Ruby-SAML¿âÆØÎó²îCVE-2024-45409£¬£¬£¬ £¬£¬ £¬Î£¼°Éí·ÝÑéÖ¤Çå¾²

Ðû²¼Ê±¼ä 2024-09-13
1. Ruby-SAML¿âÆØÎó²îCVE-2024-45409£¬£¬£¬ £¬£¬ £¬Î£¼°Éí·ÝÑéÖ¤Çå¾²


9ÔÂ11ÈÕ£¬£¬£¬ £¬£¬ £¬Ruby-SAML¿â×÷ΪʵÑéSAML£¨Çå¾²¶ÏÑÔ±ê¼ÇÓïÑÔ£©ÊÚȨµÄÖ÷Òª¹¤¾ß£¬£¬£¬ £¬£¬ £¬½üÆÚ±»ÆØ³öÑÏÖØÇå¾²Îó²îCVE-2024-45409£¬£¬£¬ £¬£¬ £¬ÆäCVSSÆÀ·Ö¸ß´ï10£¬£¬£¬ £¬£¬ £¬Åú×¢Æä¼«¸ßµÄΣº¦ÐÔ¡£¡£¡£¡£¡£¡£´ËÎó²î±£´æÓÚRuby-SAMLµÄ¶à¸ö°æ±¾ÖУ¬£¬£¬ £¬£¬ £¬Ö÷ÒªÒòXPathÑ¡ÔñÆ÷¹ýʧµ¼Ö£¬£¬£¬ £¬£¬ £¬Ê¹µÃSAMLÏìÓ¦µÄÊðÃûÑé֤ʧЧ¡£¡£¡£¡£¡£¡£SAML×÷Ϊµ¥µãµÇ¼£¨SSO£©µÄ½¹µãЭÒ飬£¬£¬ £¬£¬ £¬ÆäÊðÃûÍêÕûÐÔµÄȱʧֱ½ÓÍþвµ½ÏµÍ³µÄÇå¾²ÐÔ¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÎÞÐèÉí·ÝÑéÖ¤£¬£¬£¬ £¬£¬ £¬½öͨ¹ýαÔì»ò¸Ä¶¯°üÀ¨í§ÒâÊý¾ÝµÄSAMLÏìÓ¦£¬£¬£¬ £¬£¬ £¬¼´¿ÉÇáËÉÈÆ¹ýÉí·ÝÑéÖ¤»úÖÆ£¬£¬£¬ £¬£¬ £¬Ã°³äµ±ºÎÓû§Éí·ÝµÇ¼ϵͳ£¬£¬£¬ £¬£¬ £¬´Ó¶ø»ñÈ¡¶ÔÃô¸ÐÊý¾ÝºÍÒªº¦ÏµÍ³µÄδÊÚȨ»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£ÕâÒ»Îó²îµÄÆÕ±éÓ°Ïì½ûÖ¹ºöÊÓ£¬£¬£¬ £¬£¬ £¬ÓÉÓÚÖÚ¶à×éÖ¯ÒÀÀµSAMLÉí·ÝÑéÖ¤À´°ü¹ÜÓ¦Óûá¼ûÇå¾²£¬£¬£¬ £¬£¬ £¬Ò»µ©Ô⵽ʹÓ㬣¬£¬ £¬£¬ £¬½«¿ÉÄܵ¼ÖÂÓû§Êý¾Ýй¶ºÍÆóÒµ×ʲúÊÜË𡣡£¡£¡£¡£¡£ÌáÐÑËùÓÐRuby-SAMLÓû§Á¬Ã¦½ÓÄÉÐж¯£¬£¬£¬ £¬£¬ £¬¸üÐÂÖÁ×îÐÂÇå¾²°æ±¾£¬£¬£¬ £¬£¬ £¬ÒÔÌá·ÀDZÔÚµÄÇ徲Σº¦¡£¡£¡£¡£¡£¡£


https://securityonline.info/cve-2024-45409-cvss-10-critical-ruby-saml-flaw-leaves-user-accounts-exposed/


