Ruby-SAML¿âÆØ©¶´CVE-2024-45409£¬Î£¼°Éí·ÝÑéÖ¤Äþ¾²
Ðû²¼Ê±¼ä 2024-09-139ÔÂ11ÈÕ£¬Ruby-SAML¿â×÷ΪʵʩSAML£¨Äþ¾²¶ÏÑÔ±êÖ¾ÓïÑÔ£©ÊÚȨµÄÖØÒª¹¤¾ß£¬½üÆÚ±»ÆسöÑÏÖØÄþ¾²Â©¶´CVE-2024-45409£¬ÆäCVSSÆÀ·Ö¸ß´ï10£¬±íÃ÷Æ伫¸ßµÄΣº¦ÐÔ¡£´Ë©¶´´æÔÚÓÚRuby-SAMLµÄ¶à¸ö°æ±¾ÖУ¬Ö÷ÒªÒòXPathÑ¡ÔñÆ÷´íÎóµ¼Ö£¬Ê¹µÃSAMLÏìÓ¦µÄÇ©ÃûÑé֤ʧЧ¡£SAML×÷Ϊµ¥µãµÇ¼£¨SSO£©µÄºËÐÄÐÒ飬ÆäÇ©ÃûÍêÕûÐÔµÄȱʧֱ½ÓÍþвµ½ÏµÍ³µÄÄþ¾²ÐÔ¡£¹¥»÷ÕßÎÞÐèÉí·ÝÑéÖ¤£¬½öͨ¹ýαÔì»ò¸Ä¶¯°üÂÞÈÎÒâÊý¾ÝµÄSAMLÏìÓ¦£¬¼´¿ÉÇáËÉÈƹýÉí·ÝÑéÖ¤»úÖÆ£¬¼ÙðÈκÎÓû§Éí·ÝµÇ¼ϵͳ£¬´Ó¶ø»ñÈ¡¶ÔÃô¸ÐÊý¾ÝºÍÒªº¦ÏµÍ³µÄδÊÚȨ·ÃÎÊȨÏÞ¡£Õâһ©¶´µÄ¹ã·ºÓ°Ïì²»ÈݺöÊÓ£¬ÒòΪÖÚ¶à×éÖ¯ÒÀÀµSAMLÉí·ÝÑéÖ¤À´±£ÕÏÓ¦Ó÷ÃÎÊÄþ¾²£¬Ò»µ©Ôâµ½ÀûÓ㬽«¿ÉÄܵ¼ÖÂÓû§Êý¾Ýй¶ºÍÆóÒµ×ʲúÊÜËð¡£ÌáÐÑËùÓÐRuby-SAMLÓû§Á¢¼´½ÓÄÉÐж¯£¬¸üÐÂÖÁ×îÐÂÄþ¾²°æ±¾£¬ÒÔ·À·¶Ç±ÔÚµÄÄþ¾²·çÏÕ¡£
https://securityonline.info/cve-2024-45409-cvss-10-critical-ruby-saml-flaw-leaves-user-accounts-exposed/
2. ²é¶û˹¡¤´ï¶ûÎÄѧУÔâÀÕË÷Èí¼þ¹¥»÷½ô¼±Í£¿Î
9ÔÂ9ÈÕ£¬Ó¢¹úÂ׶ØÄϲ¿µÄ²é¶û˹¡¤´ï¶ûÎÄѧУÒòÔâÊÜÀÕË÷Èí¼þ¹¥»÷£¬Ðû²¼±¾ÖÜÇ°ÈýÌ콫¹Ø±ÕУ԰½øÐÐÍøÂçÄþ¾²ÇåÀíÊÂÇ飬´Ë¾ÙÓ°ÏìÁËÔ¼1300ÃûѧÉúµÄÕý³£Ñ§Ï°¡£×Ô9ÔÂ5ÈÕÆð£¬Ñ§Éú±»ÆÈÀëУ£¬Ð£³¤Aston SmithËæºóÏò¼Ò³¤Í¨±¨£¬´Ë´ÎITÎÊÌâʵΪÑÏÖصÄÀÕË÷Èí¼þ¹¥»÷£¬µ¼ÖÂËùÓÐÔ±¹¤É豸±»ÒƳýÒÔ½øÐÐÄþ¾²´¦Öá£Òò´Ë£¬Ñ§Ð£¾ö¶¨ÔÚÏÂÖÜÒ»¡¢¶þ¡¢ÈýÔÝÍ£ÊڿΣ¬ÒÔ±ã½ÌʦÖØй滮¿Î³Ì£¬¹ÜÀí²ãÔòÖÂÁ¦ÓÚ¹¹½¨ÐÂϵͳÒÔ»Ö¸´Ñ§Ð£ÔËÓª¡£Í¬Ê±£¬Ñ§ÉúµÄ΢ÈíOffice 