Aggregator
ZDI-CAN-27261: QEMU
ZDI-CAN-26972: Langflow
ZDI-CAN-27497: Langflow
ZDI-CAN-27322: Langflow
ZDI-CAN-27325: Langflow
微信3.9 RCE漏洞,听说已有受害者
上下文引擎(Context Engine) - 智能体的核心基石技术分析
时隔5年,Epic 再次限免:《席德·梅尔的文明®VI 白金版》
Buy Now, Pay Later… with your data
Buy Now, Pay Later (BNPL) apps are everywhere these days. Whether you’re buying sneakers or groceries, chances are you’ve seen the option to split your payments over time. It’s quick and easy. But behind the convenience is a growing privacy concern that most users know little about. A new study from Incogni digs into just how much personal information BNPL apps collect and share. The research looked at eight of the most popular BNPL apps … More →
The post Buy Now, Pay Later… with your data appeared first on Help Net Security.
智能化软件开发微访谈·第三十九期 大模型驱动的智能应用生态创新
Neural Network Fuzzing macOS Userland (For Fun and Pain)
Best way to reset Mac after a hack
New infosec products of the week: July 18, 2025
Here’s a look at the most interesting products from the past week, featuring releases from At-Bay, Immersive, NETSCOUT, Socure, and Stellar Cyber. Stellar Cyber 6.0.0 enhances automation, workflow intelligence, and user experience The 6.0.0 release builds on Stellar Cyber’s vision of delivering intelligent, efficient, and decisive security operations through automation, AI, and integration, all while remaining open, flexible, and accessible for security teams of any size or skill level. NETSCOUT Adaptive Threat Analytics improves incident … More →
The post New infosec products of the week: July 18, 2025 appeared first on Help Net Security.
Dermatology, Imaging Hacks Expose 3.3 Million Patients' PHI
A Maryland dermatology practice and a Virginia radiology organization have each reported to regulators separate hacking incidents that in total affected the information of more than 3.3 million patients. The incidents rank among the five largest health data breaches reported in 2025 so far.
Coro's New CEO Prioritizes Channel-Driven Global Expansion
As Coro's new CEO, Joe Sykora is steering the SMB cybersecurity platform provider toward rapid international growth with a 100% partner-focused strategy, revamped operations and new tools for MSPs in an effort to dominate the underserved small and midsize business cybersecurity market.
Golden dMSA Flaw Exposes Firms to Major Credential Theft
A critical cryptographic flaw in Windows Server 2025's delegated Managed Service Accounts, or dMSAs, allows attackers to generate passwords for every managed service account across an Active Directory forest and create a backdoor, Semperis researchers found.
China-Backed Hackers Intensify Attacks on Taiwan Chipmakers
Chinese state-aligned hackers have ramped up espionage efforts against Taiwan's semiconductor ecosystem through spear-phishing campaigns. Three distinct threat actors targeted chipmakers, packaging and testing firms, equipment suppliers and financial analysts.
黑客正在利用Wing FTP服务器的关键RCE漏洞
近期,黑客在技术细节曝光后的第一天就利用了Wing FTP Server中的一个严重远程代码执行漏洞。观察到的攻击执行了多个枚举和侦察命令,随后通过创建新用户来建立持久性。
被利用的Wing FTP Server漏洞被追踪为CVE-2025-47812,并获得了最高的严重性评分。它是空字节和Lua代码注入的组合,允许未经身份验证的远程攻击者以系统(root/ system)上的最高权限执行代码。
Wing FTP Server是一个强大的解决方案,用于管理可以执行Lua脚本的安全文件传输,它广泛用于企业和SMB环境。
安全研究员Julien Ahrens近期发表了一篇CVE-2025-47812的技术文章,解释说该漏洞源于C++中对以空结尾的字符串的不安全处理以及Lua中不正确的输入处理。
研究人员演示了用户名字段中的空字节如何绕过身份验证检查并使Lua代码注入到会话文件中。当这些文件随后由服务器执行时,可以实现以根/SYSTEM的身份执行任意代码。
除了CVE-2025-47812之外,研究人员还提出了Wing FTP中的另外三个漏洞:
·CVE-2025-27889——如果用户提交登录表单,通过构造的URL可以窃取用户密码,因为在JavaScript变量(位置)中包含不安全的密码。
·CVE-2025-47811——Wing FTP默认以root/SYSTEM身份运行,没有沙箱或特权下降,使得rce更加危险。
·CVE-2025-47813——提供过长的UID cookie会泄露文件系统路径。
所有的漏洞都影响到7.4.3及更早版本的Wing FTP。供应商在2025年5月14日发布了7.4.4版本修复了这些问题,但 CVE-2025-47811被认为不重要,未做修复。
管理网络安全平台Huntress的威胁研究人员创建了CVE-2025-47812的概念验证漏洞,并展示了黑客如何利用它进行攻击:
Huntress的研究人员发现,在7月1日,也就是CVE-2025-47812的技术细节出现的第二天,至少有一个攻击者利用了他们一个客户的漏洞。
攻击者发送了带有空字节注入的用户名的畸形登录请求,目标是‘ loginok.html ’。这些输入创建了恶意session . Lua文件,将Lua代码注入服务器。
注入的代码被设计成十六进制解码有效载荷并通过cmd.exe执行它,使用certutil从远程位置下载恶意软件并执行它。
同一个Wing FTP实例在短时间内被五个不同的IP地址作为攻击目标,这可能表明有几个威胁者试图进行大规模扫描和利用。
在这些尝试中观察到的命令是用于侦察、获取环境中的持久性以及使用cURL工具和webhook端点进行数据泄露。
Huntress表示,黑客攻击失败“可能是因为他们不熟悉这些软件,或者是因为微软防御者阻止了他们的部分攻击”。尽管如此,研究人员还是发现了对Wing FTP服务器关键漏洞的明显利用。
即使Huntress观察到针对其客户的失败攻击,黑客也可能会扫描可访问的Wing FTP实例,并试图利用易受攻击的服务器。因此,强烈建议相关公司尽快升级到该产品的7.4.4版本。
如果切换到更新的安全版本是不可能的,研究人员的建议是禁用或限制HTTP/HTTPs访问到Wing FTP web门户,禁用匿名登录,并监控会话目录的可疑添加。