2. ²é¶û˹¡¤´ï¶ûÎÄѧУÔâÀÕË÷Èí¼þ¹¥»÷½ôÆÈÍ£¿£¿£¿ £¿£¿£¿Î


9ÔÂ9ÈÕ£¬£¬£¬ £¬£¬ £¬Ó¢¹úÂ×¶ØÄϲ¿µÄ²é¶û˹¡¤´ï¶ûÎÄѧУÒòÔâÊÜÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬ £¬£¬ £¬Ðû²¼±¾ÖÜǰÈýÌ콫¹Ø±ÕУ԰¾ÙÐÐÍøÂçÇå¾²ÕûÀíÊÂÇ飬£¬£¬ £¬£¬ £¬´Ë¾ÙÓ°ÏìÁËÔ¼1300ÃûѧÉúµÄÕý³£Ñ§Ï°¡£¡£¡£¡£¡£¡£×Ô9ÔÂ5ÈÕÆð£¬£¬£¬ £¬£¬ £¬Ñ§Éú±»ÆÈÀëУ£¬£¬£¬ £¬£¬ £¬Ð£³¤Aston SmithËæºóÏò¼Ò³¤×ª´ï£¬£¬£¬ £¬£¬ £¬´Ë´ÎITÎÊÌâʵΪÑÏÖØµÄÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬ £¬£¬ £¬µ¼ÖÂËùÓÐÔ±¹¤×°±¸±»ÒƳýÒÔ¾ÙÐÐÇå¾²´¦Öóͷ£¡£¡£¡£¡£¡£¡£Òò´Ë£¬£¬£¬ £¬£¬ £¬Ñ§Ð£¾öÒéÔÚÏÂÖÜÒ»¡¢¶þ¡¢ÈýÔÝÍ£ÊڿΣ¬£¬£¬ £¬£¬ £¬ÒÔ±ãÎ÷Ï¯ÖØÐÂÍýÏë¿Î³Ì£¬£¬£¬ £¬£¬ £¬ÖÎÀí²ãÔòÖÂÁ¦ÓÚ¹¹½¨ÐÂϵͳÒÔ»Ö¸´Ñ§Ð£ÔËÓª¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬ £¬£¬ £¬Ñ§ÉúµÄ΢ÈíOffice 365ÕË»§±»ÔÝʱ½ûÓ㬣¬£¬ £¬£¬ £¬ÒÔ·À½øÒ»²½Î£º¦¡£¡£¡£¡£¡£¡£Ð£³¤Ç¿µ÷£¬£¬£¬ £¬£¬ £¬ÔÚ´Ëʱ´ú£¬£¬£¬ £¬£¬ £¬¼Ò³¤ÓëѧÉúӦͨ¹ý¹Ù·½Ñ§Ï°Æ½Ì¨Satchel One»ñÈ¡×îÐÂ֪ͨ£¬£¬£¬ £¬£¬ £¬ÇÐÎðÇáÐÅÈκÎδ¾­ºËʵµÄÓʼþ»òÁ´½Ó¡£¡£¡£¡£¡£¡£¼øÓÚÊý¾Ýй¶µÄ¿ÉÄÜÐÔ£¬£¬£¬ £¬£¬ £¬Ñ§Ð£ÕýÓëÍøÂçÇ徲ר¼ÒϸÃÜÏàÖú£¬£¬£¬ £¬£¬ £¬µ«ÏêϸËðʧϸ½ÚÉдýÊÓ²ìÍê³ÉºóÐû²¼¡£¡£¡£¡£¡£¡£Ð£³¤»¹Ö¸³ö£¬£¬£¬ £¬£¬ £¬Ö»¹ÜѧУÒѽÓÄÉÏȽøµÄÇå¾²²½·¥£¬£¬£¬ £¬£¬ £¬´ËÀàÍøÂç¹¥»÷ÈÔÈÕÒæ·Å×Ý£¬£¬£¬ £¬£¬ £¬Óë½üÆÚÓ¢¹ú¶àÆð×ÅÃû»ú¹¹ÔâÏ®ÊÂÎñÏàËÆ£¬£¬£¬ £¬£¬ £¬Í¹ÏÔÁËÍøÂçÇå¾²ÌôÕ½µÄÑÏËàÐÔ¡£¡£¡£¡£¡£¡£