365ÕË»§±»ÔÝʱ½ûÓã¬ÒÔ·À½øÒ»²½·çÏÕ¡£Ð£³¤Ç¿µ÷£¬ÔÚ´ËÆڼ䣬¼Ò³¤ÓëѧÉúӦͨ¹ý¹Ù·½Ñ§Ï°Æ½Ì¨Satchel One»ñÈ¡×îÐÂ֪ͨ£¬ÇÐÎðÇáÐÅÈκÎδ¾ºËʵµÄÓʼþ»òÁ´½Ó¡£¼øÓÚÊý¾Ýй¶µÄ¿ÉÄÜÐÔ£¬Ñ§Ð£ÕýÓëÍøÂçÄþ¾²×¨¼Ò½ôÃܺÏ×÷£¬µ«¾ßÌåËðʧϸ½ÚÉдýÊÓ²ìÍê³ÉºóÐû²¼¡£Ð£³¤»¹Ö¸³ö£¬¾¡¹ÜѧУÒѽÓÄÉÏȽøµÄÄþ¾²´ëÊ©£¬´ËÀàÍøÂç¹¥»÷ÈÔÈÕÒæ·ÅËÁ£¬Óë½üÆÚÓ¢¹ú¶àÆðÖªÃû»ú¹¹ÔâϮʼþÏàËÆ£¬Í¹ÏÔÁËÍøÂçÄþ¾²ÌôÕ½µÄÑϾþÐÔ¡£
https://therecord.media/ransomware-attack-forces-london-high-school-to-close
3. °ÙÍò°²×¿µçÊÓºÐÔâVo1dºóÃŶñÒâÈí¼þ¹¥»÷£¬È«Çò¶à¹úÂÙÏÝ
9ÔÂ12ÈÕ£¬ÍþвÕßÀûÓÃÐÂÐÍVo1dºóÃŶñÒâÈí¼þ£¬ÀÖ³ÉѬȾÁËÈ«ÇòÁè¼Ý130Íǫ̀ÔËÐÐAndroidϵͳµÄµçÊÓÁ÷ýÌåºÐ£¬Ö÷Òª¼¯ÖÐÓÚ°ÍÎ÷¡¢Ä¦Âå¸çµÈ¶à¹ú£¬¸³Óè¹¥»÷Õ߶ÔÕâЩÉ豸µÄÍêÈ«¿ØÖÆȨ¡£Õâ¿î¶ñÒâÈí¼þÔ´×ÔAndroid¿ªÔ´ÏîÄ¿£¨AOSP£©£¬ÓÉGoogleÖ÷µ¼£¬¹ã·ºÓÃÓÚ¶àÖÖÉ豸¡£Dr.WebµÄÑо¿½Òʾ£¬Vo1d¶ñÒâÈí¼þͨ¹ý¸Ä¶¯AndroidµÄÆô¶¯½Å±¾£¨Èçinstall-recovery.sh¡¢daemonsuµÈ£©£¬ÊµÏÖÔÚÉè±¹ØÁ¬Ä³Ö¾Ã´æÔÚÓë×Ô¶¯Æô¶¯¡£ÆäÖ÷Òª¹¦Ð§ÓÉvo1dºÍwdÁ½¸ö×é¼þÐͬÍê³É£¬vo1dÂôÁ¦wdµÄÆô¶¯Óë¿ØÖÆ£¬²¢ÄÜÖ´ÐÐÀ´×ÔC&C·þÎñÆ÷µÄÃüÁwdÔòÂôÁ¦°²×°ÊØ»¤½ø³Ì£¬¼àÊÓĿ¼²¢°²×°APKÎļþ¡£Ñ¬È¾Í¾¾¶ËäÉв»Ã÷È·£¬µ«ÍƲâ¿ÉÄÜÉæ¼°²Ù×÷ϵͳ©¶´µÄÀûÓûò·Ç¹Ù·½¹Ì¼þÖеÄrootȨÏÞ©¶´¡£Îª·ÀÖ¹½øÒ»²½Ñ¬È¾£¬AndroidÓû§Ó¦¶¨ÆÚ¼ì²é²¢°²×°¹Ì¼þ¸üУ¬Í¬Ê±ÖÆֹʹÓÃÀ´×Էǹٷ½ÇþµÀµÄAPKÓ¦Ó᣼øÓÚÊÜѬȾÉ豸ʵ¼ÊÔËÐеÄÊÇAOSP¶ø·ÇAndroid TV£¬ÕâÒ»·¢ÏÖÇ¿µ÷Á˼´Ê¹ÊÇ»ùÓÚ¿ªÔ´ÏîÄ¿µÄÉ豸ҲÐè±£³Ö¾¯Ì裬ÒÔ·ÀÔâÊÜÀàËƹ¥»÷¡£
