mirror of
https://github.com/Hxnxe/CyberSentinel-AI.git
synced 2025-11-04 17:13:53 +00:00
更新
This commit is contained in:
parent
535d895e66
commit
dcd962971c
@ -3,7 +3,7 @@
|
||||
|
||||
> 本文由AI自动生成,基于对安全相关仓库、CVE和最新安全研究成果的自动化分析。
|
||||
>
|
||||
> 更新时间:2025-09-09 09:41:15
|
||||
> 更新时间:2025-09-09 14:26:54
|
||||
|
||||
<!-- more -->
|
||||
|
||||
@ -21,6 +21,19 @@
|
||||
* [利用msc格式文件执行任意代码](https://mp.weixin.qq.com/s?__biz=Mzk2NDg3NTc1Mg==&mid=2247484532&idx=1&sn=b71d07fc420647add3b1b4aa7563d37b)
|
||||
* [撰写整洁且有价值的漏洞奖励报告的技巧](https://mp.weixin.qq.com/s?__biz=MzkwOTE5MDY5NA==&mid=2247507535&idx=1&sn=d8bfd7a46aa666b0951929749f0b75e6)
|
||||
* [Tosei自助洗衣机network_test.php接口存在远程命令执行漏洞 附POC](https://mp.weixin.qq.com/s?__biz=MzIxMjEzMDkyMA==&mid=2247489077&idx=1&sn=4671f5a86592a90f99c45eef0cb55708)
|
||||
* [漏洞预警复盘百度网盘Windows客户端存在远程命令执行漏洞](https://mp.weixin.qq.com/s?__biz=Mzk0Mzc2MDQyMg==&mid=2247486604&idx=1&sn=591afdedefddfbc1cb3b93540d1f19b6)
|
||||
* [CVE-2025-58179:Astro Cloudflare适配器漏洞可导致服务器端请求伪造(SSRF)](https://mp.weixin.qq.com/s?__biz=MzIwNzAwOTQxMg==&mid=2652252505&idx=1&sn=e9fa118826ee6f743bbbcfafa1f06ff8)
|
||||
* [挖漏洞一个月赚2万多,别被骗了!](https://mp.weixin.qq.com/s?__biz=MzU3MjczNzA1Ng==&mid=2247499384&idx=1&sn=59aee19cacc8d37411b0512f8dd799e6)
|
||||
* [黑客将HexStrike AI武器化,10分钟内实现零日漏洞攻击 | 提示词注入攻击可使AI驱动的网络安全工具反噬自身](https://mp.weixin.qq.com/s?__biz=MzI1OTA1MzQzNA==&mid=2651248416&idx=1&sn=e6acf58adca8b1129c733af16751e666)
|
||||
* [CVE-2025-53772 IIS Web Deploy 系统反序列化漏洞深度剖析](https://mp.weixin.qq.com/s?__biz=MzUyOTc3NTQ5MA==&mid=2247500548&idx=1&sn=11e8a82d3901209654c83811e7d0c58a)
|
||||
* [1Day 复现 TOTOLINK N600R远程命令执行漏洞 CVE-2025-9935](https://mp.weixin.qq.com/s?__biz=MzE5MTc4OTc1Ng==&mid=2247483986&idx=1&sn=d3dfc5733cac333ae68ebae4f7e6403d)
|
||||
* [1Day 复现 TOTOLINK X5000R命令注入漏洞 CVE-2025-9934](https://mp.weixin.qq.com/s?__biz=MzE5MTc4OTc1Ng==&mid=2247483985&idx=1&sn=323cf9784f80a50b5937ed28dd491808)
|
||||
* [1Day 复现 14.4K Starts AiAgent系统SSRF漏洞 CVE-2025-9805](https://mp.weixin.qq.com/s?__biz=MzE5MTc4OTc1Ng==&mid=2247483963&idx=1&sn=63f22b5493d384b8d1ba711ca3be6d22)
|
||||
* [安全圈紧急安全通告:Django高危漏洞可使攻击者在Web服务器执行恶意SQL指令](https://mp.weixin.qq.com/s?__biz=MzIzMzE4NDU1OQ==&mid=2652071603&idx=2&sn=393fe1505e5cbe749d048f98028c0586)
|
||||
* [高危AI漏洞预警Langflow容器权限提升漏洞CVE-2025-57760](https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247490706&idx=1&sn=8fc315c3eba9bbe0f7129c0360b024c9)
|
||||
* [SAP S/4HANA 中严重漏洞已遭在野利用](https://mp.weixin.qq.com/s?__biz=MzI2NTg4OTc5Nw==&mid=2247523967&idx=1&sn=4fb0beaa6d1cf5b33d3224c1e6783d9f)
|
||||
* [cJSON库存在CVSS 9.8高危JSON解析漏洞](https://mp.weixin.qq.com/s?__biz=MjM5NjA0NjgyMA==&mid=2651327271&idx=2&sn=8d19f2657d6b50031dba6eceb7892e77)
|
||||
* [某书发布个人信息导致全校学生信息泄露--漏洞复现](https://mp.weixin.qq.com/s?__biz=MzI4MjkxNzY1NQ==&mid=2247487069&idx=1&sn=10897374dd17db7c36fe8c975d5a787d)
|
||||
|
||||
### 🔬 安全研究
|
||||
|
||||
@ -30,17 +43,21 @@
|
||||
* [重磅!首发ASX-A100人工智能线索分析系统,专为执法人员打造的AI办案利器](https://mp.weixin.qq.com/s?__biz=MzI1NDMxOTkyNw==&mid=2247486107&idx=1&sn=dc4e717e35e9f5a94df3f53e32754bf0)
|
||||
* [网络技术第六期:路由器是干什么的](https://mp.weixin.qq.com/s?__biz=MzU4NjY3OTAzMg==&mid=2247516646&idx=2&sn=28eb3308889c82bbe552a15f283e4684)
|
||||
* [等保2.0三级测评高风险项分析](https://mp.weixin.qq.com/s?__biz=MjM5OTk4MDE2MA==&mid=2655291014&idx=2&sn=26b0c8c4ad47278d1ef83419f455a43e)
|
||||
* [2025小马智行研究报告:精研十载,剑指锋芒](https://mp.weixin.qq.com/s?__biz=MzkyOTMwMDQ5MQ==&mid=2247520479&idx=1&sn=2d5d72b796b5c5c490768fd78bed02da)
|
||||
* [北京大学:智能网联汽车的车载网络攻防技术研究进展](https://mp.weixin.qq.com/s?__biz=MzU2MDk1Nzg2MQ==&mid=2247627262&idx=1&sn=e5c4e99102da5877c10e758f9a1658e9)
|
||||
* [中国信息通信研究院:智能网联汽车网络安全测评体系研究](https://mp.weixin.qq.com/s?__biz=MzU2MDk1Nzg2MQ==&mid=2247627262&idx=3&sn=ef1180103e889766c3e337ed660ac8d3)
|
||||
* [俄乌战争中FPV无人机作战运用分析及对我启示](https://mp.weixin.qq.com/s?__biz=MzkyMjY1MTg1MQ==&mid=2247495893&idx=1&sn=64bce6b9d5c46f443786b7d88816e461)
|
||||
* [低空经济发展趋势与路径研究报告(2025)](https://mp.weixin.qq.com/s?__biz=MjM5OTk4MDE2MA==&mid=2655291022&idx=3&sn=2aba132e118eecc8e4ba9f9d909eb2d8)
|
||||
* [信安工程师学习笔记(10)VPN技术原理](https://mp.weixin.qq.com/s?__biz=MzI5MTIwOTQ5MA==&mid=2247488250&idx=1&sn=6e8058d82af61e0f5a4b430349163735)
|
||||
|
||||
### 🎯 威胁情报
|
||||
|
||||
* [钓鱼攻击狂飙300%?AI反钓鱼强势逆转战局!](https://mp.weixin.qq.com/s?__biz=MzI3NzM5NDA0NA==&mid=2247491991&idx=1&sn=55e9aaa5727f9291416afc78d775d666)
|
||||
* [秦安:情人、儿子与5200份文件!九三阅兵后,国安部发文防间谍](https://mp.weixin.qq.com/s?__biz=MzA5MDg1MDUyMA==&mid=2650481254&idx=1&sn=9cf3e2871bd1ccada8fdb1d9af5b0dca)
|
||||
* [3月份,黑客侵入了Salesloft的GitHub,并利用窃取的令牌发起大规模攻击](https://mp.weixin.qq.com/s?__biz=Mzg3OTc0NDcyNQ==&mid=2247494723&idx=1&sn=63d937107fae8319b23286fd7d09890e)
|
||||
* [普渡外卖机器人存在安全漏洞,黑客可劫持送餐路径|史上最大规模DDoS攻击:Cloudflare成功防御11.5Tbps流量冲击](https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650612207&idx=2&sn=63dbc772d0fbdc9e636344cbce7c8dc5)
|
||||
* [干货分享 | 记一次挖矿木马+隐藏后门应急分析(建议收藏)](https://mp.weixin.qq.com/s?__biz=MzI1NTM4ODIxMw==&mid=2247501525&idx=1&sn=c304c147295836b7ab90621dde60fe37)
|
||||
* [防火墙能防住黑客,但防得住HR招进来的“自己人”吗?u200b](https://mp.weixin.qq.com/s?__biz=MzkyMjcxNzE2MQ==&mid=2247484597&idx=1&sn=7ee47521f261b6bae9486ed3369cf6ef)
|
||||
* [我以为 AI 是助手,黑客却用它当“小偷”?Nx 投毒事件深度剖析](https://mp.weixin.qq.com/s?__biz=Mzk1NzM4NzMyMw==&mid=2247485003&idx=1&sn=41591fc67fd4355a6866ed4e8fe0f257)
|
||||
* [npm install又出事了?一行代码让你钱包归零,这次黑客专挑Web3开发者下手!](https://mp.weixin.qq.com/s?__biz=MzA4NTY4MjAyMQ==&mid=2447901317&idx=1&sn=081a60e6a80e05a8946c0140debbb5d0)
|
||||
* [安全圈史上最大 npm 供应链攻击:周下载量超 20 亿的 18 个包被植入恶意代码](https://mp.weixin.qq.com/s?__biz=MzIzMzE4NDU1OQ==&mid=2652071622&idx=3&sn=fea6a87fb8e150debe4ce04fe18b2df1)
|
||||
* [安全圈黑客武器化 Amazon SES,每日发送超 5 万封恶意邮件](https://mp.weixin.qq.com/s?__biz=MzIzMzE4NDU1OQ==&mid=2652071622&idx=4&sn=5767f3d7d9adc4acb62c8954e46c1933)
|
||||
* [篇 50:越南国家信用信息中心遭受黑客入侵,大部分人口受影响](https://mp.weixin.qq.com/s?__biz=MzkzNDIzNDUxOQ==&mid=2247502722&idx=1&sn=993b9f6051e4afcf3fbb5a2bc71df13a)
|
||||
* [报告显示:网络安全团队面临日益严峻的攻击压力,GenAI被视为提升安全能力的关键技术](https://mp.weixin.qq.com/s?__biz=MjM5OTk4MDE2MA==&mid=2655291022&idx=1&sn=449ee36b0775a404fd6f7f704d67dbed)
|
||||
* [科研人员警惕!摩诃草Patchwork组织用“国家重点研发计划”当诱饵,专偷你的核心成果](https://mp.weixin.qq.com/s?__biz=Mzg3OTYxODQxNg==&mid=2247486709&idx=1&sn=3057d0df708f861d16d90fc839fbd941)
|
||||
* [威胁猎人2025年8月安全情报和产品升级汇总](https://mp.weixin.qq.com/s?__biz=MzI3NDY3NDUxNg==&mid=2247501474&idx=1&sn=2e532e1751679735c31bb3fea60d9006)
|
||||
|
||||
### 🛠️ 安全工具
|
||||
|
||||
@ -48,6 +65,12 @@
|
||||
