Bitwarden CLI npm°üÔ⹩ӦÁ´¹¥»÷
Ðû²¼Ê±¼ä 2026-04-271. ZimbraÓʼþϵͳXSSÎó²îÔâÒ»Á¬¹¥»÷
4ÔÂ24ÈÕ£¬£¬£¬£¬£¬¾Ý·ÇÓªÀûÇå¾²×éÖ¯ShadowserverÖÒÑÔ£¬£¬£¬£¬£¬Áè¼Ý10,000¸ö̻¶ÔÚÍøÂçÉϵÄZimbra Collaboration SuiteʵÀýÕýÃæÁÙÒ»Á¬µÄ¿çÕ¾¾ç±¾¹¥»÷¡£¡£¡£ZimbraÊÇÒ»¿îÔÚÈ«ÇòÓµÓÐÊýÒÚÓû§µÄÊ¢Ðеç×ÓÓʼþºÍÐ×÷Èí¼þÌ×¼þ£¬£¬£¬£¬£¬ÆÕ±éЧÀÍÓÚÊý°Ù¸öÕþ¸®»ú¹¹ºÍÊýǧ¼ÒÆóÒµ¡£¡£¡£±»Ê¹ÓõÄÎó²î±àºÅΪCVE-2025-48700£¬£¬£¬£¬£¬Ó°ÏìZCS 8.8.15¡¢9.0¡¢10.0ºÍ10.1°æ±¾£¬£¬£¬£¬£¬ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÔÚÓû§»á»°ÖÐÖ´ÐÐí§ÒâJavaScript´úÂ룬£¬£¬£¬£¬½ø¶øÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£¡£¡£¹©Ó¦ÉÌSynacorÒÑÓÚ2025Äê6ÔÂÐû²¼Çå¾²²¹¶¡£¬£¬£¬£¬£¬²¢ÖÒÑÔ¸ÃÎó²îʹÓÃÎÞÐèÓû§½»»¥£¬£¬£¬£¬£¬µ±Óû§ÔÚZimbra Classic UIÖÐÉó²é¶ñÒâ½á¹¹µÄµç×ÓÓʼþʱ¼´¿É´¥·¢¡£¡£¡£CISA»ùÓÚÏÖʵʹÓõÄÖ¤¾Ý£¬£¬£¬£¬£¬½«¸ÃÎó²î±ê¼ÇΪÒѱ»Ê¹Óò¢ÁÐÈëÒÑ֪ʹÓÃÎó²îĿ¼£¬£¬£¬£¬£¬Í¬Ê±ÏÂÁîÁª°îÃñÊÂÐÐÕþ²¿·Ö»ú¹¹ÔÚ4ÔÂ23ÈÕǰÍê³ÉZimbraЧÀÍÆ÷µÄÇå¾²¼Ó¹Ì¡£¡£¡£ÖÜÎ壬£¬£¬£¬£¬Shadowserver½øÒ»²½·¢³öÖÒÑÔ£¬£¬£¬£¬£¬ÈÔÓÐÁè¼Ý10,500̨̻¶ÔÚÍâµÄZimbraЧÀÍÆ÷δ´ò²¹¶¡£¬£¬£¬£¬£¬ÆäÖд󲿷ÖλÓÚÑÇÖÞ£¨3,794̨£©ºÍÅ·ÖÞ£¨3,793̨£©¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cisa-says-zimbra-flaw-now-exploited-over-10k-servers-vulnerable/
2. ¹«ÓÃÊÂÒµÊÖÒÕ¹«Ë¾ItronÔâÍøÂç¹¥»÷