https://www.bleepingcomputer.com/news/security/new-vo1d-malware-infects-13-million-android-streaming-boxes/
4. Hadooken¶ñÒâÈí¼þÃé×¼Oracle WebLogic·þÎñÆ÷
9ÔÂ13ÈÕ£¬AquaµÄÑо¿ÍŶÓ×î½ü½ÒʾÁËÕë¶ÔOracle WebLogic·þÎñÆ÷µÄϵÁй¥»÷£¬ÕâЩ¹¥»÷ÀûÓÃÈõÃÜÂë×÷ΪͻÆÆ¿Ú£¬²¿ÊðÁËÒ»ÖÖÐÂÐ˵ÄLinux¶ñÒâÈí¼þHadooken¡£AquaÔÚ¼à¿ØÖв¶×½µ½ÊýÊ®Æð´ËÀàÈëÇÖ£¬±íÃ÷¹¥»÷»î¶¯»îÔ¾ÇÒƵ·±¡£Hadooken ºÜ¿ÉÄÜÒÔ¡¶½ÖÍ·°ÔÍõ¡·µç×ÓÓÎϷϵÁÐÖеÄÒ»´Î¹¥»÷ÃüÃû£¬¼¯³ÉÁ˼ÓÃÜ¿ó¹¤ÓëDZÔÚµÄTsunami DDoS½©Ê¬ÍøÂ繦Ч¡£Hadookenͨ¹ý´´½¨cronjobʵÏֳ־û¯£¬²¢°üÂÞÇÔÈ¡Óû§Æ¾Ö¤µÄ½Å±¾£¬±ãÓÚ¹¥»÷ÕߺáÏòÀ©Õ¹ÖÁÆäËû·þÎñÆ÷¡£Aqua×·×Ùµ½HadookenÏÂÔØÔ´×ÔÁ½¸öIPµØÖ·Ö®Ò»ÓëÓ¢¹úijÍйܹ«Ë¾Ïà¹Ø£¬µ«ÎÞÖ±½ÓÖ¤¾Ý±íÃ÷¸Ã¹«Ë¾Éæ¶ñ¡£½øÒ»²½·ÖÎöÏÔʾ£¬HadookenÓëRHOMBUSºÍNoEscapeÀÕË÷Èí¼þ´æÔÚ¼¼Êõ¹ØÁª£¬ÌåÏÖ¹¥»÷Õß¿ÉÄÜͬʱÃé×¼Windows¶ËµãÖ´ÐÐÀÕË÷Èí¼þ£¬²¢ÀûÓÃLinux·þÎñÆ÷²¿ÊðºóÃźͼÓÃܿ󹤣¬Õë¶Ô´óÐÍÆóҵʵʩ¸´ºÏÐÍÍþв¡£
https://www.theregister.com/2024/09/13/hadooken_attacks_oracle_weblogic/
5. ºÚ¿ÍÀûÓÃAzure SharePoint©¶´µ¼ÖÂFortinet 440GBÊý¾Ýй¶
9ÔÂ12ÈÕ£¬ºÚ¿Í¡°Fortibitch¡±ÔÚµØÏÂÂÛ̳Breach ForumÉÏÉù³Æ´ÓÍøÂçÄþ¾²¾ÞÍ·FortinetµÄAzure SharePointʵÀýÖÐÇÔÈ¡ÁË440GBµÄÊý¾Ý£¬¸Ã©¶´±»ÃüÃûΪ¡°Fortileak¡±¡£ºÚ¿ÍÖ¸ÔðFortinetµÄAzure