https://therecord.media/ransomware-attack-forces-london-high-school-to-close


3. °ÙÍò°²×¿µçÊÓºÐÔâVo1dºóÃŶñÒâÈí¼þ¹¥»÷£¬£¬£¬ £¬£¬ £¬È«Çò¶à¹úÏÝÂä


9ÔÂ12ÈÕ£¬£¬£¬ £¬£¬ £¬ÍþвÕßʹÓÃÐÂÐÍVo1dºóÃŶñÒâÈí¼þ£¬£¬£¬ £¬£¬ £¬ÀÖ³ÉѬȾÁËÈ«ÇòÁè¼Ý130Íǫ̀ÔËÐÐAndroidϵͳµÄµçÊÓÁ÷ýÌåºÐ£¬£¬£¬ £¬£¬ £¬Ö÷Òª¼¯ÖÐÓÚ°ÍÎ÷¡¢Ä¦Âå¸çµÈ¶à¹ú£¬£¬£¬ £¬£¬ £¬¸¶Óë¹¥»÷Õß¶ÔÕâЩװ±¸µÄÍêÈ«¿ØÖÆÈ¨¡£¡£¡£¡£¡£¡£Õâ¿î¶ñÒâÈí¼þÔ´×ÔAndroid¿ªÔ´ÏîÄ¿£¨AOSP£©£¬£¬£¬ £¬£¬ £¬ÓÉGoogleÖ÷µ¼£¬£¬£¬ £¬£¬ £¬ÆÕ±éÓÃÓÚ¶àÖÖ×°±¸¡£¡£¡£¡£¡£¡£Dr.WebµÄÑо¿Õ¹ÏÖ£¬£¬£¬ £¬£¬ £¬Vo1d¶ñÒâÈí¼þͨ¹ý¸Ä¶¯AndroidµÄÆô¶¯¾ç±¾£¨Èçinstall-recovery.sh¡¢daemonsuµÈ£©£¬£¬£¬ £¬£¬ £¬ÊµÏÖÔÚÉè±¹ØÁ¬Ä³¤ÆÚ±£´æÓë×Ô¶¯Æô¶¯¡£¡£¡£¡£¡£¡£ÆäÖ÷Òª¹¦Ð§ÓÉvo1dºÍwdÁ½¸ö×é¼þЭͬÍê³É£¬£¬£¬ £¬£¬ £¬vo1dÈÏÕæwdµÄÆô¶¯Óë¿ØÖÆ£¬£¬£¬ £¬£¬ £¬²¢ÄÜÖ´ÐÐÀ´×ÔC&CЧÀÍÆ÷µÄÏÂÁ£»£»wdÔòÈÏÕæ×°ÖÃÊØ»¤Àú³Ì£¬£¬£¬ £¬£¬ £¬¼àÊÓĿ¼²¢×°ÖÃAPKÎļþ¡£¡£¡£¡£¡£¡£Ñ¬È¾Í¾¾¶ËäÉв»Ã÷È·£¬£¬£¬ £¬£¬ £¬µ«ÍƲâ¿ÉÄÜÉæ¼°²Ù×÷ϵͳÎó²îµÄʹÓûò·Ç¹Ù·½¹Ì¼þÖеÄrootȨÏÞÎó²î¡£¡£¡£¡£¡£¡£Îª±ÜÃâ½øÒ»²½Ñ¬È¾£¬£¬£¬ £¬£¬ £¬AndroidÓû§Ó¦°´ÆÚ¼ì²é²¢×°Öù̼þ¸üУ¬£¬£¬ £¬£¬ £¬Í¬Ê±×èֹʹÓÃÀ´×Էǹٷ½ÇþµÀµÄAPKÓ¦Óᣡ£¡£¡£¡£¡£¼øÓÚÊÜѬȾװ±¸ÏÖʵÔËÐеÄÊÇAOSP¶ø·ÇAndroid TV£¬£¬£¬ £¬£¬ £¬ÕâÒ»·¢Ã÷Ç¿µ÷ÁË×ÝÈ»ÊÇ»ùÓÚ¿ªÔ´ÏîÄ¿µÄ×°±¸Ò²Ðè¼á³ÖСÐÄ£¬£¬£¬ £¬£¬ £¬ÒÔ·ÀÔâÊÜÀàËÆ¹¥»÷¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-vo1d-malware-infects-13-million-android-streaming-boxes/


