慣性聚合 高效追讀感興趣之博客、新聞、科技資訊
閱原文 以慣性聚合開啟

推薦訂閱源

L
LangChain Blog
宝玉的分享
宝玉的分享
酷 壳 – CoolShell
酷 壳 – CoolShell
N
Netflix TechBlog - Medium
F
Fortinet All Blogs
T
Tailwind CSS Blog
Google DeepMind News
Google DeepMind News
Jina AI
Jina AI
J
Java Code Geeks
Recent Announcements
Recent Announcements
The Cloudflare Blog
D
DataBreaches.Net
Hugging Face - Blog
Hugging Face - Blog
WordPress大学
WordPress大学
Vercel News
Vercel News
月光博客
月光博客
奇客Solidot–传递最新科技情报
奇客Solidot–传递最新科技情报
Microsoft Azure Blog
Microsoft Azure Blog
雷峰网
雷峰网
H
Help Net Security
博客园 - Franky
S
SegmentFault 最新的问题
T
The Blog of Author Tim Ferriss
博客园_首页
C
Check Point Blog
腾讯CDC
美团技术团队
Martin Fowler
Martin Fowler
The GitHub Blog
The GitHub Blog
M
MIT News - Artificial intelligence
Apple Machine Learning Research
Apple Machine Learning Research
P
Proofpoint News Feed
U
Unit 42
人人都是产品经理
人人都是产品经理
让小产品的独立变现更简单 - ezindie.com
让小产品的独立变现更简单 - ezindie.com
Engineering at Meta
Engineering at Meta
M
Microsoft Research Blog - Microsoft Research
阮一峰的网络日志
阮一峰的网络日志
G
Google Developers Blog
Stack Overflow Blog
Stack Overflow Blog
B
Blog
Last Week in AI
Last Week in AI
博客园 - 三生石上(FineUI控件)
博客园 - 聂微东
云风的 BLOG
云风的 BLOG
H
Hackread – Cybersecurity News, Data Breaches, AI and More
李成银的技术随笔
OSCHINA 社区最新新闻
OSCHINA 社区最新新闻
博客园 - 叶小钗
钛媒体:引领未来商业与生活新知
钛媒体:引领未来商业与生活新知

Security Affairs

Why pure extortion is replacing traditional ransomware Ghostwriter Is Back, Using a Ukrainian Learning Platform as Bait to Hit Government Targets Authorities arrest 23-year-old accused of running the Kimwolf botnet U.S. CISA adds Trend Micro Apex One and Langflow to its Known Exploited Vulnerabilities catalog One Telecom Provider Hosted Most of the Middle East ’s Active C2 Infrastructure U.S. CISA adds Microsoft and Adobe flaws to its Known Exploited Vulnerabilities catalog Global law enforcement operation takes First VPN offline Apple Blocks Over 2 Million Apps in 2025 Fraud Crackdown Attackers are bypassing MFA on SonicWall VPNs because something was wrong with previous fix Cisco fixed maximum severity flaw CVE-2026-20223 in Secure Workload Discord adds end-to-end encryption to voice and video calls by default PinTheft: Another Linux Privilege Escalation, Another Working Exploit, This Time Targeting Arch Microsoft issues YellowKey mitigation, no patch yet Carding site B1ack’s Stash dumps 4.6 Million stolen cards for free A malicious VS code extension just breached GitHub ‘s internal repositories DirtyDecrypt: PoC Released for yet another Linux flaw Alleged Huawei zero-day blamed for the 2025 Luxembourg telecom crash Drupal is rolling out an emergency security update on May 20. You cannot miss it Microsoft dismantled malware-signing network Fox Tempest Poland shifts away from Signal following cyberattacks on officials’ accounts Massive MENA cybercrime Operation Ramz disrupts infrastructure and arrests 201 suspects Shai-Hulud worm copycats emerge after source code leak Grafana confirms GitHub token breach cybercrime group claims the attack ShinyHunters hack 7-Eleven: franchisee data and Salesforce records exposed Public Amazon bucket leaks sensitive guest data from Japanese hotel platform Tabiq Chaotic Eclipse discloses MiniPlasma zero-day, suggesting a missing or undone 2020 Windows security fix Experts warn of active exploitation of critical NGINX flaw CVE-2026-42945 Experts warn of active exploitation of critical NGINX flaw CVE-2026-42945 SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 97 Security Affairs newsletter Round 577 by Pierluigi Paganini – INTERNATIONAL EDITION Attackers exploit Funnel Builder bug to inject e-skimmers into e-stores Pwn2Own Berlin 2026, Day Three: DEVCORE Crowned Master of Pwn, $1.298 Million Total U.S. CISA adds a flaw in Microsoft Exchange Server to its Known Exploited Vulnerabilities catalog Russian APT Turla builds long-term access tool with Kazuar Botnet evolution OpenAI hit by supply chain attack linked to malicious TanStack packages Pwn2Own Berlin 2026, Day Two: $385,750 more, Microsoft Exchange falls, and the running total crosses $900K CVE-2026-42897: Microsoft confirms active exploitation of Exchange Server zero-day Ghostwriter group resumes attacks on Ukrainian Government targets Researchers uncover YellowKey and GreenPlasma Windows Zero-Days Pwn2Own Berlin 2026, Day One: $523,000 paid out, AI products fall U.S. CISA adds a flaw in Cisco Catalyst SD-WAN to its Known Exploited Vulnerabilities catalog Linux Kernel bug Fragnesia allows local root access attacks Broadcom releases VMware Fusion security update for root access bug NGINX Rift: an 18-year-old flaw in the world’s most deployed web server just came to light FamousSparrow targets Azerbaijani energy sector in multi-wave espionage campaign Nitrogen Ransomware claims massive data theft from Foxconn Microsoft Patch Tuesday for May 2026 fix 138 bugs, some of them are alarming OpenLoop Health confirms January 2026 Data breach affecting 716,000 Quest KACE SMA flaw CVE-2025-32975: when one unpatched tool opens the door to 60 organizations Instructure settles with hackers following massive student data theft
CVE-2026-9082:Drupal之极危SQL注入缺陷已遭主动攻击
Pierluigi Pa · 2026-05-24 · via Security Affairs

