每日安全动态推送(10-23)
2023-10-23 11:57:24 Author: mp.weixin.qq.com(查看原文) 阅读量:2 收藏

Tencent Security Xuanwu Lab Daily News

• LLM Security Series - Prompt Injection:
https://r0075h3ll.github.io/LLM-Security-Series-02/

   ・ 这篇文章介绍了Prompt Injection以及对其进行的潜在和实施的防御措施。 – SecTodayBot

• GHSL-2023-108: GitHub Actions command injection in Stash:
https://securitylab.github.com/advisories/GHSL-2023-108_Stash/

   ・ Stash存储库中的Actions命令注入漏洞(GHSL-2023-108)可能导致工作流程秘密被窃取和存储库修改 – SecTodayBot

• GitHub - cyber-defence-campus/droneRemoteIDSpoofer: Python script to broadcast spoofed drone Remote IDs following the ASD-STAN and proprietart DJI format.:
https://github.com/cyber-defence-campus/droneRemoteIDSpoofer

   ・ 这个Python脚本可以通过Wifi欺骗无人机的远程ID,支持ASD-STAN格式,例如Parrot无人机使用。它可以欺骗单个或多个无人机,在随机位置或特定区域内。 – SecTodayBot

• CVE-2023-31122: Apache HTTP Server: mod_macro buffer over-read:
https://seclists.org/oss-sec/2023/q4/149

   ・ Apache HTTP服务器存在mod_macro缓冲区溢出漏洞(CVE-2023-31122),影响版本为2.4.57及之前 – SecTodayBot

• CVE-2023-25753: Server-Side Request Forgery in Apache ShenYu:
https://seclists.org/oss-sec/2023/q4/148

   ・ Apache ShenYu存在SSRF漏洞(CVE-2023-25753),攻击者可通过请求URL参数操控任意请求,包括HTTP方法、Cookie、IP地址和头部信息。  – SecTodayBot

• WPS WebShape 漏洞及利用分析:
https://paper.seebug.org/3055/

   ・ WPS Office存在代码执行漏洞,攻击者通过插入浏览器对象WebShape实现文件下载和执行,利用白名单绕过访问网页 – SecTodayBot

• Advanced fuzzing unmasks elusive vulnerabilities:
https://www.srlabs.de/blog-post/advanced-fuzzing-unmasks-elusive-vulnerabilities

   ・ Fuzz测试是现代软件保障的主要组成部分,但某些漏洞对Fuzzing仍然具有难度。本文展示了如何通过AFL++来发现一种在libwebp中被利用的零日漏洞,该漏洞未被Google的OSS-Fuzz等广泛使用的Fuzzing工具检测到。 – SecTodayBot

• How Fraudsters Execute Account Opening Abuse:
https://www.akamai.com/blog/security/2023/oct/how-fraudsters-execute-account-opening-abuse

   ・ 网络威胁行为者经常针对热门网站大量开设虚假账户,这被称为“账户开设滥用”。本文将探讨欺诈者如何实施账户开设滥用和攻击,以及其对数字商务、社交媒体和银行等平台的危害行为。 – SecTodayBot

* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab


文章来源: https://mp.weixin.qq.com/s?__biz=MzA5NDYyNDI0MA==&mid=2651959394&idx=1&sn=3180bb02447111cf561423ec7cef065c&chksm=8baed0fdbcd959eb7f269d558996c703e2e415eb8a59a61403d100e7f5cc92175f46bc09044b&scene=58&subscene=0#rd
如有侵权请联系:admin#unsafe.sh