ±±Ô¼¶øÑÔÓµÓÐÕ½ÊõÐԹؼüÒâ˼¡£¡£¡£Éó²éÁËÊý¾ÝÑù±¾µÄ×êÑÐÈËÔ±°µÊ¾£¬£¬Êý¾ÝÌåʽÓëµÚÈý·½»òÃæÏò¿Í»§µÄÊý¾Ý¼¯¸üΪһÖ£¬£¬¶ø·ÇLuxTrust×ÔÉíµÄÄÚ²¿ÏµÍ³¡£¡£¡£Ñù±¾ÖÐÔ̺¬ÁËÈ«Ãû¡¢¡¢¡¢µç×ÓÓʼþµØÖ·ÒÔ¼°Ò»¸ö¡°¹«Ë¾¡±×ֶΣ¬£¬ÕâÅú×¢Êý¾ÝºÜ¿ÉÄÜÀ´×ÔÌṩÉ̵Ļù´¡ÉèÊ©¶ø·ÇLuxTrustµÄԭʼÄÚ²¿Êý¾Ý¡£¡£¡£×êÑÐÈËÔ±Ö¸³ö£¬£¬ÕâÖֽṹ¸üÏñÊÇͨ¹ýÍⲿ·þÎñ²ã»òºÏ×÷ͬ°éƽ̨´¦ÖõÄÊý¾Ý¡£¡£¡£ÓÉÓÚLuxTrust×÷Ϊ×ܲ¿Î»ÓÚ¬ɭ±¤µÄÊý×ÖÉí·ÝÌṩÉÌ£¬£¬ÆäÒµÎñÉæ¼°µ±¾Ö¡¢¡¢¡¢½ðÈÚºÍÆóÒµÉí·ÝÑéÖ¤£¬£¬¼´±ãÖ»ÊÇÓû§Éí·ÝÊý¾ÝµÄÓÐÏÞй¶£¬£¬Ò²¿ÉÄÜ´øÀ´²»³É±ÈÀýµÄÑÏÖØ·çÏÕ£¬£¬ÓÈÆäÊÇÔÚÍøÂç´¹µöºÍÉç»á¹¤³Ì¹¥»÷·½Ãæ¡£¡£¡£


https://cybernews.com/security/thales-group-luxtrust-data-breach/


6. BBVAÒøÐпͻ§Êý¾ÝÔÙÔâй¶£¬£¬ºÚ¿ÍÂÛ̳¹«¿ªÏúÊÛ


5ÔÂ12ÈÕ£¬£¬Î÷°àÑÀ¶ÔÍâÒøÐУ¨BBVA£©Ä«Î÷¸ç¿Í»§µÄÊý¾Ý¼¯Ôٴγʴ˿̺ڿÍÂÛ̳ÉÏ£¬£¬Òý·¢ÁËÍâ½ç¶ÔÕâ¼ÒÈ«Çò×î´óÒøÐм¯ÍÅÖ®Ò»°²È«Çé¿öµÄ³Ö¾ÃÓÇÓô¡£¡£¡£BBVAÒÑ´ÓÒ»¼ÒÎ÷°àÑÀ´û¿î»ú¹¹·¢Õ¹³ÉΪŷÖÞ×î´óµÄ½ðÈÚ¾ÞÍ·Ö®Ò»£¬£¬×Ü×ʲú³¬¹ý8130ÒÚÅ·Ôª£¬£¬ÒµÎñ±é¼°25¶à¸ö¹ú¶È£¬£¬Õ¼ÓÐÔ¼12.7ÍòÃûÔ±¹¤ºÍ³¬¹ý7700Íò»îÔ¾¿Í»§¡£¡£¡£½üÆÚÔÚÒ»¼Ò³ÛÃûºÚ¿ÍÂÛ̳ÉϳöÏÖµÄÇåµ¥Ô̺¬13±Ê¼Í¼£¬£¬ÆäÖк¬ÓÐСÎÒÉí·ÝÐÅÏ¢£¬£¬¾Ý³ÆÐ¹Â¶µÄÊý¾ÝÔ̺¬È«Ãû¡¢¡¢¡¢µç»°ºÅÂë¡¢¡¢¡¢²¿ÃżÒͥסַÒÔ¼°ÒøÐп¨µ½ÆÚÈÕ¡£¡£¡£×êÑÐÈËÔ±°µÊ¾£¬£¬¹ÌÈ»Ñù±¾ÓÐÏÞ£¬£¬µ«ÆäÌåʽÓë֮ǰÁ÷´«µÄBBVAй¶Êý¾Ý·ÖÆç£¬£¬Åú×¢Õâ¿ÉÄܲ»½ö½öÊǶԾÉÊý¾ÝµÄÖØÐÂÀûÓᣡ£¡£´ËÀàÊý¾ÝÒ»µ©ÂäÈë¹¥»÷ÕßÊÖÖУ¬£¬¾Í¿ÉÄܱ»ÓÃÀ´¾«ÐIJ߶¯Éç»á¹¤³Ì¹¥»÷£¬£¬´Ó¶øÎ£¼°ÒøÐпͻ§µÄÕË»§°²È«¡£¡£¡£Ä¿Ç°£¬£¬¸ÃÊý¾Ý¼¯µÄÆðÔ´ºÍÕæÊµÐÔÈÔδµÃµ½Ö¤Êµ¡£¡£¡£ÔÚ´Óǰ¼¸ÄêÖУ¬£¬BBVAÂŴγʴ˿̵ØÏÂÍøÂç·¸×ï»áÉÌÖУ¬£¬ÓÈÆäÊÇÔÚÉæ¼°BBVAÄ«Î÷¸çµÄÉæÏÓÊý¾Ýй¶ÊÂÎñÖС£¡£¡£


https://cybernews.com/security/bbva-mexico-data-leak-forum/