Ruby-SAML¿âÆØÎó²îCVE-2024-45409£¬Î£¼°Éí·ÝÑéÖ¤Çå¾²

Ðû²¼Ê±¼ä 2024-09-13
1. Ruby-SAML¿âÆØÎó²îCVE-2024-45409£¬Î£¼°Éí·ÝÑéÖ¤Çå¾²


9ÔÂ11ÈÕ£¬Ruby-SAML¿â×÷ΪʵÑéSAML£¨Çå¾²¶ÏÑÔ±ê¼ÇÓïÑÔ£©ÊÚȨµÄÖ÷Òª¹¤¾ß£¬½üÆÚ±»ÆسöÑÏÖØÇå¾²Îó²îCVE-2024-45409£¬ÆäCVSSÆÀ·Ö¸ß´ï10£¬Åú×¢Æ伫¸ßµÄΣº¦ÐÔ¡£´ËÎó²î±£´æÓÚRuby-SAMLµÄ¶à¸ö°æ±¾ÖУ¬Ö÷ÒªÒòXPathÑ¡ÔñÆ÷¹ýʧµ¼Ö£¬Ê¹µÃSAMLÏìÓ¦µÄÊðÃûÑé֤ʧЧ¡£SAML×÷Ϊµ¥µãµÇ¼£¨SSO£©µÄ½¹µãЭÒ飬ÆäÊðÃûÍêÕûÐÔµÄȱʧֱ½ÓÍþвµ½ÏµÍ³µÄÇå¾²ÐÔ¡£¹¥»÷ÕßÎÞÐèÉí·ÝÑéÖ¤£¬½öͨ¹ýαÔì»ò¸Ä¶¯°üÀ¨í§ÒâÊý¾ÝµÄSAMLÏìÓ¦£¬¼´¿ÉÇáËÉÈƹýÉí·ÝÑéÖ¤»úÖÆ£¬Ã°³äµ±ºÎÓû§Éí·ÝµÇ¼ϵͳ£¬´Ó¶ø»ñÈ¡¶ÔÃô¸ÐÊý¾ÝºÍÒªº¦ÏµÍ³µÄδÊÚȨ»á¼ûȨÏÞ¡£ÕâÒ»Îó²îµÄÆÕ±éÓ°Ïì½ûÖ¹ºöÊÓ£¬ÓÉÓÚÖÚ¶à×éÖ¯ÒÀÀµSAMLÉí·ÝÑéÖ¤À´°ü¹ÜÓ¦Óûá¼ûÇå¾²£¬Ò»µ©Ô⵽ʹÓ㬽«¿ÉÄܵ¼ÖÂÓû§Êý¾Ýй¶ºÍÆóÒµ×ʲúÊÜËð¡£ÌáÐÑËùÓÐRuby-SAMLÓû§Á¬Ã¦½ÓÄÉÐж¯£¬¸üÐÂÖÁ×îÐÂÇå¾²°æ±¾£¬ÒÔÌá·ÀDZÔÚµÄÇ徲Σº¦¡£


https://securityonline.info/cve-2024-45409-cvss-10-critical-ruby-saml-flaw-leaves-user-accounts-exposed/