* [一款高效、强大的子域名爬取工具,帮助安全研究者和渗透测试人员快速收集目标域名的子域名信息](https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650612207&idx=4&sn=d73b5c9e791f1d20d3a5c91c07404f0a)
|
||||
* [EasyTshark 一款适合新手入门的抓包工具](https://mp.weixin.qq.com/s?__biz=MzIwMzIyMjYzNA==&mid=2247519643&idx=1&sn=d3ee3e5277750fa7d9a8144fc6710499)
|
||||
* [工具 | 免费高清的远程控制软件](https://mp.weixin.qq.com/s?__biz=MzI5MDQ2NjExOQ==&mid=2247500158&idx=1&sn=3f2d0dde4865e7b6fd9ebae75d66b8ae)
|
||||
* [Java代码审计包更新课程手把手带你从基础学到进阶,小白也能变大神!(目前已更新百节课程,还在持续更新中......)](https://mp.weixin.qq.com/s?__biz=Mzg3MDU1MjgwNA==&mid=2247487537&idx=1&sn=35129e07aba832b5bff2ef8c8ea3d981)
|
||||
* [安全小知识-第二期-App手工安全检测(笔记)](https://mp.weixin.qq.com/s?__biz=Mzg4Njk1NDg5NQ==&mid=2247483943&idx=1&sn=3773c7f8f491ba9b8a39f944804d69d2)
|
||||
* [Brute Ratel C4 BRC4 2.1.2C2工具分享](https://mp.weixin.qq.com/s?__biz=MzkxMTY2NTk0MA==&mid=2247483939&idx=1&sn=a187a80cc406405d129919f8c37c6ca7)
|
||||
* [关注丨网络关键设备安全检测结果(第22批)](https://mp.weixin.qq.com/s?__biz=MzI2MDk2NDA0OA==&mid=2247534710&idx=1&sn=b458ca744d6c73652e4c07f69f37a86e)
|
||||
* [招聘中高渗透测试若干](https://mp.weixin.qq.com/s?__biz=Mzg5NTkxNzg4MA==&mid=2247490212&idx=1&sn=07c8ce7e3dd936a203f768fc65ed100d)
|
||||
* [远控工具 BRC4 2.1.2 版本分享](https://mp.weixin.qq.com/s?__biz=MzkyOTQzNjIwNw==&mid=2247492710&idx=1&sn=14967ffc4239fd400e9af2b60a7bf64d)
|
||||
|
||||
### 📚 最佳实践
|
||||
|
||||
@ -56,6 +79,9 @@
|
||||
* [企业部署生成式AI的四大痛点](https://mp.weixin.qq.com/s?__biz=MjM5NTk5Mjc4Mg==&mid=2655230153&idx=1&sn=c06debcda64285f021691bbb6d887f60)
|
||||
* [OWASP Zed Attack Proxy(ZAP)操作指南](https://mp.weixin.qq.com/s?__biz=MjM5OTk4MDE2MA==&mid=2655291014&idx=1&sn=67c070315b48a9b4612b83355d6a112b)
|
||||
* [个人虚拟资产安全管理指南](https://mp.weixin.qq.com/s?__biz=MzU2MjU2MzI3MA==&mid=2247484874&idx=3&sn=0190dec7a92ad7a03088d7e52b1f3d5e)
|
||||
* [CNAS软件评测实验室建设方案](https://mp.weixin.qq.com/s?__biz=MzI3NzUyNjU5Mg==&mid=2247486096&idx=1&sn=9390791c6983689f96d37f4ed97d1ae3)
|
||||
* [关于取消网络与信息安全管理员(数据安全管理员)赛项专业组比赛的通知](https://mp.weixin.qq.com/s?__biz=Mzk0NTU0ODc0Nw==&mid=2247493979&idx=3&sn=c4d5f97a75c6ee449502a60af12ce199)
|
||||
* [网络安全运营运维 今天上传文件列表](https://mp.weixin.qq.com/s?__biz=MjM5OTk4MDE2MA==&mid=2655291022&idx=2&sn=20021c3b0cec7e8769f513341be4fab5)