4. Hadooken¶ñÒâÈí¼þÃé×¼Oracle WebLogicЧÀÍÆ÷


9ÔÂ13ÈÕ£¬£¬£¬ £¬£¬ £¬AquaµÄÑо¿ÍŶÓ×î½üÕ¹ÏÖÁËÕë¶ÔOracle WebLogicЧÀÍÆ÷µÄϵÁй¥»÷£¬£¬£¬ £¬£¬ £¬ÕâЩ¹¥»÷ʹÓÃÈõÃÜÂë×÷ÎªÍ»ÆÆ¿Ú£¬£¬£¬ £¬£¬ £¬°²ÅÅÁËÒ»ÖÖÐÂÐ˵ÄLinux¶ñÒâÈí¼þHadooken¡£¡£¡£¡£¡£¡£AquaÔÚ¼à¿ØÖв¶»ñµ½ÊýÊ®Æð´ËÀàÈëÇÖ£¬£¬£¬ £¬£¬ £¬Åú×¢¹¥»÷»î¶¯»îÔ¾ÇÒÆµÈÔ¡£¡£¡£¡£¡£¡£Hadooken ºÜ¿ÉÄÜÒÔ¡¶Ä°Í·°ÔÍõ¡·µç×ÓÓÎϷϵÁÐÖеÄÒ»´Î¹¥»÷ÃüÃû£¬£¬£¬ £¬£¬ £¬¼¯³ÉÁ˼ÓÃÜ¿ó¹¤ÓëDZÔÚµÄTsunami DDoS½©Ê¬ÍøÂ繦Ч¡£¡£¡£¡£¡£¡£Hadookenͨ¹ý½¨ÉècronjobʵÏÖ³¤ÆÚ»¯£¬£¬£¬ £¬£¬ £¬²¢°üÀ¨ÇÔÈ¡Óû§Æ¾Ö¤µÄ¾ç±¾£¬£¬£¬ £¬£¬ £¬±ãÓÚ¹¥»÷ÕߺáÏòÀ©Õ¹ÖÁÆäËûЧÀÍÆ÷¡£¡£¡£¡£¡£¡£Aqua×·×Ùµ½HadookenÏÂÔØÔ´×ÔÁ½¸öIPµØµãÖ®Ò»ÓëÓ¢¹úijÍйܹ«Ë¾Ïà¹Ø£¬£¬£¬ £¬£¬ £¬µ«ÎÞÖ±½ÓÖ¤¾ÝÅú×¢¸Ã¹«Ë¾Éæ¶ñ¡£¡£¡£¡£¡£¡£½øÒ»²½ÆÊÎöÏÔʾ£¬£¬£¬ £¬£¬ £¬HadookenÓëRHOMBUSºÍNoEscapeÀÕË÷Èí¼þ±£´æÊÖÒÕ¹ØÁª£¬£¬£¬ £¬£¬ £¬ÌåÏÖ¹¥»÷Õß¿ÉÄÜͬʱÃé×¼Windows¶ËµãÖ´ÐÐÀÕË÷Èí¼þ£¬£¬£¬ £¬£¬ £¬²¢Ê¹ÓÃLinuxЧÀÍÆ÷°²ÅźóÃźͼÓÃܿ󹤣¬£¬£¬ £¬£¬ £¬Õë¶Ô´óÐÍÆóҵʵÑ鸴ºÏÐÍÍþв¡£¡£¡£¡£¡£¡£


https://www.theregister.com/2024/09/13/hadooken_attacks_oracle_weblogic/


5. ºÚ¿ÍʹÓÃAzure SharePointÎó²îµ¼ÖÂFortinet 440GBÊý¾Ýй¶


9ÔÂ12ÈÕ£¬£¬£¬ £¬£¬ £¬ºÚ¿Í¡°Fortibitch¡±ÔÚµØÏÂÂÛ̳Breach ForumÉÏÉù³Æ´ÓÍøÂçÇå¾²¾ÞÍ·FortinetµÄAzure SharePointʵÀýÖÐÇÔÈ¡ÁË440GBµÄÊý¾Ý£¬£¬£¬ £¬£¬ £¬¸ÃÎó²î±»ÃüÃûΪ¡°Fortileak¡±¡£¡£¡£¡£¡£¡£ºÚ¿ÍÖ¸ÔðFortinetµÄAzure SharePoint̻¶²¢±»ÈëÇÖ£¬£¬£¬ £¬£¬ £¬µ¼ÖÂÊý¾Ýй¶£¬£¬£¬ £¬£¬ £¬²¢·ÖÏíÁË»á¼ûƾ֤ÒÔ±ãÏÂÔØÕâЩÊý¾Ý¡£¡£¡£¡£¡£¡£ºÚ¿Í»¹Ìáµ½FortinetµÄCEOл¿Ï¾Ü¾øÁËÊê½ðÒªÇ󣬣¬£¬ £¬£¬ £¬²¢¼¥Ð¦Æä̬¶È¡£¡£¡£¡£¡£¡£Fortinet¹Ù·½»ØÓ¦³Æ£¬£¬£¬ £¬£¬ £¬Ò»ÃûδÊÚȨ¸öÌå»á¼ûÁË´æ´¢ÔÚµÚÈý·½Ôƶ˹²ÏíÎļþÇý¶¯Æ÷ÉϵÄÓÐÏÞÎļþ£¬£¬£¬ £¬£¬ £¬ÕâЩÎļþÉæ¼°¡°Ò»Ð¡²¿·Ö¡±¿Í»§Êý¾Ý£¬£¬£¬ £¬£¬ £¬µ«¹«Ë¾ÔËÓª¡¢²úÆ·ºÍЧÀÍδÊÜÓ°Ï죬£¬£¬ £¬£¬ £¬ÇÒÒÑÓë¿Í»§Ïàͬ¡£¡£¡£¡£¡£¡£´Ëǰ£¬£¬£¬ £¬£¬ £¬FortinetÒ²ÔâÓö¹ýÇå¾²ÊÂÎñ£¬£¬£¬ £¬£¬ £¬°üÀ¨±»Ê¹ÓÃÁãÈÕÎó²îºÍFortiOS²Ù×÷ϵͳÎó²îµÄ¹¥»÷¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬ £¬£¬ £¬´Ë´ÎÊý¾Ýй¶µÄÑÏÖØË®Æ½¼°Êê½ð̸ÅÐÏ£ÍûÉв»ÇåÀÊ£¬£¬£¬ £¬£¬ £¬¿Í»§ºÍÍøÂçÇå¾²ÁìÓòÕýÇ×½ü¹Ø×¢ÊÂ̬Éú³¤¡£¡£¡£¡£¡£¡£