2. ²é¶û˹¡¤´ï¶ûÎÄѧУÔâÀÕË÷Èí¼þ¹¥»÷½ôÆÈÍ£¿Î


9ÔÂ9ÈÕ£¬Ó¢¹úÂ׶ØÄϲ¿µÄ²é¶û˹¡¤´ï¶ûÎÄѧУÒòÔâÊÜÀÕË÷Èí¼þ¹¥»÷£¬Ðû²¼±¾ÖÜÇ°ÈýÌ콫¹Ø±ÕУ԰¾ÙÐÐÍøÂçÇå¾²ÕûÀíÊÂÇ飬´Ë¾ÙÓ°ÏìÁËÔ¼1300ÃûѧÉúµÄÕý³£Ñ§Ï°¡£×Ô9ÔÂ5ÈÕÆð£¬Ñ§Éú±»ÆÈÀëУ£¬Ð£³¤Aston SmithËæºóÏò¼Ò³¤×ª´ï£¬´Ë´ÎITÎÊÌâʵΪÑÏÖصÄÀÕË÷Èí¼þ¹¥»÷£¬µ¼ÖÂËùÓÐÔ±¹¤×°±¸±»ÒƳýÒÔ¾ÙÐÐÇå¾²´¦Öóͷ£¡£Òò´Ë£¬Ñ§Ð£¾öÒéÔÚÏÂÖÜÒ»¡¢¶þ¡¢ÈýÔÝÍ£ÊڿΣ¬ÒÔ±ãÎ÷ϯÖØÐÂÍýÏë¿Î³Ì£¬ÖÎÀí²ãÔòÖÂÁ¦ÓÚ¹¹½¨ÐÂϵͳÒÔ»Ö¸´Ñ§Ð£ÔËÓª¡£Í¬Ê±£¬Ñ§ÉúµÄ΢ÈíOffice 365ÕË»§±»ÔÝʱ½ûÓã¬ÒÔ·À½øÒ»²½Î£º¦¡£Ð£³¤Ç¿µ÷£¬ÔÚ´Ëʱ´ú£¬¼Ò³¤ÓëѧÉúӦͨ¹ý¹Ù·½Ñ§Ï°Æ½Ì¨Satchel One»ñÈ¡×îÐÂ֪ͨ£¬ÇÐÎðÇáÐÅÍкÎδ¾­ºËʵµÄÓʼþ»òÁ´½Ó¡£¼øÓÚÊý¾Ýй¶µÄ¿ÉÄÜÐÔ£¬Ñ§Ð£ÕýÓëÍøÂçÇ徲ר¼ÒϸÃÜÏàÖú£¬µ«ÏêϸËðʧϸ½ÚÉдýÊÓ²ìÍê³ÉºóÐû²¼¡£Ð£³¤»¹Ö¸³ö£¬Ö»¹ÜѧУÒѽÓÄÉÏȽøµÄÇå¾²²½·¥£¬´ËÀàÍøÂç¹¥»÷ÈÔÈÕÒæ·Å×Ý£¬Óë½üÆÚÓ¢¹ú¶àÆð×ÅÃû»ú¹¹ÔâÏ®ÊÂÎñÏàËÆ£¬Í¹ÏÔÁËÍøÂçÇå¾²ÌôÕ½µÄÑÏËàÐÔ¡£


https://therecord.media/ransomware-attack-forces-london-high-school-to-close


3. °ÙÍò°²×¿µçÊÓºÐÔâVo1dºóÃŶñÒâÈí¼þ¹¥»÷£¬È«Çò¶à¹úÏÝÂä


9ÔÂ12ÈÕ£¬ÍþвÕßʹÓÃÐÂÐÍVo1dºóÃŶñÒâÈí¼þ£¬ÀÖ³ÉѬȾÁËÈ«ÇòÁè¼Ý130Íǫ̀ÔËÐÐAndroidϵͳµÄµçÊÓÁ÷ýÌåºÐ£¬Ö÷Òª¼¯ÖÐÓÚ°ÍÎ÷¡¢Ä¦Âå¸çµÈ¶à¹ú£¬¸¶Óë¹¥»÷Õ߶ÔÕâЩװ±¸µÄÍêÈ«¿ØÖÆȨ¡£Õâ¿î¶ñÒâÈí¼þÔ´×ÔAndroid¿ªÔ´ÏîÄ¿£¨AOSP£©£¬ÓÉGoogleÖ÷µ¼£¬ÆÕ±éÓÃÓÚ¶àÖÖ×°±¸¡£Dr.WebµÄÑо¿Õ¹ÏÖ£¬Vo1d¶ñÒâÈí¼þͨ¹ý¸Ä¶¯AndroidµÄÆô¶¯¾ç±¾£¨Èçinstall-recovery.sh¡¢daemonsuµÈ£©£¬ÊµÏÖÔÚÉè±¹ØÁ¬Ä³¤ÆÚ±£´æÓë×Ô¶¯Æô¶¯¡£ÆäÖ÷Òª¹¦Ð§ÓÉvo1dºÍwdÁ½¸ö×é¼þЭͬÍê³É£¬vo1dÈÏÕæwdµÄÆô¶¯Óë¿ØÖÆ£¬²¢ÄÜÖ´ÐÐÀ´×ÔC&C·þÎñÆ÷µÄÏÂÁwdÔòÈÏÕæ×°ÖÃÊØ»¤Àú³Ì£¬¼àÊÓĿ¼²¢×°ÖÃAPKÎļþ¡£Ñ¬È¾Í¾¾¶ËäÉв»Ã÷È·£¬µ«ÍƲâ¿ÉÄÜÉæ¼°²Ù×÷ϵͳÎó²îµÄʹÓûò·Ç¹Ù·½¹Ì¼þÖеÄrootȨÏÞÎó²î¡£Îª±ÜÃâ½øÒ»²½Ñ¬È¾£¬AndroidÓû§Ó¦°´ÆÚ¼ì²é²¢×°Öù̼þ¸üУ¬Í¬Ê±×èֹʹÓÃÀ´×Էǹٷ½ÇþµÀµÄAPKÓ¦Ó᣼øÓÚÊÜѬȾװ±¸ÏÖʵÔËÐеÄÊÇAOSP¶ø·ÇAndroid TV£¬ÕâÒ»·¢Ã÷Ç¿µ÷ÁË×ÝÈ»ÊÇ»ùÓÚ¿ªÔ´ÏîÄ¿µÄ×°±¸Ò²Ðè¼á³ÖСÐÄ£¬ÒÔ·ÀÔâÊÜÀàËƹ¥»÷¡£


