Ruby-SAML¿âÆØÎó²îCVE-2024-45409 £¬ £¬£¬£¬£¬£¬£¬Î£¼°Éí·ÝÑéÖ¤Çå¾²

Ðû²¼Ê±¼ä 2024-09-13
1. Ruby-SAML¿âÆØÎó²îCVE-2024-45409 £¬ £¬£¬£¬£¬£¬£¬Î£¼°Éí·ÝÑéÖ¤Çå¾²


9ÔÂ11ÈÕ £¬ £¬£¬£¬£¬£¬£¬Ruby-SAML¿â×÷ΪʵÑéSAML£¨Çå¾²¶ÏÑÔ±ê¼ÇÓïÑÔ£©ÊÚȨµÄÖ÷Òª¹¤¾ß £¬ £¬£¬£¬£¬£¬£¬½üÆÚ±»ÆØ³öÑÏÖØÇå¾²Îó²îCVE-2024-45409 £¬ £¬£¬£¬£¬£¬£¬ÆäCVSSÆÀ·Ö¸ß´ï10 £¬ £¬£¬£¬£¬£¬£¬Åú×¢Æä¼«¸ßµÄΣº¦ÐÔ¡£¡£¡£´ËÎó²î±£´æÓÚRuby-SAMLµÄ¶à¸ö°æ±¾ÖÐ £¬ £¬£¬£¬£¬£¬£¬Ö÷ÒªÒòXPathÑ¡ÔñÆ÷¹ýʧµ¼Ö £¬ £¬£¬£¬£¬£¬£¬Ê¹µÃSAMLÏìÓ¦µÄÊðÃûÑé֤ʧЧ¡£¡£¡£SAML×÷Ϊµ¥µãµÇ¼£¨SSO£©µÄ½¹µãЭÒé £¬ £¬£¬£¬£¬£¬£¬ÆäÊðÃûÍêÕûÐÔµÄȱʧֱ½ÓÍþвµ½ÏµÍ³µÄÇå¾²ÐÔ¡£¡£¡£¹¥»÷ÕßÎÞÐèÉí·ÝÑéÖ¤ £¬ £¬£¬£¬£¬£¬£¬½öͨ¹ýαÔì»ò¸Ä¶¯°üÀ¨í§ÒâÊý¾ÝµÄSAMLÏìÓ¦ £¬ £¬£¬£¬£¬£¬£¬¼´¿ÉÇáËÉÈÆ¹ýÉí·ÝÑéÖ¤»úÖÆ £¬ £¬£¬£¬£¬£¬£¬Ã°³äµ±ºÎÓû§Éí·ÝµÇ¼ϵͳ £¬ £¬£¬£¬£¬£¬£¬´Ó¶ø»ñÈ¡¶ÔÃô¸ÐÊý¾ÝºÍÒªº¦ÏµÍ³µÄδÊÚȨ»á¼ûȨÏÞ¡£¡£¡£ÕâÒ»Îó²îµÄÆÕ±éÓ°Ïì½ûÖ¹ºöÊÓ £¬ £¬£¬£¬£¬£¬£¬ÓÉÓÚÖÚ¶à×éÖ¯ÒÀÀµSAMLÉí·ÝÑéÖ¤À´°ü¹ÜÓ¦Óûá¼ûÇå¾² £¬ £¬£¬£¬£¬£¬£¬Ò»µ©Ô⵽ʹÓà £¬ £¬£¬£¬£¬£¬£¬½«¿ÉÄܵ¼ÖÂÓû§Êý¾Ýй¶ºÍÆóÒµ×ʲúÊÜË𡣡£¡£ÌáÐÑËùÓÐRuby-SAMLÓû§Á¬Ã¦½ÓÄÉÐж¯ £¬ £¬£¬£¬£¬£¬£¬¸üÐÂÖÁ×îÐÂÇå¾²°æ±¾ £¬ £¬£¬£¬£¬£¬£¬ÒÔÌá·ÀDZÔÚµÄÇ徲Σº¦¡£¡£¡£


https://securityonline.info/cve-2024-45409-cvss-10-critical-ruby-saml-flaw-leaves-user-accounts-exposed/