https://hackread.com/fortinet-confirms-data-breach-hacker-data-leak/


6. DockerSpy£º×Ô¶¯É¨ÃèDocker Hub¾µÏñ£¬£¬£¬ £¬£¬ £¬ÊØ»¤Ãô¸ÐÊý¾ÝÇå¾²


9ÔÂ11ÈÕ£¬£¬£¬ £¬£¬ £¬DockerSpy ÊÇÒ»¿îרΪ½â¾ö Docker ¾µÏñÖÐÃô¸ÐÊý¾Ýй¶ÎÊÌâ¶øÉè¼ÆµÄ¹¤¾ß£¬£¬£¬ £¬£¬ £¬ËüÄÜ×Ô¶¯É¨Ãè Docker Hub ÉϵÄͼÏñ£¬£¬£¬ £¬£¬ £¬¿ìËÙ¼ìË÷³ö°üÀ¨Éí·ÝÑéÖ¤ÉñÃØ¡¢Ë½Ô¿µÈÔÚÄÚµÄÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£½¨ÉèÕß Alisson Moretto ÌåÏÖ£¬£¬£¬ £¬£¬ £¬Ëæ×Å Docker ¾µÏñµÄÆÕ±éʹÓ㬣¬£¬ £¬£¬ £¬ÓÈÆäÊǹ«¹²¾µÏñ¿âÖÐDZÔÚµÄÇå¾²Òþ»¼ÈÕÒæÍ¹ÏÔ£¬£¬£¬ £¬£¬ £¬DockerSpy µÄ½µÉúÖ¼ÔÚÌṩһ²ãÌØÁíÍâÇå¾²ÆÁÕÏ£¬£¬£¬ £¬£¬ £¬×ÊÖú¿ª·¢Õßʵʱ·¢Ã÷²¢É¨³ý¾µÏñÖеÄÃô¸ÐÊý¾Ý£¬£¬£¬ £¬£¬ £¬ÔöÇ¿Çå¾²ÐԺͺϹæÐÔ¡£¡£¡£¡£¡£¡£DockerSpy µÄÆæÒìÓÅÊÆÔÚÓÚÆäÓë Docker Hub µÄÎ޷켯³É£¬£¬£¬ £¬£¬ £¬ÊµÏÖÁË×Ô¶¯»¯ÌáÈ¡ºÍÆÊÎö¾µÏñµÄ¹¦Ð§£¬£¬£¬ £¬£¬ £¬ÎÞÐèÊÖ¶¯¸ÉÔ¤¡£¡£¡£¡£¡£¡£ÆäÏȽøµÄɨÃèÒýÇæÄܹ»Ê¶±ð¶àÖÖÐÎʽµÄÉñÃØÐÅÏ¢£¬£¬£¬ £¬£¬ £¬ÎÞÂÛÊÇÓ²±àÂëµÄƾ֤ÕÕ¾ÉÒþ²ØÔÚ´úÂë¼°ÇéÐαäÁ¿ÖеÄÖØ´óģʽ£¬£¬£¬ £¬£¬ £¬¶¼ÄÜÓÐÓò¶»ñ²¢ÏêϸÆÊÎöDZÔÚΣº¦¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬ £¬£¬ £¬DockerSpy ÒÑÔÚ GitHub ÉÏ¿ª·ÅÏÂÔØ£¬£¬£¬ £¬£¬ £¬¹©¿ª·¢ÕßÃâ·ÑʹÓᣡ£¡£¡£¡£¡£


https://www.helpnetsecurity.com/2024/09/11/dockerspy-extract-sensitive-information-docker-hub-images/?web_view=true