Ruby-SAML¿âÆØÂ©¶´CVE-2024-45409 £¬Î£¼°Éí·ÝÑéÖ¤Äþ¾²

Ðû²¼Ê±¼ä 2024-09-13
1. Ruby-SAML¿âÆØÂ©¶´CVE-2024-45409 £¬Î£¼°Éí·ÝÑéÖ¤Äþ¾²


9ÔÂ11ÈÕ £¬Ruby-SAML¿â×÷ΪʵʩSAML£¨Äþ¾²¶ÏÑÔ±êÖ¾ÓïÑÔ£©ÊÚȨµÄÖØÒª¹¤¾ß £¬½üÆÚ±»ÆØ³öÑÏÖØÄþ¾²Â©¶´CVE-2024-45409 £¬ÆäCVSSÆÀ·Ö¸ß´ï10 £¬±íÃ÷Æä¼«¸ßµÄΣº¦ÐÔ ¡£´Ë©¶´´æÔÚÓÚRuby-SAMLµÄ¶à¸ö°æ±¾ÖÐ £¬Ö÷ÒªÒòXPathÑ¡ÔñÆ÷´íÎóµ¼Ö £¬Ê¹µÃSAMLÏìÓ¦µÄÇ©ÃûÑé֤ʧЧ ¡£SAML×÷Ϊµ¥µãµÇ¼£¨SSO£©µÄºËÐÄЭÒé £¬ÆäÇ©ÃûÍêÕûÐÔµÄȱʧֱ½ÓÍþвµ½ÏµÍ³µÄÄþ¾²ÐÔ ¡£¹¥»÷ÕßÎÞÐèÉí·ÝÑéÖ¤ £¬½öͨ¹ýαÔì»ò¸Ä¶¯°üÂÞÈÎÒâÊý¾ÝµÄSAMLÏìÓ¦ £¬¼´¿ÉÇáËÉÈÆ¹ýÉí·ÝÑéÖ¤»úÖÆ £¬¼ÙðÈκÎÓû§Éí·ÝµÇ¼ϵͳ £¬´Ó¶ø»ñÈ¡¶ÔÃô¸ÐÊý¾ÝºÍÒªº¦ÏµÍ³µÄδÊÚȨ·ÃÎÊȨÏÞ ¡£Õâһ©¶´µÄ¹ã·ºÓ°Ïì²»ÈݺöÊÓ £¬ÒòΪÖÚ¶à×éÖ¯ÒÀÀµSAMLÉí·ÝÑéÖ¤À´±£ÕÏÓ¦Ó÷ÃÎÊÄþ¾² £¬Ò»µ©Ôâµ½ÀûÓà £¬½«¿ÉÄܵ¼ÖÂÓû§Êý¾Ýй¶ºÍÆóÒµ×ʲúÊÜËð ¡£ÌáÐÑËùÓÐRuby-SAMLÓû§Á¢¼´½ÓÄÉÐж¯ £¬¸üÐÂÖÁ×îÐÂÄþ¾²°æ±¾ £¬ÒÔ·À·¶Ç±ÔÚµÄÄþ¾²·çÏÕ ¡£


https://securityonline.info/cve-2024-45409-cvss-10-critical-ruby-saml-flaw-leaves-user-accounts-exposed/