攻者始利用 Drupal SQL 注入之缺漏 CVE-2026-9082,于补丁发布后四十八时辰内便行其术。

Drupal 于五月廿日发布高度关键之安全补丁,以应 CVE-2026-9082。,此乃SQL注入之隙,使未获授权之攻者得陷PostgreSQL数据库所运行之站点。项目维护者于发布前已警示,称利用之法或现于数时辰乃至数日之内。其预言果验;利用之试几乎立时发轫,四十八时辰内,安全之商已追踪旷野中数千次攻击。

此缺陷藏于一API之中,其设为净化工数据库查询,以防SQL注入。然该API有隙,使攻击者可发特制之请,于使用PostgreSQL之站注入任意SQL命。如Drupal于其告警中所言。

云:“此API有隙,使攻者可发巧构之请,致PostgreSQL数据库之用者,任SQL注入焉。此可致信息泄露,或于某些情形,得权升级,远程代码执行,或他种攻击。”之告如是言。又云:“此隙,无名者可乘之。”

其果可自泄密至权升,或于某些配置中,行远程码执行之事。

非所有Drupal之站皆受其害,此弊唯及以PostgreSQL为数据库后端者,Drupal估其不过五分之一耳。然则,鉴于Drupal驱动全球数十万网站,其中多属政府、高等教育、媒体及企业之环境,故此仍可致数千潜在脆弱之站。

关于CVE-2026-9082之告诫,五月廿二日更新,适逢补丁发布后两日,其详言明示众所已疑:

“风险之评分已更,以显今有利用之尝试,已见诸野。”于更新之告诫。

Drupal 依 NIST CVSS 之评分法,其最高评级为廿五,故得廿三者,当属“急速修补”之列。

Imperva之研士出数据,显攻击者行踪之速。该安企公司报称,披露后二日之内,睹逾一万五千之利用尝试,针对六千近处之站点,散布于六十五国。其半数攻击,皆指向博弈与金融服务之站点,此二者,皆可立时盗取凭据,并得金融数据,以谋利。

自 CVE-2026-9082 之告,Imperva 观察得攻击之试逾一万五千,所向几六千之众,布于六十五国。攻击之的,今尤在游艺与财服之场,合占攻击之半,几近五成。,Imperva 之言也。。“此模式示,攻击者与扫描器主欲辨识暴露之Drupal站,运行脆弱PostgreSQL配置者。虽当前活动主为侦察与验证,然此脆弱之性,若得成功利用,则可速自探测转为数据窃取或权限提升。”

首攻之国,美利坚(61.8%)、新加波(6.6%)、澳大利亚(6.3%)为最。

此乃今时今刻,守者所重之要。今所察者,犹多侦测,攻者测绘其地之可乘,试其术之可行,而确认其效。虽未至广窃数据、夺其机要之境,非待之之由。此机一失,永不再临。

PostgreSQL 上運行 Drupal 之管理員,其事直截:當即施補丁。MySQL 或 MariaDB 之使用者,此弱點不適,然核實其站所使用之資料庫後端,較之臆斷,尤為得宜。至於管理 Drupal 基礎設施而未施補丁者,若見日記中異常資料庫查詢模式或認證失敗嘗試,當視為潛在敵意,亟行查察。

Imperva 所察之模式,广布侦察而后择优利用,此等战役之常势也。今乃测绘之期,次为收获之段。超前此变之机,狭而日蹙。

Drupal 末次见高危之隙,为主动利用。 复现于2019年,甫及补丁发布,即有远程代码执行之漏洞。其前,有二缺陷,名曰DrupalgeddonDrupalgeddon2。 之器,广施于众,以陷万址,故而闻于世。自二零一九以降,Drupal之迹,颇显清白,至要之患,鲜有发生。纵有现,亦未闻波及甚广。

跟我于Twitter: @securityaffairs Facebook Mastodon

皮耶鲁吉·帕格尼尼

(安全事务 – 渗透,Drupal)