|
||||
|
||||
### 🍉 吃瓜新闻
|
||||
|
||||
@ -67,6 +93,8 @@
|
||||
* [2026合作伙伴巡礼美亚柏科——电子数据取证行业龙头 上半年突破性产品盘点](https://mp.weixin.qq.com/s?__biz=MzAwMTMzMDUwNg==&mid=2650889762&idx=1&sn=fd543ff00b31cce5eaf0da6f3ceadcbf)
|
||||
* [FBI 数据疑似假? | 涉嫌出售美国联邦调查局数据](https://mp.weixin.qq.com/s?__biz=MzU5MjgwMDg1Mg==&mid=2247486606&idx=1&sn=51c6835fe434adbee08baf9a43a6c96a)
|
||||
* [自助下载 | 政务、医疗、教育、车联网、智能制造、个人信息保护、智慧城市、低空经济、大数据、数据中心、区块链、物联网、元宇宙](https://mp.weixin.qq.com/s?__biz=MjM5OTk4MDE2MA==&mid=2655291014&idx=3&sn=32beaa41dfcfd04eb87f7de80376e030)
|
||||
* [国企直签!赛尔网络广东分公司招聘网络安全工程师](https://mp.weixin.qq.com/s?__biz=Mzg3MzE4ODU4Nw==&mid=2247483898&idx=1&sn=c5f70493c3d13a31f12484b89c25c644)
|
||||
* [赛事招标丨2025年中国电信甘肃公司竞赛培训能力提升服务项目](https://mp.weixin.qq.com/s?__biz=Mzk0NTU0ODc0Nw==&mid=2247493979&idx=1&sn=0c0f784302f7083375098af322350452)
|
||||
|
||||
### 📌 其他
|
||||
|
||||
@ -98,6 +126,43 @@
|
||||
* [好莱坞式策反:以色列借美国网红喜剧演员之手,发动伊朗核科学家叛变暗战](https://mp.weixin.qq.com/s?__biz=MzkyMjQ5ODk5OA==&mid=2247513675&idx=1&sn=dd65e0c4b2c44e88f70450c64730c184)
|
||||
* [暗网快讯20250909期](https://mp.weixin.qq.com/s?__biz=MzkyMjQ5ODk5OA==&mid=2247513675&idx=2&sn=8409b36171983a4b7ac2af3d25077ab6)
|
||||
* [五年蜕变:UOS系统安装全记录,AI驱动下的国产之光](https://mp.weixin.qq.com/s?__biz=MzI4NjAzMTk3MA==&mid=2458861413&idx=1&sn=955a84492040ccb309140ab03ac88905)
|
||||
* [一次意外的 Microsoft Defender 签名世界之旅](https://mp.weixin.qq.com/s?__biz=MzAxODM5ODQzNQ==&mid=2247490280&idx=1&sn=58c386cfccf6a9b3178fe8bffbae3717)
|
||||
* [又欺负我们计算机人](https://mp.weixin.qq.com/s?__biz=MzAwMjQ2NTQ4Mg==&mid=2247500318&idx=1&sn=c165314fe480c4cccaff4a6d16c76528)
|
||||
* [实测16家国自然标书服务机构,本子一站式服务,中标率最高的是这家!赠大牛直播答疑~](https://mp.weixin.qq.com/s?__biz=MzAwMjQ2NTQ4Mg==&mid=2247500318&idx=2&sn=17d5ef711028d3620d09aac4cd1c8fa9)
|
||||
* [Windows 10 下月停服,国内数亿用户暴露安全风险](https://mp.weixin.qq.com/s?__biz=MzkwOTg4NDk5NQ==&mid=2247484749&idx=1&sn=1d672ef87b1c28a0fdac760333640db9)
|
||||
* [闽盾杯-heiupload解题思路](https://mp.weixin.qq.com/s?__biz=MzkyMDc0NDEzOA==&mid=2247483886&idx=1&sn=f6c32ca5b67ab0b2c4e1f8a214d74b9f)
|
||||
* [联合主办|香港网络安全高峰会2025开放报名!](https://mp.weixin.qq.com/s?__biz=MzkwMTM5MDUxMA==&mid=2247507771&idx=1&sn=cee175d236f0510b3669c103ccb7d1f3)