2. ²é¶û˹¡¤´ï¶ûÎÄѧУÔâÀÕË÷Èí¼þ¹¥»÷½ô¼±Í £¿Î


9ÔÂ9ÈÕ £¬Ó¢¹úÂ×¶ØÄϲ¿µÄ²é¶û˹¡¤´ï¶ûÎÄѧУÒòÔâÊÜÀÕË÷Èí¼þ¹¥»÷ £¬Ðû²¼±¾ÖÜǰÈýÌ콫¹Ø±ÕУ԰½øÐÐÍøÂçÄþ¾²ÇåÀíÊÂÇé £¬´Ë¾ÙÓ°ÏìÁËÔ¼1300ÃûѧÉúµÄÕý³£Ñ§Ï° ¡£×Ô9ÔÂ5ÈÕÆð £¬Ñ§Éú±»ÆÈÀëУ £¬Ð£³¤Aston SmithËæºóÏò¼Ò³¤Í¨±¨ £¬´Ë´ÎITÎÊÌâʵΪÑÏÖØµÄÀÕË÷Èí¼þ¹¥»÷ £¬µ¼ÖÂËùÓÐÔ±¹¤É豸±»ÒƳýÒÔ½øÐÐÄþ¾²´¦Öà ¡£Òò´Ë £¬Ñ§Ð£¾ö¶¨ÔÚÏÂÖÜÒ»¡¢¶þ¡¢ÈýÔÝÍ£ÊÚ¿Î £¬ÒÔ±ã½ÌÊ¦ÖØÐ¹滮¿Î³Ì £¬¹ÜÀí²ãÔòÖÂÁ¦ÓÚ¹¹½¨ÐÂϵͳÒÔ»Ö¸´Ñ§Ð£ÔËÓª ¡£Í¬Ê± £¬Ñ§ÉúµÄ΢ÈíOffice 365ÕË»§±»ÔÝʱ½ûÓà £¬ÒÔ·À½øÒ»²½·çÏÕ ¡£Ð£³¤Ç¿µ÷ £¬ÔÚ´ËÆÚ¼ä £¬¼Ò³¤ÓëѧÉúӦͨ¹ý¹Ù·½Ñ§Ï°Æ½Ì¨Satchel One»ñÈ¡×îÐÂ֪ͨ £¬ÇÐÎðÇáÐÅÈκÎδ¾­ºËʵµÄÓʼþ»òÁ´½Ó ¡£¼øÓÚÊý¾Ýй¶µÄ¿ÉÄÜÐÔ £¬Ñ§Ð£ÕýÓëÍøÂçÄþ¾²×¨¼Ò½ôÃܺÏ×÷ £¬µ«¾ßÌåËðʧϸ½ÚÉдýÊÓ²ìÍê³ÉºóÐû²¼ ¡£Ð£³¤»¹Ö¸³ö £¬¾¡¹ÜѧУÒѽÓÄÉÏȽøµÄÄþ¾²´ëÊ© £¬´ËÀàÍøÂç¹¥»÷ÈÔÈÕÒæ·ÅËÁ £¬Óë½üÆÚÓ¢¹ú¶àÆðÖªÃû»ú¹¹ÔâϮʼþÏàËÆ £¬Í¹ÏÔÁËÍøÂçÄþ¾²ÌôÕ½µÄÑϾþÐÔ ¡£


https://therecord.media/ransomware-attack-forces-london-high-school-to-close


3. °ÙÍò°²×¿µçÊÓºÐÔâVo1dºóÃŶñÒâÈí¼þ¹¥»÷ £¬È«Çò¶à¹úÂÙÏÝ


9ÔÂ12ÈÕ £¬ÍþвÕßÀûÓÃÐÂÐÍVo1dºóÃŶñÒâÈí¼þ £¬ÀÖ³ÉѬȾÁËÈ«ÇòÁè¼Ý130Íǫ̀ÔËÐÐAndroidϵͳµÄµçÊÓÁ÷ýÌåºÐ £¬Ö÷Òª¼¯ÖÐÓÚ°ÍÎ÷¡¢Ä¦Âå¸çµÈ¶à¹ú £¬¸³Óè¹¥»÷Õß¶ÔÕâЩÉ豸µÄÍêÈ«¿ØÖÆÈ¨ ¡£Õâ¿î¶ñÒâÈí¼þÔ´×ÔAndroid¿ªÔ´ÏîÄ¿£¨AOSP£© £¬ÓÉGoogleÖ÷µ¼ £¬¹ã·ºÓÃÓÚ¶àÖÖÉ豸 ¡£Dr.WebµÄÑо¿½Òʾ £¬Vo1d¶ñÒâÈí¼þͨ¹ý¸Ä¶¯AndroidµÄÆô¶¯½Å±¾£¨Èçinstall-recovery.sh¡¢daemonsuµÈ£© £¬ÊµÏÖÔÚÉè±¹ØÁ¬Ä³Ö¾Ã´æÔÚÓë×Ô¶¯Æô¶¯ ¡£ÆäÖ÷Òª¹¦Ð§ÓÉvo1dºÍwdÁ½¸ö×é¼þЭͬÍê³É £¬vo1dÂôÁ¦wdµÄÆô¶¯Óë¿ØÖÆ £¬²¢ÄÜÖ´ÐÐÀ´×ÔC&C·þÎñÆ÷µÄÃüÁwdÔòÂôÁ¦°²×°ÊØ»¤½ø³Ì £¬¼àÊÓĿ¼²¢°²×°APKÎļþ ¡£Ñ¬È¾Í¾¾¶ËäÉв»Ã÷È· £¬µ«ÍƲâ¿ÉÄÜÉæ¼°²Ù×÷ϵͳ©¶´µÄÀûÓûò·Ç¹Ù·½¹Ì¼þÖеÄrootȨÏÞ©¶´ ¡£Îª·ÀÖ¹½øÒ»²½Ñ¬È¾ £¬AndroidÓû§Ó¦¶¨ÆÚ¼ì²é²¢°²×°¹Ì¼þ¸üР£¬Í¬Ê±ÖÆÖ¹Ê¹ÓÃÀ´×Էǹٷ½ÇþµÀµÄAPKÓ¦Óà ¡£¼øÓÚÊÜѬȾÉ豸ʵ¼ÊÔËÐеÄÊÇAOSP¶ø·ÇAndroid TV £¬ÕâÒ»·¢ÏÖÇ¿µ÷Á˼´Ê¹ÊÇ»ùÓÚ¿ªÔ´ÏîÄ¿µÄÉ豸ҲÐè±£³Ö¾¯Ìè £¬ÒÔ·ÀÔâÊÜÀàËÆ¹¥»÷ ¡£


