每日安全动态推送(3-8)
2024-3-8 09:13:58 Author: mp.weixin.qq.com(查看原文) 阅读量:4 收藏

Tencent Security Xuanwu Lab Daily News

• oss-security - Django: CVE-2024-27351: Potential regular expression denial-of-service in django.utils.text.Truncator.words():
https://www.openwall.com/lists/oss-security/2024/03/04/1

   ・ Django发布了安全更新,修复了CVE-2024-27351潜在的正则表达式拒绝服务攻击漏洞。  – SecTodayBot

• GLiNet - Router Authentication Bypass:
https://dlvr.it/T3jGqZ

   ・ GLiNet路由器固件存在认证绕过漏洞(CVE-2023-46453),攻击者可以利用该漏洞绕过认证并获取路由器的Web界面访问权限。文章详细分析了漏洞的根本原因,包括/usr/sbin/gl-ngx-session文件中缺乏适当的身份验证检查,导致认证绕过漏洞。 – SecTodayBot

• AI in Cybersecurity — A CISO’s Perspective:
https://www.paloaltonetworks.com/blog/2024/03/ai-in-cybersecurity-a-cisos-perspective/

   ・ 人工智能对当前和未来网络安全形势的影响。  – SecTodayBot

• Mhf - Mobile Helper Framework - A Tool That Automates The Process Of Identifying The Framework/Technology Used To Create A Mobile Application:
https://dlvr.it/T3gDP9

   ・ Mobile Helper Framework是一款自动识别移动应用程序所使用的框架/技术的工具。 – SecTodayBot

• Smishing with EvilGophish:
https://fin3ss3g0d.net/index.php/2024/03/04/smishing-with-evilgophish/

   ・ 本文介绍了一种名为Smishing的网络安全攻击技术,以及一款名为EvilGophish的工具,用于模拟Smishing攻击。EvilGophish可以帮助安全团队和渗透测试人员在受控环境中模拟复杂的Smishing攻击,有助于组织更好地准备其防御措施、教育员工,并减轻Smishing攻击带来的风险。  – SecTodayBot

• Free Micropatches For Microsoft Access Forced Authentication Through Firewall (0day):
https://blog.0patch.com/2023/11/free-micropatches-for-microsoft-access.html?m=1

   ・ Microsoft Access存在一项新的漏洞,允许攻击者通过向其中插入远程SQL Server数据库链接来获取受害者的NTLM哈希。文章详细分析了漏洞的根本原因,揭示了该漏洞可能对安全性造成的影响。  – SecTodayBot

• Protecting the Phoenix: Unveiling Critical Vulnerabilities in Phoenix Contact HMI – Part 1:
https://nozominetworks.com/blog/14-vulnerabilities-discovered-in-phoenix-contact-hmis

   ・ 揭露了Phoenix Contact Web Panel 6121-WXPS设备存在的14个漏洞,并详细分析了发现的关键漏洞,该漏洞使攻击者能够在未经身份验证的情况下执行具有根权限的任意命令。此外,文章还介绍了使用默认SSH凭据和公开可用工具来生成几乎与原始代码相同的NodeJS源代码,以及发现关键漏洞的过程。 – SecTodayBot

• Static Analysis Automation for Hunting Vulnerable Kernel Drivers:
https://speakerdeck.com/takahiro_haruyama/static-analysis-automation-for-hunting-vulnerable-kernel-drivers

   ・ 作者介绍了一种自动化搜索易受攻击的WDM/WDF驱动程序的新方法,以及发现了34个存在固件访问漏洞的驱动程序,其中6个允许内核内存访问。 – SecTodayBot

* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab


文章来源: https://mp.weixin.qq.com/s?__biz=MzA5NDYyNDI0MA==&mid=2651959549&idx=1&sn=01cc31fbae65093a8514fcbc0ab3122a&chksm=8baed062bcd95974ed4cecf2ef34d9a8eff45f01a810c6feeb619e6b9dc5fed9c4b46d411a83&scene=58&subscene=0#rd
如有侵权请联系:admin#unsafe.sh