每日安全动态推送(9-12)

文摘   科技   2024-09-12 18:27   北京  
Tencent Security Xuanwu Lab Daily News

• CVE-2024-25282 - RedSys - 3DSecure 2.0 is vulnerable to Cross-Site Scripting (XSS) in its 3DSMethod Authentication:
https://seclists.org/fulldisclosure/2024/Sep/27

   ・ 3DSecure 2.0存在跨站脚本攻击(XSS)漏洞,攻击者可以利用该漏洞修改请求URL中的参数,注入恶意代码。该漏洞的详细分析和攻击示例在文章中有所介绍。  – SecTodayBot


• 微软计划将网络安全厂商踢出Windows内核?:
https://sectoday.tencent.com/api/article/Gpp935EBMw8bedWYd_ph/link

   ・ 微软举办了Windows终端安全生态系统峰会,讨论了由于CrowdStrike全球宕机事件导致的蓝屏死机问题。会议涉及了安全性和恢复能力的提升,以及对内核访问的限制可能带来的影响 – SecTodayBot


• LNK Stomping (CVE-2024-38217): Microsoft Patches Years-Old Zero-Day Flaw:
https://securityonline.info/lnk-stomping-cve-2024-38217-microsoft-patches-years-old-zero-day-flaw/

   ・ 微软在2024年9月的安全更新中解决了影响Smart App Control和SmartScreen的零日漏洞CVE-2024-38217。该漏洞被命名为“LNK stomping”,自2018年以来一直受到黑客的积极利用 – SecTodayBot


• TomcatScanPro:
https://sectoday.tencent.com/api/article/ZDwv4pEBcIs5GCTM-ToS/link

   ・ 介绍了一款针对Tomcat服务的弱口令检测、漏洞检测以及本地文件包含攻击工具。 – SecTodayBot


• Dissecting the CVE-2024-38106 Fix:
https://www.pixiepointsecurity.com/blog/nday-cve-2024-38106/

   ・ 分析了微软的CVE-2024-38106安全补丁以及特定漏洞的利用 – SecTodayBot


• We Spent $20 To Achieve RCE And Accidentally Became The Admins Of .MOBI:
https://labs.watchtowr.com/we-spent-20-to-achieve-rce-and-accidentally-became-the-admins-of-mobi/

   ・ 披露了一个关于. MOBI TLD的WHOIS服务器漏洞和对整个.mobi TLD的CA流程的影响。研究人员详细分析了该漏洞是如何被利用来破坏.mobi TLD的CA流程,并提供了漏洞利用或POC。 – SecTodayBot


• Preventing “Certified Pre-Owned” Attacks, using RPC-Firewall, LDAP-Firewall and Network Segmentation:
https://zeronetworks.com/blog/preventing-certified-pre-owned-attacks-using-rpc-firewall-ldap-firewall-and-network-segmentation

   ・ 讨论了对Active Directory Certificate Services的攻击,并指出了在防范或检测这些攻击方面所面临的挑战。 – SecTodayBot


* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab


腾讯玄武实验室
腾讯玄武实验室官方微信公众号
 最新文章