https://www.bleepingcomputer.com/news/security/new-vo1d-malware-infects-13-million-android-streaming-boxes/


4. Hadooken¶ñÒâÈí¼þÃé×¼Oracle WebLogic·þÎñÆ÷


9ÔÂ13ÈÕ £¬AquaµÄÑо¿ÍŶÓ×î½ü½ÒʾÁËÕë¶ÔOracle WebLogic·þÎñÆ÷µÄϵÁй¥»÷ £¬ÕâЩ¹¥»÷ÀûÓÃÈõÃÜÂë×÷ÎªÍ»ÆÆ¿Ú £¬²¿ÊðÁËÒ»ÖÖÐÂÐ˵ÄLinux¶ñÒâÈí¼þHadooken ¡£AquaÔÚ¼à¿ØÖв¶×½µ½ÊýÊ®Æð´ËÀàÈëÇÖ £¬±íÃ÷¹¥»÷»î¶¯»îÔ¾ÇÒÆµ·± ¡£Hadooken ºÜ¿ÉÄÜÒÔ¡¶½ÖÍ·°ÔÍõ¡·µç×ÓÓÎϷϵÁÐÖеÄÒ»´Î¹¥»÷ÃüÃû £¬¼¯³ÉÁ˼ÓÃÜ¿ó¹¤ÓëDZÔÚµÄTsunami DDoS½©Ê¬ÍøÂ繦Ч ¡£Hadookenͨ¹ý´´½¨cronjobʵÏֳ־û¯ £¬²¢°üÂÞÇÔÈ¡Óû§Æ¾Ö¤µÄ½Å±¾ £¬±ãÓÚ¹¥»÷ÕߺáÏòÀ©Õ¹ÖÁÆäËû·þÎñÆ÷ ¡£Aqua×·×Ùµ½HadookenÏÂÔØÔ´×ÔÁ½¸öIPµØÖ·Ö®Ò»ÓëÓ¢¹úijÍйܹ«Ë¾Ïà¹Ø £¬µ«ÎÞÖ±½ÓÖ¤¾Ý±íÃ÷¸Ã¹«Ë¾Éæ¶ñ ¡£½øÒ»²½·ÖÎöÏÔʾ £¬HadookenÓëRHOMBUSºÍNoEscapeÀÕË÷Èí¼þ´æÔÚ¼¼Êõ¹ØÁª £¬ÌåÏÖ¹¥»÷Õß¿ÉÄÜͬʱÃé×¼Windows¶ËµãÖ´ÐÐÀÕË÷Èí¼þ £¬²¢ÀûÓÃLinux·þÎñÆ÷²¿ÊðºóÃźͼÓÃÜ¿ó¹¤ £¬Õë¶Ô´óÐÍÆóҵʵʩ¸´ºÏÐÍÍþв ¡£