|
||||
* [熬了1个通宵整理的PMP备考干货,无偿分享!](https://mp.weixin.qq.com/s?__biz=MzU4MjUxNjQ1Ng==&mid=2247524987&idx=1&sn=ae530e85c39e40304ad07f1785c90d65)
|
||||
* [重磅!人工智能合规认证AICP首期班本周末开课](https://mp.weixin.qq.com/s?__biz=MzU4MjUxNjQ1Ng==&mid=2247524987&idx=2&sn=4c77e9a1ca2c54263fc6ce9944630a67)
|
||||
* [DudeSuite 限时开放授权用户注册](https://mp.weixin.qq.com/s?__biz=MzA3ODUzNzMzOQ==&mid=2648562822&idx=1&sn=72067c368ab290534af3b9b785ecf87d)
|
||||
* [免费分享 | HTB靶机Soulmate解法分享](https://mp.weixin.qq.com/s?__biz=MzIzODMyMzQxNQ==&mid=2247485074&idx=1&sn=723fbb196cdc8f3d2046b2cbce947a95)
|
||||
* [安恒信息获上海市多项荣誉](https://mp.weixin.qq.com/s?__biz=MjM5NTE0MjQyMg==&mid=2650632530&idx=1&sn=c751623d9ba342d2aab3ddad98279bd0)
|
||||
* [2025年国家网络安全宣传周将于9月15日至21日在全国范围举行](https://mp.weixin.qq.com/s?__biz=Mzg2NDc0MjUxMw==&mid=2247486435&idx=1&sn=e880716429521c5c2cea5e7d59db3562)
|
||||
* [SBOM成全球市场入场券?美西方国家用“配方表”重写软件游戏规则](https://mp.weixin.qq.com/s?__biz=MzkxNTI2MTI1NA==&mid=2247504062&idx=1&sn=30234660297ea21cda44c0ef26bb1426)
|
||||
* [CSOP 2025 | 走进鹏城实验室,以靶场提升安全运营基线](https://mp.weixin.qq.com/s?__biz=MzI5NjA0NjI5MQ==&mid=2650184589&idx=1&sn=925c871613d43c603ecda9e31ac00d0f)
|
||||
* [车联网供应链安全与合规培训课程 2025](https://mp.weixin.qq.com/s?__biz=MzU2MDk1Nzg2MQ==&mid=2247627262&idx=2&sn=840a8e465c4f4a8e14c9fc60306f6dfa)
|
||||
* [招笑偷文圈钱割韭菜](https://mp.weixin.qq.com/s?__biz=MzkyNzg4NTU0NQ==&mid=2247485939&idx=1&sn=090c13c42ef7978c2db7c8fe90068395)
|
||||
* [关于举办“鹏云杯”第十二届山东省大学生网络安全技能大赛的通知](https://mp.weixin.qq.com/s?__biz=Mzk0NTU0ODc0Nw==&mid=2247493979&idx=2&sn=d07c40cfb37143fe5f7c2d31957a2774)
|
||||
* [2025福建闽盾杯Writeup](https://mp.weixin.qq.com/s?__biz=Mzk0NTU0ODc0Nw==&mid=2247493979&idx=4&sn=9891e01bb1c7365c6b086466f5bfaae9)
|
||||
* [闽盾杯题解(MISC部分)](https://mp.weixin.qq.com/s?__biz=Mzk0NTU0ODc0Nw==&mid=2247493979&idx=5&sn=56a0bfe994ab9a5eac3f629e7d4d485c)
|
||||
* [美空军条令出版物《AFDP 3-72:核行动》](https://mp.weixin.qq.com/s?__biz=MzkyMjY1MTg1MQ==&mid=2247495893&idx=3&sn=3c5f7135a471b2aea5cf51908dee7ef9)
|
||||
* [中孚信息中标千万级防务项目,“管密”产品助力防务业务实现新突破](https://mp.weixin.qq.com/s?__biz=MzAxMjE1MDY0NA==&mid=2247511922&idx=1&sn=e597231eafcdcb971b11a0b006fe8a1e)
