每日安全动态推送(11-29)
2023-11-29 12:3:27 Author: mp.weixin.qq.com(查看原文) 阅读量:5 收藏

Tencent Security Xuanwu Lab Daily News

• CVE-2023-49145: Apache NiFi: Improper Neutralization of Input in Advanced User Interface for Jolt:
https://seclists.org/oss-sec/2023/q4/240

   ・ Apache NiFi 0.7.0至1.23.2版本存在DOM型跨站脚本漏洞,攻击者可通过精心构造的URL在认证用户会话中执行任意JavaScript代码。 – SecTodayBot

• A Deep Dive into our Storage Layout Extractor:
https://blog.smlxl.io/a-deep-dive-into-our-storage-layout-extractor-51554185d8af

   ・ 分享了如何构建一个工具以在没有源代码的情况下恢复solc编译合约的存储布局 – SecTodayBot

• A Look at IPStorm - Cross-Platform Malware Written in Go:
https://maldbg.com/ipstorm-golang-malware-windows

   ・ 该文章介绍了IPStorm木马的文件详细信息和主要功能,包括绕过杀毒软件、安装和持久化、使用Powershell等特点。 – SecTodayBot

• ArchitectureSpecificsMemo:
https://wiki.debian.org/ArchitectureSpecificsMemo

   ・ 这篇文章主要介绍了Debian项目中架构的一些具体细节,包括对齐、浮点数、C/C++预处理符号、有符号性等,并提供了获取这些信息的方法。 – SecTodayBot

• Re: CVE-2023-34059 - File Descriptor Hijack vulnerability in open-vm-tools:
https://seclists.org/oss-sec/2023/q4/236

   ・ 发现open-vm-tools中的文件描述符劫持漏洞 – SecTodayBot

• ShellcodeStdio:
https://winternl.com/shellcodestdio/

   ・ 使用ShellcodeStdio框架编写优化的、位置无关的x86和x64 shellcode。 – SecTodayBot

• Writing a Debugger From Scratch - DbgRs Part 3 - Reading Memory:
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-3/

   ・ 学习编写调试器的教程 – SecTodayBot

* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab


文章来源: https://mp.weixin.qq.com/s?__biz=MzA5NDYyNDI0MA==&mid=2651959440&idx=1&sn=e5603169a26695bf87a74cccf1f79496&chksm=8baed00fbcd959197111ae703b1d5fb55dbaa569a967298fa578a5417f9a161b417f7761f125&scene=58&subscene=0#rd
如有侵权请联系:admin#unsafe.sh