4ÔÂ26ÈÕ£¬£¬£¬£¬£¬¹«ÓÃÊÂÒµÊÖÒÕ¹«Ë¾Itron, Inc.¿ËÈÕÅû¶£¬£¬£¬£¬£¬Ò»´ÎÍøÂç¹¥»÷µ¼ÖÂδ¾ÊÚȨµÄµÚÈý·½»á¼ûÁËÆä²¿·ÖÄÚ²¿ÏµÍ³¡£¡£¡£¸Ã¹«Ë¾ÔÚÌá½»¸øÃÀ¹ú֤ȯÉúÒâίԱ»áµÄ8-KÎļþÖÐÌåÏÖ£¬£¬£¬£¬£¬ÉϸöÔ¼ì²âµ½¸Ã»î¶¯ºó£¬£¬£¬£¬£¬Á¬Ã¦Æô¶¯ÁËÍøÂçÇå¾²ÏìÓ¦ÍýÏ룬£¬£¬£¬£¬Í¨ÖªÁËÖ´·¨²¿·Ö£¬£¬£¬£¬£¬²¢Ô¼ÇëÁËÍⲿÕÕÁÏÒÔÖ§³ÖÊÓ²ìºÍÊÂÎñ¿ØÖÆ¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬Î´¾ÊÚȨµÄ»î¶¯Òѱ»×èÖ¹£¬£¬£¬£¬£¬¹«Ë¾ÌåÏÖûÓз¢Ã÷ÈκκóÐø»î¶¯¡£¡£¡£ItronÊÇÒ»¼Ò×ܲ¿Î»ÓÚ»ªÊ¢¶ÙµÄÉÏÊй«Ë¾£¬£¬£¬£¬£¬ÎªÄÜÔ´ºÍË®×ÊÔ´ÖÎÀíÌṩ¹«ÓÃÊÂÒµÊÖÒÕ²úÆ·ºÍЧÀÍ¡£¡£¡£Ö»¹Ü´Ë´ÎÊÂÎñÉæ¼°ÄÚ²¿ÏµÍ³±»²»·¨»á¼û£¬£¬£¬£¬£¬µ«ItronÇ¿µ÷£¬£¬£¬£¬£¬ÕⲢδ¶ÔÓªÒµÔËÓªÔì³ÉʵÖÊÐÔ×ÌÈÅ£¬£¬£¬£¬£¬ÏÖÔÚÔ¤¼ÆÒ²²»»á±¬·¢ÈκκóÐøÓ°Ïì¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬¸Ã¹«Ë¾Ô¤¼Æ´ó²¿·ÖÓëÊÂÎñÏà¹ØµÄ±¾Ç®½«Óɰü¹Ü¼ç¸º¡£¡£¡£Itron»¹Ö¸³ö£¬£¬£¬£¬£¬´Ë´Îδ¾ÊÚȨµÄ»î¶¯²¢Î´²¨¼°¿Í»§¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬ÐèÒª×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬¶Ô¸ÃÊÂÎñµÄ¹æÄ£ºÍÓ°ÏìµÄÊÓ²ìÈÔÔÚ¾ÙÐÐÖС£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬£¬ÉÐÎÞÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/american-utility-firm-itron-discloses-breach-of-internal-it-network/
3. ADTÔâÊý¾Ýй¶£¬£¬£¬£¬£¬ShinyHuntersÀÕË÷ÍòÍòÌõ¼Í¼
4ÔÂ24ÈÕ£¬£¬£¬£¬£¬¼ÒÍ¥Çå¾²¾ÞÍ·ADT¿ËÈÕ֤ʵ±¬·¢ÁËÒ»ÆðÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬´ËǰÀÕË÷×éÖ¯ShinyHuntersÍþв³Æ£¬£¬£¬£¬£¬³ý·ÇÖ§¸¶Êê½ð£¬£¬£¬£¬£¬²»È»½«¹ûÕæ±»µÁÊý¾Ý¡£¡£¡£ADTÓÚ4ÔÂ20ÈÕ¼ì²âµ½Î´¾ÊÚȨ»á¼û¿Í»§ºÍDZÔÚ¿Í»§Êý¾ÝµÄÐÐΪ£¬£¬£¬£¬£¬ËæºóÁ¬Ã¦ÖÕÖ¹ÁËÈëÇÖ²¢Õö¿ªÊӲ졣¡£¡£ÊÓ²ìЧ¹ûÏÔʾ£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÖÐСÎÒ˽¼ÒÐÅÏ¢±»µÁ£¬£¬£¬£¬£¬µ«¹æÄ£ÓÐÏÞ¡£¡£¡£ADTÌåÏÖ£¬£¬£¬£¬£¬Ð¹Â¶µÄÐÅÏ¢½öÏÞÓÚÐÕÃû¡¢µç»°ºÅÂëºÍµØµã£¬£¬£¬£¬£¬ÔÚÉÙÉÙÊýÇéÐÎÏ»¹°üÀ¨³öÉúÈÕÆÚºÍÉç±£ºÅÂë»ò˰ºÅµÄºóËÄλ¡£¡£¡£ÖÁ¹ØÖ÷ÒªµÄÒ»µãÊÇ£¬£¬£¬£¬£¬Ã»ÓÐÈκÎÖ§¸¶ÐÅÏ¢£¨°üÀ¨ÒøÐÐÕË»§»òÐÅÓÿ¨ÐÅÏ¢£©±»»ñÈ¡£¬£¬£¬£¬£¬¿Í»§µÄÇ徲ϵͳҲδÊܵ½ÈκÎÓ°Ïì»òË𺦡£¡£¡£ADTÇ¿µ÷ÒÑÁªÏµËùÓÐÊÜÓ°ÏìÖ°Ô±¡£¡£¡£´Ëǰ£¬£¬£¬£¬£¬ShinyHuntersÒÑÔÚÆäÊý¾ÝÐ¹Â¶ÍøÕ¾ÉÏÐû²¼ADT£¬£¬£¬£¬£¬Éù³ÆÇÔÈ¡Á˰üÀ¨1000ÍòÌõ¿Í»§Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢¼°ÆäËûÄÚ²¿¹«Ë¾Êý¾ÝµÄ¼Í¼£¬£¬£¬£¬£¬²¢Ðû²¼ÁË×îºóͨ뺣¬£¬£¬£¬£¬ÒªÇóADTÔÚ2026Äê4ÔÂ27ÈÕǰÓëÆäÁªÏµ²¢Ö§¸¶Êê½ð£¬£¬£¬£¬£¬²»È»½«¹ûÕæÊý¾Ý¡£¡£¡£ADT²¢Î´Ö¤Êµ¹¥»÷ÕßÉù³ÆµÄÊý¾ÝÇÔÈ¡Á¿¡£¡£¡£ShinyHunters͸¶£¬£¬£¬£¬£¬ËûÃÇͨ¹ýÓïÒô´¹ÂÚ¹¥»÷ÈëÇÖADT£¬£¬£¬£¬£¬µ¼ÖÂÒ»ÃûÔ±¹¤µÄOktaµ¥µãµÇ¼ÕË»§±»µÁ£¬£¬£¬£¬£¬½ø¶øÊ¹ÓøÃÕË»§»á¼û²¢ÇÔÈ¡ÁËADT SalesforceϵͳÖеÄÊý¾Ý¡£¡£¡£
https://www.bleepingcomputer.com/news/security/adt-confirms-data-breach-after-shinyhunters-leak-threat/
4. ÀÕË÷×éÖ¯BlackFile½èÓïÒô´¹ÂÚ¹¥»÷ÁãÊÛÓëÂùÝÒµ
4ÔÂ24ÈÕ£¬£¬£¬£¬£¬×Ô2026Äê2ÔÂÒÔÀ´£¬£¬£¬£¬£¬Ò»¸öÃûΪBlackFileµÄÒÔ¾¼ÃÀûÒæÎªÄ¿µÄµÄÐÂÐ˺ڿÍ×éÖ¯ÓëһϵÁÐÕë¶ÔÁãÊÛºÍÂùÝÒµµÄÊý¾Ý͵ÇÔ¼°ÀÕË÷¹¥»÷Óйء£¡£¡£¾ÝPalo Alto NetworksµÄUnit 42ÓëÁãÊÛºÍÂùÝÐÅÏ¢¹²ÏíÓëÆÊÎöÖÐÐÄÅû¶£¬£¬£¬£¬£¬¸Ã×éÖ¯£¨Òà³ÆCL-CRI-1116¡¢UNC6671ºÍCordial