|
||||
* [链接一批优质安全岗位及安全人才|9月8日更新](https://mp.weixin.qq.com/s?__biz=MzIyOTAxOTYwMw==&mid=2650237690&idx=1&sn=e427facfe261de1a7580f7742fff1c9f)
|
||||
* [5th域安全微讯早报20250909216期](https://mp.weixin.qq.com/s?__biz=MzkyMjQ5ODk5OA==&mid=2247513675&idx=3&sn=d465e65ee110ac3ca24a294f38b0f1d3)
|
||||
* [倒计时7天 | CCS2025活动日程抢先看!](https://mp.weixin.qq.com/s?__biz=MzkwMjI2MDQwMA==&mid=2247486856&idx=1&sn=45e6a39c2a7997101d1539eec3f1ade7)
|
||||
* [山石网科中标|山东港口集团国产化改造项目](https://mp.weixin.qq.com/s?__biz=MzAxMDE4MTAzMQ==&mid=2661302663&idx=1&sn=5de5772991c43abaaf3ff5ab582bcf66)
|
||||
* [2025年国家网络安全宣传周官方网站正式上线!](https://mp.weixin.qq.com/s?__biz=MzAxOTMyMDc0OQ==&mid=2451934341&idx=2&sn=4acb271476738a69eda8dad0178f4ec8)
|
||||
* [怪不得大家建议我上油管学网络安全!](https://mp.weixin.qq.com/s?__biz=Mzk3NTUwNTUzNQ==&mid=2247483691&idx=1&sn=4400824252b790f17e3ee79afa07bb92)
|
||||
* [腾讯安全沙龙(南京站)硬核来袭|与大咖共探AI攻防,挑战30万LLMWAF大奖](https://mp.weixin.qq.com/s?__biz=MzkzNDUxOTk2Mw==&mid=2247497010&idx=1&sn=39284d2565397acfaaa61db44bf03666)
|
||||
* [安全圈福建莆田13.3亿元特大非法虚拟货币换汇](https://mp.weixin.qq.com/s?__biz=MzIzMzE4NDU1OQ==&mid=2652071622&idx=1&sn=4831d725509b428a3aef2e7ad0d6f77f)
|
||||
* [安全圈民警非法倒卖公民个人信息获刑](https://mp.weixin.qq.com/s?__biz=MzIzMzE4NDU1OQ==&mid=2652071622&idx=2&sn=a059590dcd094566e9b8451cfd736ba8)
|
||||
* [2025湾区杯-forensic部分题解](https://mp.weixin.qq.com/s?__biz=Mzk4ODEwNjkxNg==&mid=2247484044&idx=1&sn=3f7144a4dd18961483c30838f119b4cd)
|
||||
* [前有道创始人再创业,「奇点灵智」要做3-8岁英语AI伴学|「抓住下一个Z一鸣」](https://mp.weixin.qq.com/s?__biz=MzkyMDU5NzQ2Mg==&mid=2247489055&idx=1&sn=97ff0ec313b909709a29081533d130e8)
|
||||
* [专家坐镇发布会 | 多角度解读AI时代下的机遇与挑战](https://mp.weixin.qq.com/s?__biz=MjM5ODQ3NjAwNQ==&mid=2650554601&idx=1&sn=ed14ba28e88fbaf6fb3de43705fde783)
|
||||
* [我是什么很见的人吗?](https://mp.weixin.qq.com/s?__biz=MzkxNzY5MTg1Ng==&mid=2247491933&idx=1&sn=9695649a66cb93dbf21e285cf8dc4a4a)
|
||||
* [御林安全工作室招新啦!](https://mp.weixin.qq.com/s?__biz=MzU2NTExMDQxOQ==&mid=2247486869&idx=1&sn=409e0f1590c408019922adc9bdfa0185)
|
||||
* [fastjson攻防史的两大通杀之看不懂打我系列](https://mp.weixin.qq.com/s?__biz=MzUyODkwNDIyMg==&mid=2247551904&idx=1&sn=8afcd41d2eb1f791bbd0a67f8b8a779f)
|
||||
