<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>HiCA | 今天abc看了啥🤔</title><description>现在我也不知道这频道发了啥了，各位慢慢吃瓜，将就着看联系我请去 @abc1763613206友链儿@cyberElaina@rvalue_daily@billchenla</description><link>https://channel.0w0.best</link><item><title>自称 HiCA （及其关联产品 Quantum CA）创始人的 GitHub 用户 xiaohuilam (Bruce Lam) 回应称，利用此漏洞的意图是使一般的 CA 签发过程能整合进 ACME.sh，并且 HiCA 从未利用此漏洞执行恶意代码</title><link>https://channel.0w0.best/posts/4958</link><guid isPermaLink="true">https://channel.0w0.best/posts/4958</guid><pubDate>Fri, 09 Jun 2023 11:52:44 GMT</pubDate><content:encoded>自称 &lt;mark&gt;HiCA&lt;/mark&gt; （及其关联产品 Quantum CA）创始人的 GitHub 用户 xiaohuilam (Bruce Lam) 回应称，利用此漏洞的意图是使一般的 CA 签发过程能整合进 ACME.sh，并且 &lt;mark&gt;HiCA&lt;/mark&gt; 从未利用此漏洞执行恶意代码。Bruce 也提到其已经关闭 &lt;mark&gt;HiCA&lt;/mark&gt; 项目直到调查结束。&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://github.com/acmesh-official/acme.sh/issues/4659#issuecomment-1584414218&quot; target=&quot;_blank&quot;&gt;https://github.com/acmesh-official/acme.sh/issues/4659#issuecomment-1584414218&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;thread: &lt;a href=&quot;https://t.me/outvivid/4231&quot; target=&quot;_blank&quot;&gt;/4231&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;/search/%23HiCA&quot;&gt;#HiCA&lt;/a&gt;&lt;a href=&quot;https://github.com/acmesh-official/acme.sh/issues/4659&quot; target=&quot;_blank&quot;&gt;
  
  &lt;div&gt;GitHub&lt;/div&gt;
  
  &lt;div&gt;acme.sh runs arbitrary commands from a remote server · Issue #4659 · acmesh-official/acme.sh&lt;/div&gt;
  &lt;div&gt;Hello, You may already be aware of this, but &lt;mark&gt;HiCA&lt;/mark&gt; is injecting arbitrary code/commands into the certificate obtaining process and acme.sh is running them on the client machine. I am not sure if thi...&lt;/div&gt;
&lt;/a&gt;</content:encoded></item></channel></rss>