SharePoint̻¶²¢±»ÈëÇÖ£¬µ¼ÖÂÊý¾Ýй¶£¬²¢·ÖÏíÁË·ÃÎÊƾ֤ÒÔ±ãÏÂÔØÕâЩÊý¾Ý¡£ºÚ¿Í»¹Ìáµ½FortinetµÄCEOл¿Ï¾Ü¾øÁËÊê½ðÒªÇ󣬲¢¼¥Ð¦Æä̬¶È¡£Fortinet¹Ù·½»ØÓ¦³Æ£¬Ò»ÃûδÊÚȨ¸öÌå·ÃÎÊÁË´æ´¢ÔÚµÚÈý·½Ôƶ˹²ÏíÎļþÇý¶¯Æ÷ÉϵÄÓÐÏÞÎļþ£¬ÕâЩÎļþÉæ¼°¡°Ò»Ð¡²¿ÃÅ¡±¿Í»§Êý¾Ý£¬µ«¹«Ë¾ÔËÓª¡¢²úÎïºÍ·þÎñδÊÜÓ°Ï죬ÇÒÒÑÓë¿Í»§Ïàͬ¡£´ËÇ°£¬FortinetÒ²ÔâÓö¹ýÄþ¾²Ê¼þ£¬°üÂÞ±»ÀûÓÃÁãÈÕ©¶´ºÍFortiOS²Ù×÷ϵͳ©¶´µÄ¹¥»÷¡£Ä¿Ç°£¬´Ë´ÎÊý¾Ý鶵ÄÑÏÖØˮƽ¼°Êê½ð̸ÅнøÕ¹Éв»Ã÷ÀÊ£¬¿Í»§ºÍÍøÂçÄþ¾²ÁìÓòÕýÃÜÇйØ×¢ÊÂ̬Éú³¤¡£
https://hackread.com/fortinet-confirms-data-breach-hacker-data-leak/
6. DockerSpy£º×Ô¶¯É¨ÃèDocker Hub¾µÏñ£¬ÊØ»¤Ãô¸ÐÊý¾ÝÄþ¾²
9ÔÂ11ÈÕ£¬DockerSpy ÊÇÒ»¿îרΪ½â¾ö Docker ¾µÏñÖÐÃô¸ÐÊý¾Ýй¶ÎÊÌâ¶øÉè¼ÆµÄ¹¤¾ß£¬ËüÄÜ×Ô¶¯É¨Ãè Docker Hub ÉϵÄͼÏñ£¬¿ìËÙ¼ìË÷³ö°üÂÞÉí·ÝÑéÖ¤»úÃÜ¡¢Ë½Ô¿µÈÔÚÄÚµÄÃô¸ÐÐÅÏ¢¡£´´½¨Õß Alisson Moretto ÌåÏÖ£¬Ëæ×Å Docker ¾µÏñµÄ¹ã·ºÊ¹Óã¬ÓÈÆäÊǹ«¹²¾µÏñ¿âÖÐDZÔÚµÄÄþ¾²Òþ»¼ÈÕÒæ͹ÏÔ£¬DockerSpy µÄµ®ÉúÖ¼ÔÚÌṩһ²ãÌرðµÄÄþ¾²ÆÁÕÏ£¬×ÊÖú¿ª·¢Õß¼°Ê±·¢ÏÖ²¢Çå³ý¾µÏñÖеÄÃô¸ÐÊý¾Ý£¬ÔöÇ¿Äþ¾²ÐԺͺϹæÐÔ¡£DockerSpy µÄÆæÌØÓÅÊÆÔÚÓÚÆäÓë Docker Hub µÄÎ޷켯³É£¬ÊµÏÖÁË×Ô¶¯»¯ÌáÈ¡ºÍ·ÖÎö¾µÏñµÄ¹¦Ð§£¬ÎÞÐèÊÖ¶¯¸ÉÔ¤¡£ÆäÏȽøµÄɨÃèÒýÇæÄܹ»Ê¶±ð¶àÖÖÐÎʽµÄ»úÃÜÐÅÏ¢£¬ÎÞÂÛÊÇÓ²±àÂëµÄƾ֤»¹ÊÇÒþ²ØÔÚ´úÂë¼°»·¾³±äÁ¿ÖеÄÅÓ´óģʽ£¬¶¼ÄÜÓÐЧ²¶×½²¢Ïêϸ·ÖÎöDZÔÚ·çÏÕ¡£Ä¿Ç°£¬DockerSpy ÒÑÔÚ GitHub ÉÏ¿ª·ÅÏÂÔØ£¬¹©¿ª·¢ÕßÃâ·ÑʹÓá£
https://www.helpnetsecurity.com/2024/09/11/dockerspy-extract-sensitive-information-docker-hub-images/?web_view=true