Spider£©Í¨¹ýð³äÆóÒµITЧÀĮְ́ԱÇÔȡԱ¹¤Æ¾Ö¤£¬£¬£¬£¬£¬²¢ÏòÊܺ¦ÕßË÷ÒªÆßλÊýÊê½ð¡£¡£¡£BlackFileµÄ¹¥»÷ʼÓÚʹÓÃαÔìºÅÂë¸øÔ±¹¤´òµç»°£¬£¬£¬£¬£¬ÍþвÕßð³äITÖ§³ÖÖ°Ô±£¬£¬£¬£¬£¬ÓÕÆÔ±¹¤»á¼ûÐéαµÄÆóÒµµÇÂ¼Ò³Ãæ£¬£¬£¬£¬£¬ÒªÇóÊäÈëÆ¾Ö¤ºÍÒ»´ÎÐÔÃÜÂë¡£¡£¡£¹¥»÷ÕßʹÓÃÇÔÈ¡µÄƾ֤ע²á×Ô¼ºµÄ×°±¸ÒÔÈÆ¹ý¶àÒòËØÈÏÖ¤£¬£¬£¬£¬£¬Ëæºóͨ¹ýץȡÄÚ²¿Ô±¹¤Ä¿Â¼ÌáÉý¶Ô¸ß¹Ü¼¶ÕË»§µÄ»á¼ûȨÏÞ¡£¡£¡£¸Ã×é֯ʹÓñê×¼APIº¯Êý´ÓÊܺ¦ÕßµÄSalesforceºÍSharePointЧÀÍÆ÷ÇÔÈ¡Êý¾Ý£¬£¬£¬£¬£¬×¨ÃÅËÑË÷°üÀ¨¡°ÉñÃØ¡±ºÍ¡°SSN¡±µÈÃô¸ÐÊõÓïµÄÎļþ¡£¡£¡£ÇÔÈ¡µÄÎļþ±»ÏÂÔØµ½¹¥»÷Õß¿ØÖƵÄЧÀÍÆ÷£¬£¬£¬£¬£¬²¢Ðû²¼µ½¸ÃÍÅ»ïµÄ°µÍøÊý¾ÝÐ¹Â¶ÍøÕ¾£¬£¬£¬£¬£¬ËæºóÊܺ¦Õß»áͨ¹ý±»ÈëÇÖµÄÔ±¹¤µç×ÓÓʼþÕË»§»òËæ»úÌìÉúµÄGmailµØµãÊÕµ½Êê½ðÒªÇ󡣡£¡£
https://www.bleepingcomputer.com/news/security/new-blackfile-extortion-gang-targets-retail-and-hospitality-orgs/
5. ShinyHuntersÉù³ÆÈëÇÖÔÚÏßѧϰƽ̨Udemy
4ÔÂ24ÈÕ£¬£¬£¬£¬£¬ÀÕË÷×éÖ¯ShinyHunters¿ËÈÕÉù³ÆÒÑÀÖ³ÉÈëÇÖÔÚÏßѧϰƽ̨Udemy£¬£¬£¬£¬£¬²¢ÍþвҪÐû²¼Áè¼Ý140ÍòÌõ°üÀ¨Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢¼°ÆäËûÄÚ²¿¹«Ë¾Êý¾ÝµÄ¼Í¼¡£¡£¡£2026Äê4ÔÂ24ÈÕ£¬£¬£¬£¬£¬¸ÃÎÛÃûÕÑÖøµÄÍøÂç·¸·¨ÍŻォUdemyÁÐÈëÆä°µÍøÊܺ¦ÕßÃûµ¥£¬£¬£¬£¬£¬²¢·¢³ö×îºóͨ뺣¬£¬£¬£¬£¬ÒªÇó¹«Ë¾ÔÚ2026Äê4ÔÂ27ÈÕǰÁªÏµËûÃDz¢Ö§¸¶Êê½ð£¬£¬£¬£¬£¬²»È»½«¹ûÕæÐ¹Â¶Êý¾Ý¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬£¬¸Ã˵·¨ÉÐδ»ñµÃ¹Ù·½Ö¤Êµ£¬£¬£¬£¬£¬ShinyHuntersҲδÏñ´Ëǰ¹¥»÷ÆäËû¹«Ë¾Ê±ÄÇÑù¸½ÉÏÑù±¾Êý¾Ý»ò½ØÍ¼ÒÔ×ôÖ¤ÆäÖ÷ÕÅ¡£¡£¡£UdemyÊÇÈ«ÇòÁìÏȵÄÔÚÏßѧϰƽ̨֮һ£¬£¬£¬£¬£¬2024ÄêÔ¤¼ÆÓµÓÐ7700ÍòÔÚÏßѧϰÕߣ¬£¬£¬£¬£¬×ÔÄÇʱÆðÕâÒ»Êý×Ö¿ÉÄÜ»¹ÔÚÔöÌí¡£¡£¡£ÏÖÔÚÉв»ÇåÎú¾Ý³ÆÐ¹Â¶µÄ140ÍòÌõ¼Í¼Ïêϸ°üÀ¨ÄÄЩÓû§ÈºÌåµÄÐÅÏ¢£¬£¬£¬£¬£¬¿ÉÄÜÊÇͨË×ѧԱ¡¢½²Ê¦¡¢Ô±¹¤»òÕâЩȺÌåµÄ×éºÏ¡£¡£¡£µ«ÎÞÂÛÔõÑù£¬£¬£¬£¬£¬140ÍòÌõ¼Í¼¶¼ÊÇÒ»¸öÖØ´óµÄÊý×Ö£¬£¬£¬£¬£¬ÆäDZÔÚЧ¹ûÊ®·ÖÑÏÖØ£¬£¬£¬£¬£¬³ýÁËÏÔ¶øÒ×¼ûµÄթƺͽðÈÚÚ²ÆÎ£º¦Í⣬£¬£¬£¬£¬ÕâЩÊý¾Ý»¹¿ÉÄÜΪ¹¥»÷ÕßÌṩÕìÌ½ËØ²Ä£¬£¬£¬£¬£¬ÓÉÓÚÐí¶àÈËʹÓÃUdemy¿Î³ÌÀ´ÌáÉýÖ°ÒµÊÖÒÕ¡£¡£¡£
https://cybernews.com/security/shinyhunters-claim-udemy-data-theft/
6. Bitwarden CLI npm°üÔ⹩ӦÁ´¹¥»÷
4ÔÂ24ÈÕ£¬£¬£¬£¬£¬Ò»Á¬Ò»Ö±µÄÈí¼þ¹©Ó¦Á´ºÚ¿Í¹¥»÷À˳±ÏÖÔÚ²¨¼°µ½ÁË×îÊܽӴýµÄÃÜÂëÖÎÀíÆ÷Ö®Ò»Bitwarden¡£¡£¡£¹¥»÷ÕßÔÚÆäÏÂÁîÐй¤¾ßµÄnpm°üÖÐÖ²ÈëÁ˶ñÒâÈí¼þ¡£¡£¡£BitwardenÌåÏÖ£¬£¬£¬£¬£¬Óû§ÃÜÂë¿âÊý¾ÝÈÔÈ»ÍêºÃÎÞË𣬣¬£¬£¬£¬Í¨Ë×Óû§Î´ÊÜÓ°Ï죬£¬£¬£¬£¬µ«²¿·Ö¿ª·¢ÕßÐèҪСÐÄ¡£¡£¡£ÄÇЩ´ËǰÈëÇÖCheckmarxÇå¾²¹¤¾ßµÄ¹¥»÷Õߣ¬£¬£¬£¬£¬Í¬ÑùÕÒµ½ÁËÈëÇÖBitwarden npm°üµÄÒªÁ죬£¬£¬£¬£¬ÔÚnpm´úÂë¿âÖÐÐû²¼ÁËÒ»¸ö´øÓжñÒâÈí¼þµÄCLI°æ±¾¡£¡£¡£Bitwarden CLIÊǹ©¸ß¼¶Óû§»òϵͳÖÎÀíÔ±ÒÔ±à³Ì·½·¨ÓëÃÜÂëÖÎÀíÆ÷½»»¥µÄÖն˹¤¾ß¡£¡£¡£BitwardenÇå¾²ÍŶÓÈ·ÈÏ£¬£¬£¬£¬£¬ÊÂÎñ±¬·¢ÔÚ2026Äê4ÔÂ22ÈÕÏÂÖç5:57ÖÁÍíÉÏ7:30£¨ÃÀ¹ú¶«²¿Ê±¼ä£©Ö®¼ä¡£¡£¡£ÔÚ¶ÌÔݵĴ°¿°¢ÚÄÚÏÂÔØÁËCLI°æ±¾2026.4.0µÄÓû§£¬£¬£¬£¬£¬Îñ±Ø½«ÏµÍ³ÊÓΪÒѱ»ÈëÇÖ²¢¼ÙÉèÆ¾Ö¤ÒÑй¶¡£¡£¡£¾ÝArnicaÁªºÏÊ×´´È˼æÊ×ϯÊÖÒÕ¹ÙEran Medan͸¶£¬£¬£¬£¬£¬ËäÈ»Áè¼Ý1000ÍòÓû§Ê¹ÓÃBitwardenµÄ¿ªÔ´ÃÜÂëÖÎÀíÆ÷£¬£¬£¬£¬£¬µ«Ö»ÓÐ334λ¿ª·¢ÕßÏÂÔØÁ˶ñÒâCLI¹¤¾ß¡£¡£¡£StepSecurityÆÊÎöÖ¸³ö£¬£¬£¬£¬£¬´Ë´ÎÍøÂç¹¥»÷Ô´ÓÚBitwardenÒ»Ãû¹¤³ÌʦµÄGitHubÕË»§±»µÁÓᣡ£¡£
https://cybernews.com/security/bitwarden-cli-npm-package-compromised-with-malware/


¾©¹«Íø°²±¸11010802024551ºÅ