每日安全资讯-2020.5.12

声明:本文所有内容仅用于学习和研究目的,且不能违反《网络安全法》、《刑法》等相关要求,尤其禁止传播,或用于非善良目的。您查看本文,即视为遵守以上约定,否则责任自负。

今日导读:Cerberus和Anubis Android银行木马活动针对土耳其、最近9年中售出的所有配备Thunderbolt的计算机存在7种新漏洞、Netflix titus SSTI PoC、有关在野外利用的Oracle WebLogic漏洞CVE-2020-2883的详细信息、Active Resource存在信息泄露漏洞、门神WAF众测总结、RoguePotato/BadPotato windows提权工具等。

【病毒区】
1、Astaroth — Maze of obfuscation and evasion reveals dark stealer

2、Turkey targeted by Cerberus and Anubis Android banking Trojan campaigns

【漏洞分析区】
3、7 New Flaws Affect All Thunderbolt-equipped Computers Sold in the Last 9 Years
https://thunderspy.io/

4、CVE-2018-8611 Exploiting Windows KTM Part 3/5 – Triggering the race condition and debugging tricks

5、CVE-2020-9297 Netflix titus SSTI PoC

6、Details on the Oracle WebLogic Vulnerability Being Exploited in the Wild(CVE-2020-2883)

7、Possible information disclosure issue in Active Resource(CVE-2020-8151)

8、Server-Side template injection in Apache Syncope (RCE) - CVE-2020-1959

9、EL expression input sanitation bypass in Hibernate Validator - CVE-2020-10693

【技术分享区】
10、门神WAF众测总结

11、No more JuicyPotato? Old story, welcome RoguePotato!

12、BadPotato:Windows 权限提升

13、空指针-Base on windows Writeup – 最新版DZ3.4实战渗透
https://paper.seebug.org/1197/

14、Bypass Instagram SSL Certificate Pinning for iOS

15、Explaining nanomites on Linux, an advanced anti debug technique also used by Armadillo

16、How I made 10K in bug bounties from GitHub secret leaks

17、Seeing (Mail)Demons? Technique, Triggers, and a Bounty

#工具#Proof of concept code to exploit CVE-2020-12116: Unauthenticated arbitrary file read on ManageEngine OpManger.

2 1