2. ²é¶û˹¡¤´ï¶ûÎÄѧУÔâÀÕË÷Èí¼þ¹¥»÷½ôÆÈÍ £¿£¿ £¿Î


9ÔÂ9ÈÕ £¬ £¬£¬£¬£¬£¬£¬Ó¢¹úÂ×¶ØÄϲ¿µÄ²é¶û˹¡¤´ï¶ûÎÄѧУÒòÔâÊÜÀÕË÷Èí¼þ¹¥»÷ £¬ £¬£¬£¬£¬£¬£¬Ðû²¼±¾ÖÜǰÈýÌ콫¹Ø±ÕУ԰¾ÙÐÐÍøÂçÇå¾²ÕûÀíÊÂÇé £¬ £¬£¬£¬£¬£¬£¬´Ë¾ÙÓ°ÏìÁËÔ¼1300ÃûѧÉúµÄÕý³£Ñ§Ï°¡£¡£¡£×Ô9ÔÂ5ÈÕÆð £¬ £¬£¬£¬£¬£¬£¬Ñ§Éú±»ÆÈÀëУ £¬ £¬£¬£¬£¬£¬£¬Ð£³¤Aston SmithËæºóÏò¼Ò³¤×ª´ï £¬ £¬£¬£¬£¬£¬£¬´Ë´ÎITÎÊÌâʵΪÑÏÖØµÄÀÕË÷Èí¼þ¹¥»÷ £¬ £¬£¬£¬£¬£¬£¬µ¼ÖÂËùÓÐÔ±¹¤×°±¸±»ÒƳýÒÔ¾ÙÐÐÇå¾²´¦Öóͷ£¡£¡£¡£Òò´Ë £¬ £¬£¬£¬£¬£¬£¬Ñ§Ð£¾öÒéÔÚÏÂÖÜÒ»¡¢¶þ¡¢ÈýÔÝÍ£ÊÚ¿Î £¬ £¬£¬£¬£¬£¬£¬ÒÔ±ãÎ÷Ï¯ÖØÐÂÍýÏë¿Î³Ì £¬ £¬£¬£¬£¬£¬£¬ÖÎÀí²ãÔòÖÂÁ¦ÓÚ¹¹½¨ÐÂϵͳÒÔ»Ö¸´Ñ§Ð£ÔËÓª¡£¡£¡£Í¬Ê± £¬ £¬£¬£¬£¬£¬£¬Ñ§ÉúµÄ΢ÈíOffice 365ÕË»§±»ÔÝʱ½ûÓà £¬ £¬£¬£¬£¬£¬£¬ÒÔ·À½øÒ»²½Î£º¦¡£¡£¡£Ð£³¤Ç¿µ÷ £¬ £¬£¬£¬£¬£¬£¬ÔÚ´Ëʱ´ú £¬ £¬£¬£¬£¬£¬£¬¼Ò³¤ÓëѧÉúӦͨ¹ý¹Ù·½Ñ§Ï°Æ½Ì¨Satchel One»ñÈ¡×îÐÂ֪ͨ £¬ £¬£¬£¬£¬£¬£¬ÇÐÎðÇáÐÅÈκÎδ¾­ºËʵµÄÓʼþ»òÁ´½Ó¡£¡£¡£¼øÓÚÊý¾Ýй¶µÄ¿ÉÄÜÐÔ £¬ £¬£¬£¬£¬£¬£¬Ñ§Ð£ÕýÓëÍøÂçÇ徲ר¼ÒϸÃÜÏàÖú £¬ £¬£¬£¬£¬£¬£¬µ«ÏêϸËðʧϸ½ÚÉдýÊÓ²ìÍê³ÉºóÐû²¼¡£¡£¡£Ð£³¤»¹Ö¸³ö £¬ £¬£¬£¬£¬£¬£¬Ö»¹ÜѧУÒѽÓÄÉÏȽøµÄÇå¾²²½·¥ £¬ £¬£¬£¬£¬£¬£¬´ËÀàÍøÂç¹¥»÷ÈÔÈÕÒæ·Å×Ý £¬ £¬£¬£¬£¬£¬£¬Óë½üÆÚÓ¢¹ú¶àÆð×ÅÃû»ú¹¹ÔâÏ®ÊÂÎñÏàËÆ £¬ £¬£¬£¬£¬£¬£¬Í¹ÏÔÁËÍøÂçÇå¾²ÌôÕ½µÄÑÏËàÐÔ¡£¡£¡£