* [Track社区8月天梯榜揭晓!](https://mp.weixin.qq.com/s?__biz=MzUyODkwNDIyMg==&mid=2247551904&idx=2&sn=f2ae3c2c42c446684337f9f71d38c4cd)
|
||||
|
||||
## 安全分析
|
||||
(2025-09-09)
|
||||
@ -439,6 +504,61 @@ CVE-2025-24813是一个Apache Tomcat的RCE漏洞,Tomcat广泛应用于企业
|
||||
|
||||
---
|
||||
|
||||
### CVE-2025-48384 - Git任意文件写入漏洞扫描
|
||||
|
||||
#### 📌 漏洞信息
|
||||
|
||||
| 属性 | 详情 |
|
||||
|------|------|
|
||||
| CVE编号 | CVE-2025-48384 |
|
||||
| 风险等级 | `CRITICAL` |
|
||||
| 利用状态 | `理论可行` |
|
||||
| 发布时间 | 2025-09-09 00:00:00 |
|
||||
| 最后更新 | 2025-09-09 05:17:02 |
|
||||
|
||||
#### 📦 相关仓库
|
||||
|
||||
- [CVE-2025-48384-Scanner](https://github.com/EdwardYeIntrix/CVE-2025-48384-Scanner)
|
||||
|
||||
#### 💡 分析概述
|
||||
|
||||
该仓库提供了一个Python编写的扫描器,用于检测CVE-2025-48384 Git漏洞。该漏洞允许攻击者在git clone --recursive操作期间写入任意文件,可能导致远程代码执行。仓库包含一个Python脚本(cve_2025_48384_auto_print_scanner.py),该脚本可以扫描本地Git仓库或远程仓库,检测.gitmodules文件中的恶意条目、指向hooks的符号链接,以及可执行的Git hooks。更新内容包括README.md文档的创建,详细描述了漏洞及扫描器的使用方法,并添加了Python扫描器脚本,用于自动化检测。漏洞利用方式:攻击者构造恶意的.gitmodules文件或符号链接,在git clone --recursive操作时触发,从而实现任意文件写入和RCE。
|
||||
|
||||
#### 🔍 关键发现
|
||||
|
||||
| 序号 | 发现内容 |
|
||||
|------|----------|
|
||||
| 1 | CVE-2025-48384允许Git在clone --recursive期间写入任意文件。 |
|
||||
| 2 | 该漏洞可能通过恶意.gitmodules、符号链接和Git hooks实现RCE。 |
|
||||
| 3 | 提供的扫描器可以检测潜在的恶意Git仓库。 |
|
||||
| 4 | Windows系统不受该漏洞影响。 |
|
||||
|
||||
#### 🛠️ 技术细节
|
||||
|
||||
> 漏洞原理:Git在处理clone --recursive操作时,未充分验证.gitmodules文件中的路径和符号链接,导致攻击者能够写入任意文件。
|
||||
|
||||
> 利用方法:攻击者构造包含恶意路径的.gitmodules文件,或创建指向.git/hooks目录的符号链接,在用户进行git clone --recursive时触发漏洞,执行恶意代码。
|
||||
|
||||
> 修复方案:官方修复补丁尚未发布,缓解措施包括禁用recursive clone,或者对clone操作进行严格的代码审计。
|
||||
|
||||
|
||||
#### 🎯 受影响组件
|
||||
|
||||
```
|
||||
• Git版本:具体受影响版本信息未知,但该漏洞影响Linux和macOS平台
|
||||
• 扫描器组件:cve_2025_48384_auto_print_scanner.py
|
||||
```
|
||||
|
||||
#### ⚡ 价值评估
|
||||
|
||||
<details>
|
||||
<summary>展开查看详细评估</summary>
|
||||
|
||||
该漏洞为0day,且影响Git关键操作,一旦被利用,将导致严重的安全风险。扫描器虽然只是PoC,但证明了该漏洞的可利用性,并且提供了简单的检测方法。
|
||||
</details>
|
||||
|
||||
---
|
||||
|
||||
|
||||
## 免责声明
|
||||
本文内容由 AI 自动生成,仅供参考和学习交流。文章中的观点和建议不代表作者立场,使用本文信息需自行承担风险和责任。
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user