https://www.theregister.com/2024/09/13/hadooken_attacks_oracle_weblogic/


5. ºÚ¿ÍÀûÓÃAzure SharePoint©¶´µ¼ÖÂFortinet 440GBÊý¾Ýй¶


9ÔÂ12ÈÕ £¬ºÚ¿Í¡°Fortibitch¡±ÔÚµØÏÂÂÛ̳Breach ForumÉÏÉù³Æ´ÓÍøÂçÄþ¾²¾ÞÍ·FortinetµÄAzure SharePointʵÀýÖÐÇÔÈ¡ÁË440GBµÄÊý¾Ý £¬¸Ã©¶´±»ÃüÃûΪ¡°Fortileak¡± ¡£ºÚ¿ÍÖ¸ÔðFortinetµÄAzure SharePoint̻¶²¢±»ÈëÇÖ £¬µ¼ÖÂÊý¾Ýй¶ £¬²¢·ÖÏíÁË·ÃÎÊÆ¾Ö¤ÒÔ±ãÏÂÔØÕâЩÊý¾Ý ¡£ºÚ¿Í»¹Ìáµ½FortinetµÄCEOл¿Ï¾Ü¾øÁËÊê½ðÒªÇó £¬²¢¼¥Ð¦Æä̬¶È ¡£Fortinet¹Ù·½»ØÓ¦³Æ £¬Ò»ÃûδÊÚȨ¸öÌå·ÃÎÊÁË´æ´¢ÔÚµÚÈý·½Ôƶ˹²ÏíÎļþÇý¶¯Æ÷ÉϵÄÓÐÏÞÎļþ £¬ÕâЩÎļþÉæ¼°¡°Ò»Ð¡²¿ÃÅ¡±¿Í»§Êý¾Ý £¬µ«¹«Ë¾ÔËÓª¡¢²úÎïºÍ·þÎñδÊÜÓ°Ïì £¬ÇÒÒÑÓë¿Í»§Ïàͬ ¡£´Ëǰ £¬FortinetÒ²ÔâÓö¹ýÄþ¾²Ê¼þ £¬°üÂÞ±»ÀûÓÃÁãÈÕ©¶´ºÍFortiOS²Ù×÷ϵͳ©¶´µÄ¹¥»÷ ¡£Ä¿Ç° £¬´Ë´ÎÊý¾Ýй¶µÄÑÏÖØË®Æ½¼°Êê½ð̸ÅнøÕ¹Éв»Ã÷ÀÊ £¬¿Í»§ºÍÍøÂçÄþ¾²ÁìÓòÕýÃÜÇйØ×¢ÊÂ̬Éú³¤ ¡£


https://hackread.com/fortinet-confirms-data-breach-hacker-data-leak/


6. DockerSpy£º×Ô¶¯É¨ÃèDocker Hub¾µÏñ £¬ÊØ»¤Ãô¸ÐÊý¾ÝÄþ¾²


9ÔÂ11ÈÕ £¬DockerSpy ÊÇÒ»¿îרΪ½â¾ö Docker ¾µÏñÖÐÃô¸ÐÊý¾Ýй¶ÎÊÌâ¶øÉè¼ÆµÄ¹¤¾ß £¬ËüÄÜ×Ô¶¯É¨Ãè Docker Hub ÉϵÄͼÏñ £¬¿ìËÙ¼ìË÷³ö°üÂÞÉí·ÝÑéÖ¤»úÃÜ¡¢Ë½Ô¿µÈÔÚÄÚµÄÃô¸ÐÐÅÏ¢ ¡£´´½¨Õß Alisson Moretto ÌåÏÖ £¬Ëæ×Å Docker ¾µÏñµÄ¹ã·ºÊ¹Óà £¬ÓÈÆäÊǹ«¹²¾µÏñ¿âÖÐDZÔÚµÄÄþ¾²Òþ»¼ÈÕÒæÍ¹ÏÔ £¬DockerSpy µÄµ®ÉúÖ¼ÔÚÌṩһ²ãÌØ±ðµÄÄþ¾²ÆÁÕÏ £¬×ÊÖú¿ª·¢Õß¼°Ê±·¢ÏÖ²¢Çå³ý¾µÏñÖеÄÃô¸ÐÊý¾Ý £¬ÔöÇ¿Äþ¾²ÐԺͺϹæÐÔ ¡£DockerSpy µÄÆæÌØÓÅÊÆÔÚÓÚÆäÓë Docker Hub µÄÎ޷켯³É £¬ÊµÏÖÁË×Ô¶¯»¯ÌáÈ¡ºÍ·ÖÎö¾µÏñµÄ¹¦Ð§ £¬ÎÞÐèÊÖ¶¯¸ÉÔ¤ ¡£ÆäÏȽøµÄɨÃèÒýÇæÄܹ»Ê¶±ð¶àÖÖÐÎʽµÄ»úÃÜÐÅÏ¢ £¬ÎÞÂÛÊÇÓ²±àÂëµÄƾ֤»¹ÊÇÒþ²ØÔÚ´úÂë¼°»·¾³±äÁ¿ÖеÄÅÓ´óģʽ £¬¶¼ÄÜÓÐЧ²¶×½²¢Ïêϸ·ÖÎöDZÔÚ·çÏÕ ¡£Ä¿Ç° £¬DockerSpy ÒÑÔÚ GitHub ÉÏ¿ª·ÅÏÂÔØ £¬¹©¿ª·¢ÕßÃâ·ÑʹÓà ¡£


https://www.helpnetsecurity.com/2024/09/11/dockerspy-extract-sensitive-information-docker-hub-images/?web_view=true