每日安全动态推送(9-12)
2024-9-12 18:27:46 Author: mp.weixin.qq.com(查看原文) 阅读量:0 收藏

Tencent Security Xuanwu Lab Daily News

• CVE-2024-25282 - RedSys - 3DSecure 2.0 is vulnerable to Cross-Site Scripting (XSS) in its 3DSMethod Authentication:
https://seclists.org/fulldisclosure/2024/Sep/27

   ・ 3DSecure 2.0存在跨站脚本攻击(XSS)漏洞,攻击者可以利用该漏洞修改请求URL中的参数,注入恶意代码。该漏洞的详细分析和攻击示例在文章中有所介绍。  – SecTodayBot

• 微软计划将网络安全厂商踢出Windows内核?:
https://sectoday.tencent.com/api/article/Gpp935EBMw8bedWYd_ph/link

   ・ 微软举办了Windows终端安全生态系统峰会,讨论了由于CrowdStrike全球宕机事件导致的蓝屏死机问题。会议涉及了安全性和恢复能力的提升,以及对内核访问的限制可能带来的影响 – SecTodayBot

• LNK Stomping (CVE-2024-38217): Microsoft Patches Years-Old Zero-Day Flaw:
https://securityonline.info/lnk-stomping-cve-2024-38217-microsoft-patches-years-old-zero-day-flaw/

   ・ 微软在2024年9月的安全更新中解决了影响Smart App Control和SmartScreen的零日漏洞CVE-2024-38217。该漏洞被命名为“LNK stomping”,自2018年以来一直受到黑客的积极利用 – SecTodayBot

• TomcatScanPro:
https://sectoday.tencent.com/api/article/ZDwv4pEBcIs5GCTM-ToS/link

   ・ 介绍了一款针对Tomcat服务的弱口令检测、漏洞检测以及本地文件包含攻击工具。 – SecTodayBot

• Dissecting the CVE-2024-38106 Fix:
https://www.pixiepointsecurity.com/blog/nday-cve-2024-38106/

   ・ 分析了微软的CVE-2024-38106安全补丁以及特定漏洞的利用 – SecTodayBot

• We Spent $20 To Achieve RCE And Accidentally Became The Admins Of .MOBI:
https://labs.watchtowr.com/we-spent-20-to-achieve-rce-and-accidentally-became-the-admins-of-mobi/

   ・ 披露了一个关于. MOBI TLD的WHOIS服务器漏洞和对整个.mobi TLD的CA流程的影响。研究人员详细分析了该漏洞是如何被利用来破坏.mobi TLD的CA流程,并提供了漏洞利用或POC。 – SecTodayBot

• Preventing “Certified Pre-Owned” Attacks, using RPC-Firewall, LDAP-Firewall and Network Segmentation:
https://zeronetworks.com/blog/preventing-certified-pre-owned-attacks-using-rpc-firewall-ldap-firewall-and-network-segmentation

   ・ 讨论了对Active Directory Certificate Services的攻击,并指出了在防范或检测这些攻击方面所面临的挑战。 – SecTodayBot

* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab


文章来源: https://mp.weixin.qq.com/s?__biz=MzA5NDYyNDI0MA==&mid=2651959791&idx=1&sn=339296f500b1f50d2b2b23d915283b81&chksm=8baed170bcd958660198e262c7a74bfac2c9839656f83a0a82cbd1c31a1ed54393b7e66ac72d&scene=58&subscene=0#rd
如有侵权请联系:admin#unsafe.sh