https://www.bleepingcomputer.com/news/security/new-vo1d-malware-infects-13-million-android-streaming-boxes/


4. Hadooken¶ñÒâÈí¼þÃé×¼Oracle WebLogic·þÎñÆ÷


9ÔÂ13ÈÕ£¬AquaµÄÑо¿ÍŶÓ×î½üÕ¹ÏÖÁËÕë¶ÔOracle WebLogic·þÎñÆ÷µÄϵÁй¥»÷£¬ÕâЩ¹¥»÷ʹÓÃÈõÃÜÂë×÷ΪͻÆÆ¿Ú£¬°²ÅÅÁËÒ»ÖÖÐÂÐ˵ÄLinux¶ñÒâÈí¼þHadooken¡£AquaÔÚ¼à¿ØÖⶻñµ½ÊýÊ®Æð´ËÀàÈëÇÖ£¬Åú×¢¹¥»÷Ô˶¯»îÔ¾ÇÒƵÈÔ¡£Hadooken ºÜ¿ÉÄÜÒÔ¡¶Ä°Í·°ÔÍõ¡·µç×ÓÓÎϷϵÁÐÖеÄÒ»´Î¹¥»÷ÃüÃû£¬¼¯³ÉÁ˼ÓÃÜ¿ó¹¤ÓëDZÔÚµÄTsunami DDoS½©Ê¬ÍøÂ繦Ч¡£Hadookenͨ¹ý½¨ÉècronjobʵÏÖ³¤ÆÚ»¯£¬²¢°üÀ¨ÇÔÈ¡Óû§Æ¾Ö¤µÄ¾ç±¾£¬±ãÓÚ¹¥»÷ÕߺáÏòÀ©Õ¹ÖÁÆäËû·þÎñÆ÷¡£Aqua×·×Ùµ½HadookenÏÂÔØÔ´×ÔÁ½¸öIPµØµãÖ®Ò»ÓëÓ¢¹úijÍйܹ«Ë¾Ïà¹Ø£¬µ«ÎÞÖ±½ÓÖ¤¾ÝÅú×¢¸Ã¹«Ë¾Éæ¶ñ¡£½øÒ»²½ÆÊÎöÏÔʾ£¬HadookenÓëRHOMBUSºÍNoEscapeÀÕË÷Èí¼þ±£´æÊÖÒÕ¹ØÁª£¬ÌåÏÖ¹¥»÷Õß¿ÉÄÜͬʱÃé×¼Windows¶ËµãÖ´ÐÐÀÕË÷Èí¼þ£¬²¢Ê¹ÓÃLinux·þÎñÆ÷°²ÅźóÃźͼÓÃܿ󹤣¬Õë¶Ô´óÐÍÆóҵʵÑ鸴ºÏÐÍÍþв¡£