https://therecord.media/ransomware-attack-forces-london-high-school-to-close


3. °ÙÍò°²×¿µçÊÓºÐÔâVo1dºóÃŶñÒâÈí¼þ¹¥»÷ £¬ £¬£¬£¬£¬£¬£¬È«Çò¶à¹úÏÝÂä


9ÔÂ12ÈÕ £¬ £¬£¬£¬£¬£¬£¬ÍþвÕßʹÓÃÐÂÐÍVo1dºóÃŶñÒâÈí¼þ £¬ £¬£¬£¬£¬£¬£¬ÀÖ³ÉѬȾÁËÈ«ÇòÁè¼Ý130Íǫ̀ÔËÐÐAndroidϵͳµÄµçÊÓÁ÷ýÌåºÐ £¬ £¬£¬£¬£¬£¬£¬Ö÷Òª¼¯ÖÐÓÚ°ÍÎ÷¡¢Ä¦Âå¸çµÈ¶à¹ú £¬ £¬£¬£¬£¬£¬£¬¸¶Óë¹¥»÷Õß¶ÔÕâЩװ±¸µÄÍêÈ«¿ØÖÆÈ¨¡£¡£¡£Õâ¿î¶ñÒâÈí¼þÔ´×ÔAndroid¿ªÔ´ÏîÄ¿£¨AOSP£© £¬ £¬£¬£¬£¬£¬£¬ÓÉGoogleÖ÷µ¼ £¬ £¬£¬£¬£¬£¬£¬ÆÕ±éÓÃÓÚ¶àÖÖ×°±¸¡£¡£¡£Dr.WebµÄÑо¿Õ¹ÏÖ £¬ £¬£¬£¬£¬£¬£¬Vo1d¶ñÒâÈí¼þͨ¹ý¸Ä¶¯AndroidµÄÆô¶¯¾ç±¾£¨Èçinstall-recovery.sh¡¢daemonsuµÈ£© £¬ £¬£¬£¬£¬£¬£¬ÊµÏÖÔÚÉè±¹ØÁ¬Ä³¤ÆÚ±£´æÓë×Ô¶¯Æô¶¯¡£¡£¡£ÆäÖ÷Òª¹¦Ð§ÓÉvo1dºÍwdÁ½¸ö×é¼þЭͬÍê³É £¬ £¬£¬£¬£¬£¬£¬vo1dÈÏÕæwdµÄÆô¶¯Óë¿ØÖÆ £¬ £¬£¬£¬£¬£¬£¬²¢ÄÜÖ´ÐÐÀ´×ÔC&CЧÀÍÆ÷µÄÏÂÁ£»£»£»£»£»wdÔòÈÏÕæ×°ÖÃÊØ»¤Àú³Ì £¬ £¬£¬£¬£¬£¬£¬¼àÊÓĿ¼²¢×°ÖÃAPKÎļþ¡£¡£¡£Ñ¬È¾Í¾¾¶ËäÉв»Ã÷È· £¬ £¬£¬£¬£¬£¬£¬µ«ÍƲâ¿ÉÄÜÉæ¼°²Ù×÷ϵͳÎó²îµÄʹÓûò·Ç¹Ù·½¹Ì¼þÖеÄrootȨÏÞÎó²î¡£¡£¡£Îª±ÜÃâ½øÒ»²½Ñ¬È¾ £¬ £¬£¬£¬£¬£¬£¬AndroidÓû§Ó¦°´ÆÚ¼ì²é²¢×°Öù̼þ¸üР£¬ £¬£¬£¬£¬£¬£¬Í¬Ê±×èֹʹÓÃÀ´×Էǹٷ½ÇþµÀµÄAPKÓ¦Óᣡ£¡£¼øÓÚÊÜѬȾװ±¸ÏÖʵÔËÐеÄÊÇAOSP¶ø·ÇAndroid TV £¬ £¬£¬£¬£¬£¬£¬ÕâÒ»·¢Ã÷Ç¿µ÷ÁË×ÝÈ»ÊÇ»ùÓÚ¿ªÔ´ÏîÄ¿µÄ×°±¸Ò²Ðè¼á³ÖСÐÄ £¬ £¬£¬£¬£¬£¬£¬ÒÔ·ÀÔâÊÜÀàËÆ¹¥»÷¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-vo1d-malware-infects-13-million-android-streaming-boxes/


4. Hadooken¶ñÒâÈí¼þÃé×¼Oracle WebLogicЧÀÍÆ÷


9ÔÂ13ÈÕ £¬ £¬£¬£¬£¬£¬£¬AquaµÄÑо¿ÍŶÓ×î½üÕ¹ÏÖÁËÕë¶ÔOracle WebLogicЧÀÍÆ÷µÄϵÁй¥»÷ £¬ £¬£¬£¬£¬£¬£¬ÕâЩ¹¥»÷ʹÓÃÈõÃÜÂë×÷ÎªÍ»ÆÆ¿Ú £¬ £¬£¬£¬£¬£¬£¬°²ÅÅÁËÒ»ÖÖÐÂÐ˵ÄLinux¶ñÒâÈí¼þHadooken¡£¡£¡£AquaÔÚ¼à¿ØÖв¶»ñµ½ÊýÊ®Æð´ËÀàÈëÇÖ £¬ £¬£¬£¬£¬£¬£¬Åú×¢¹¥»÷»î¶¯»îÔ¾ÇÒÆµÈÔ¡£¡£¡£Hadooken ºÜ¿ÉÄÜÒÔ¡¶Ä°Í·°ÔÍõ¡·µç×ÓÓÎϷϵÁÐÖеÄÒ»´Î¹¥»÷ÃüÃû £¬ £¬£¬£¬£¬£¬£¬¼¯³ÉÁ˼ÓÃÜ¿ó¹¤ÓëDZÔÚµÄTsunami DDoS½©Ê¬ÍøÂ繦Ч¡£¡£¡£Hadookenͨ¹ý½¨ÉècronjobʵÏÖ³¤ÆÚ»¯ £¬ £¬£¬£¬£¬£¬£¬²¢°üÀ¨ÇÔÈ¡Óû§Æ¾Ö¤µÄ¾ç±¾ £¬ £¬£¬£¬£¬£¬£¬±ãÓÚ¹¥»÷ÕߺáÏòÀ©Õ¹ÖÁÆäËûЧÀÍÆ÷¡£¡£¡£Aqua×·×Ùµ½HadookenÏÂÔØÔ´×ÔÁ½¸öIPµØµãÖ®Ò»ÓëÓ¢¹úijÍйܹ«Ë¾Ïà¹Ø £¬ £¬£¬£¬£¬£¬£¬µ«ÎÞÖ±½ÓÖ¤¾ÝÅú×¢¸Ã¹«Ë¾Éæ¶ñ¡£¡£¡£½øÒ»²½ÆÊÎöÏÔʾ £¬ £¬£¬£¬£¬£¬£¬HadookenÓëRHOMBUSºÍNoEscapeÀÕË÷Èí¼þ±£´æÊÖÒÕ¹ØÁª £¬ £¬£¬£¬£¬£¬£¬ÌåÏÖ¹¥»÷Õß¿ÉÄÜͬʱÃé×¼Windows¶ËµãÖ´ÐÐÀÕË÷Èí¼þ £¬ £¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃLinuxЧÀÍÆ÷°²ÅźóÃźͼÓÃÜ¿ó¹¤ £¬ £¬£¬£¬£¬£¬£¬Õë¶Ô´óÐÍÆóҵʵÑ鸴ºÏÐÍÍþв¡£¡£¡£