https://www.theregister.com/2024/09/13/hadooken_attacks_oracle_weblogic/


5. ºÚ¿ÍʹÓÃAzure SharePointÎó²îµ¼ÖÂFortinet 440GBÊý¾Ýй¶


9ÔÂ12ÈÕ£¬ºÚ¿Í¡°Fortibitch¡±ÔÚµØÏÂÂÛ̳Breach ForumÉÏÉù³Æ´ÓÍøÂçÇå¾²¾ÞÍ·FortinetµÄAzure SharePointʵÀýÖÐÇÔÈ¡ÁË440GBµÄÊý¾Ý£¬¸ÃÎó²î±»ÃüÃûΪ¡°Fortileak¡±¡£ºÚ¿ÍÖ¸ÔðFortinetµÄAzure SharePoint̻¶²¢±»ÈëÇÖ£¬µ¼ÖÂÊý¾Ýй¶£¬²¢·ÖÏíÁË»á¼ûƾ֤ÒÔ±ãÏÂÔØÕâЩÊý¾Ý¡£ºÚ¿Í»¹Ìáµ½FortinetµÄCEOл¿Ï¾Ü¾øÁËÊê½ðÒªÇ󣬲¢¼¥Ð¦Æä̬¶È¡£Fortinet¹Ù·½»ØÓ¦³Æ£¬Ò»ÃûδÊÚȨ¸öÌå»á¼ûÁË´æ´¢ÔÚµÚÈý·½Ôƶ˹²ÏíÎļþÇý¶¯Æ÷ÉϵÄÓÐÏÞÎļþ£¬ÕâЩÎļþÉæ¼°¡°Ò»Ð¡²¿·Ö¡±¿Í»§Êý¾Ý£¬µ«¹«Ë¾ÔËÓª¡¢²úÆ·ºÍ·þÎñδÊÜÓ°Ï죬ÇÒÒÑÓë¿Í»§Ïàͬ¡£´ËÇ°£¬FortinetÒ²ÔâÓö¹ýÇå¾²ÊÂÎñ£¬°üÀ¨±»Ê¹ÓÃÁãÈÕÎó²îºÍFortiOS²Ù×÷ϵͳÎó²îµÄ¹¥»÷¡£ÏÖÔÚ£¬´Ë´ÎÊý¾Ý鶵ÄÑÏÖØˮƽ¼°Êê½ð̸ÅÐÏ£ÍûÉв»ÇåÀÊ£¬¿Í»§ºÍÍøÂçÇå¾²ÁìÓòÕýÇ×½ü¹Ø×¢ÊÂ̬Éú³¤¡£


https://hackread.com/fortinet-confirms-data-breach-hacker-data-leak/


6. DockerSpy£º×Ô¶¯É¨ÃèDocker Hub¾µÏñ£¬ÊØ»¤Ãô¸ÐÊý¾ÝÇå¾²


9ÔÂ11ÈÕ£¬DockerSpy ÊÇÒ»¿îרΪ½â¾ö Docker ¾µÏñÖÐÃô¸ÐÊý¾Ýй¶ÎÊÌâ¶øÉè¼ÆµÄ¹¤¾ß£¬ËüÄÜ×Ô¶¯É¨Ãè Docker Hub ÉϵÄͼÏñ£¬¿ìËÙ¼ìË÷³ö°üÀ¨Éí·ÝÑéÖ¤ÉñÃØ¡¢Ë½Ô¿µÈÔÚÄÚµÄÃô¸ÐÐÅÏ¢¡£½¨ÉèÕß Alisson Moretto ÌåÏÖ£¬Ëæ×Å Docker ¾µÏñµÄÆÕ±éʹÓã¬ÓÈÆäÊǹ«¹²¾µÏñ¿âÖÐDZÔÚµÄÇå¾²Òþ»¼ÈÕÒæ͹ÏÔ£¬DockerSpy µÄ½µÉúÖ¼ÔÚÌṩһ²ãÌØÁíÍâÇå¾²ÆÁÕÏ£¬×ÊÖú¿ª·¢Õßʵʱ·¢Ã÷²¢É¨³ý¾µÏñÖеÄÃô¸ÐÊý¾Ý£¬ÔöÇ¿Çå¾²ÐԺͺϹæÐÔ¡£DockerSpy µÄÆæÒìÓÅÊÆÔÚÓÚÆäÓë Docker Hub µÄÎ޷켯³É£¬ÊµÏÖÁË×Ô¶¯»¯ÌáÈ¡ºÍÆÊÎö¾µÏñµÄ¹¦Ð§£¬ÎÞÐèÊÖ¶¯¸ÉÔ¤¡£ÆäÏȽøµÄɨÃèÒýÇæÄܹ»Ê¶±ð¶àÖÖÐÎʽµÄÉñÃØÐÅÏ¢£¬ÎÞÂÛÊÇÓ²±àÂëµÄƾ֤ÕÕ¾ÉÒþ²ØÔÚ´úÂë¼°ÇéÐαäÁ¿ÖеÄÖØ´óģʽ£¬¶¼ÄÜÓÐÓò¶»ñ²¢ÏêϸÆÊÎöDZÔÚΣº¦¡£ÏÖÔÚ£¬DockerSpy ÒÑÔÚ GitHub ÉÏ¿ª·ÅÏÂÔØ£¬¹©¿ª·¢ÕßÃâ·ÑʹÓá£


https://www.helpnetsecurity.com/2024/09/11/dockerspy-extract-sensitive-information-docker-hub-images/?web_view=true