https://www.theregister.com/2024/09/13/hadooken_attacks_oracle_weblogic/


5. ºÚ¿ÍʹÓÃAzure SharePointÎó²îµ¼ÖÂFortinet 440GBÊý¾Ýй¶


9ÔÂ12ÈÕ £¬ £¬£¬£¬£¬£¬£¬ºÚ¿Í¡°Fortibitch¡±ÔÚµØÏÂÂÛ̳Breach ForumÉÏÉù³Æ´ÓÍøÂçÇå¾²¾ÞÍ·FortinetµÄAzure SharePointʵÀýÖÐÇÔÈ¡ÁË440GBµÄÊý¾Ý £¬ £¬£¬£¬£¬£¬£¬¸ÃÎó²î±»ÃüÃûΪ¡°Fortileak¡±¡£¡£¡£ºÚ¿ÍÖ¸ÔðFortinetµÄAzure SharePoint̻¶²¢±»ÈëÇÖ £¬ £¬£¬£¬£¬£¬£¬µ¼ÖÂÊý¾Ýй¶ £¬ £¬£¬£¬£¬£¬£¬²¢·ÖÏíÁË»á¼ûƾ֤ÒÔ±ãÏÂÔØÕâЩÊý¾Ý¡£¡£¡£ºÚ¿Í»¹Ìáµ½FortinetµÄCEOл¿Ï¾Ü¾øÁËÊê½ðÒªÇó £¬ £¬£¬£¬£¬£¬£¬²¢¼¥Ð¦Æä̬¶È¡£¡£¡£Fortinet¹Ù·½»ØÓ¦³Æ £¬ £¬£¬£¬£¬£¬£¬Ò»ÃûδÊÚȨ¸öÌå»á¼ûÁË´æ´¢ÔÚµÚÈý·½Ôƶ˹²ÏíÎļþÇý¶¯Æ÷ÉϵÄÓÐÏÞÎļþ £¬ £¬£¬£¬£¬£¬£¬ÕâЩÎļþÉæ¼°¡°Ò»Ð¡²¿·Ö¡±¿Í»§Êý¾Ý £¬ £¬£¬£¬£¬£¬£¬µ«¹«Ë¾ÔËÓª¡¢²úÆ·ºÍЧÀÍδÊÜÓ°Ïì £¬ £¬£¬£¬£¬£¬£¬ÇÒÒÑÓë¿Í»§Ïàͬ¡£¡£¡£´Ëǰ £¬ £¬£¬£¬£¬£¬£¬FortinetÒ²ÔâÓö¹ýÇå¾²ÊÂÎñ £¬ £¬£¬£¬£¬£¬£¬°üÀ¨±»Ê¹ÓÃÁãÈÕÎó²îºÍFortiOS²Ù×÷ϵͳÎó²îµÄ¹¥»÷¡£¡£¡£ÏÖÔÚ £¬ £¬£¬£¬£¬£¬£¬´Ë´ÎÊý¾Ýй¶µÄÑÏÖØË®Æ½¼°Êê½ð̸ÅÐÏ£ÍûÉв»ÇåÀÊ £¬ £¬£¬£¬£¬£¬£¬¿Í»§ºÍÍøÂçÇå¾²ÁìÓòÕýÇ×½ü¹Ø×¢ÊÂ̬Éú³¤¡£¡£¡£


https://hackread.com/fortinet-confirms-data-breach-hacker-data-leak/


6. DockerSpy£º×Ô¶¯É¨ÃèDocker Hub¾µÏñ £¬ £¬£¬£¬£¬£¬£¬ÊØ»¤Ãô¸ÐÊý¾ÝÇå¾²


9ÔÂ11ÈÕ £¬ £¬£¬£¬£¬£¬£¬DockerSpy ÊÇÒ»¿îרΪ½â¾ö Docker ¾µÏñÖÐÃô¸ÐÊý¾Ýй¶ÎÊÌâ¶øÉè¼ÆµÄ¹¤¾ß £¬ £¬£¬£¬£¬£¬£¬ËüÄÜ×Ô¶¯É¨Ãè Docker Hub ÉϵÄͼÏñ £¬ £¬£¬£¬£¬£¬£¬¿ìËÙ¼ìË÷³ö°üÀ¨Éí·ÝÑéÖ¤ÉñÃØ¡¢Ë½Ô¿µÈÔÚÄÚµÄÃô¸ÐÐÅÏ¢¡£¡£¡£½¨ÉèÕß Alisson Moretto ÌåÏÖ £¬ £¬£¬£¬£¬£¬£¬Ëæ×Å Docker ¾µÏñµÄÆÕ±éʹÓà £¬ £¬£¬£¬£¬£¬£¬ÓÈÆäÊǹ«¹²¾µÏñ¿âÖÐDZÔÚµÄÇå¾²Òþ»¼ÈÕÒæÍ¹ÏÔ £¬ £¬£¬£¬£¬£¬£¬DockerSpy µÄ½µÉúÖ¼ÔÚÌṩһ²ãÌØÁíÍâÇå¾²ÆÁÕÏ £¬ £¬£¬£¬£¬£¬£¬×ÊÖú¿ª·¢Õßʵʱ·¢Ã÷²¢É¨³ý¾µÏñÖеÄÃô¸ÐÊý¾Ý £¬ £¬£¬£¬£¬£¬£¬ÔöÇ¿Çå¾²ÐԺͺϹæÐÔ¡£¡£¡£DockerSpy µÄÆæÒìÓÅÊÆÔÚÓÚÆäÓë Docker Hub µÄÎ޷켯³É £¬ £¬£¬£¬£¬£¬£¬ÊµÏÖÁË×Ô¶¯»¯ÌáÈ¡ºÍÆÊÎö¾µÏñµÄ¹¦Ð§ £¬ £¬£¬£¬£¬£¬£¬ÎÞÐèÊÖ¶¯¸ÉÔ¤¡£¡£¡£ÆäÏȽøµÄɨÃèÒýÇæÄܹ»Ê¶±ð¶àÖÖÐÎʽµÄÉñÃØÐÅÏ¢ £¬ £¬£¬£¬£¬£¬£¬ÎÞÂÛÊÇÓ²±àÂëµÄƾ֤ÕÕ¾ÉÒþ²ØÔÚ´úÂë¼°ÇéÐαäÁ¿ÖеÄÖØ´óģʽ £¬ £¬£¬£¬£¬£¬£¬¶¼ÄÜÓÐÓò¶»ñ²¢ÏêϸÆÊÎöDZÔÚΣº¦¡£¡£¡£ÏÖÔÚ £¬ £¬£¬£¬£¬£¬£¬DockerSpy ÒÑÔÚ GitHub ÉÏ¿ª·ÅÏÂÔØ £¬ £¬£¬£¬£¬£¬£¬¹©¿ª·¢ÕßÃâ·ÑʹÓᣡ£¡£


https://www.helpnetsecurity.com/2024/09/11/dockerspy-extract-sensitive-information-docker-hub-images/?web_view=true