标签

 cve 

相关的文章:

本列表页提供关于CVE漏洞的安全通告和分析,包括后门漏洞和权限提升漏洞等。了解最新的漏洞情报和安全分析,保护您的系统和数据安全。

Spring

Spring -

Spring Framework 6.1.6, 6.0.19 and 5.3.34 Available Now Including Fixes for CVE-2024-22262

On behalf of the team and everyone who has contributed, I am pleased to announce that Spring Framework 6.1.6, 6.0.19 and 5.3.34 are available now: Spring Framework 6.1.6 ships with 41 fixes and documentation improvements. This version will be shipped with Spring Boot 3.2.5, to be released next week. Spring Framework 6.0.19 ships with 14 fixes and documentation improvements. This version will be shipped with Spring Boot 3.1.11, to be released next week. Spring Framework 5.3.34 ships with 10 fixes and documentation improvements. The releases address CVE-2024-22262 for "URL Parsing with Host Validation (3rd report)". Important CVEs on popular projects, like the original CVE-2024-22243, often get attention from the security community. We received many reports and helpful feedback about new attack variants over the last weeks. The security of Spring applications is our priority and we will keep addressing vulnerabilities in a transparent and timely fashion. We are actively working on a new approach that will completely revisit the implementation. Upgrading your project Commercial customers using Spring Boot 2.7 or 3.0 can make use of Spring Boot Hotfix releases 2.7.20.3 and 3.0.15.3. Releases are available now on the Spring commercial artifact repository and can be accessed with a Spring Enterprise Subscription. Commercial customers and OSS users of Spring Boot 3.1 and 3.2 should manually upgrade to Spring Framework 6.0.19 and 6.1.6 now, and to Spring Boot 3.1.11 and 3.2.5 next week when those become available. Project Page | GitHub | Issues | Documentation

Spring Framework 6.1.6, 6.0.19, and 5.3.34 are now available to fix a security vulnerability. Upgrades are recommended for Spring Boot users.

相关推荐 去reddit讨论
Rust Blog

Rust Blog -

Security advisory for the standard library (CVE-2024-24576)

The Rust Security Response WG was notified that the Rust standard library did not properly escape arguments when invoking batch files (with the bat and cmd extensions) on Windows using the Command API. An attacker able to control the arguments passed to the spawned process could execute arbitrary shell commands by bypassing the escaping. The severity of this vulnerability is critical if you are invoking batch files on Windows with untrusted arguments. No other platform or use is affected. This vulnerability is identified by CVE-2024-24576. Overview The Command::arg and Command::args APIs state in their documentation that the arguments will be passed to the spawned process as-is, regardless of the content of the arguments, and will not be evaluated by a shell. This means it should be safe to pass untrusted input as an argument. On Windows, the implementation of this is more complex than other platforms, because the Windows API only provides a single string containing all the arguments to the spawned process, and it's up to the spawned process to split them. Most programs use the standard C run-time argv, which in practice results in a mostly consistent way arguments are splitted. One exception though is cmd.exe (used among other things to execute batch files), which has its own argument splitting logic. That forces the standard library to implement custom escaping for arguments passed to batch files. Unfortunately it was reported that our escaping logic was not thorough enough, and it was possible to pass malicious arguments that would result in arbitrary shell execution. Mitigations Due to the complexity of cmd.exe, we didn't identify a solution that would correctly escape arguments in all cases. To maintain our API guarantees, we improved the robustness of the escaping code, and changed the Command API to return an InvalidInput error when it cannot safely escape an argument. This error will be emitted when spawning the process. The fix will be included in Rust 1.77.2, to be released later today. If you implement the escaping yourself or only handle trusted inputs, on Windows you can also use the CommandExt::raw_arg method to bypass the standard library's escaping logic. Affected Versions All Rust versions before 1.77.2 on Windows are affected, if your code or one of your dependencies executes batch files with untrusted arguments. Other platforms or other uses on Windows are not affected. Acknowledgments We want to thank RyotaK for responsibly disclosing this to us according to the Rust security policy, and Simon Sawicki (Grub4K) for identifying some of the escaping rules we adopted in our fix. We also want to thank the members of the Rust project who helped us disclose the vulnerability: Chris Denton for developing the fix; Mara Bos for reviewing the fix; Pietro Albini for writing this advisory; Pietro Albini, Manish Goregaokar and Josh Stone for coordinating this disclosure; Amanieu d'Antras for advising during the disclosure.

Rust标准库在Windows上使用Command API调用批处理文件时存在漏洞,攻击者可以通过绕过转义来执行任意命令。修复将在Rust 1.77.2中发布。

相关推荐 去reddit讨论
The GitHub Blog

The GitHub Blog -

Security research without ever leaving GitHub: From code scanning to CVE via Codespaces and private vulnerability reporting

This blog post is an in-depth walkthrough on how we perform security research leveraging GitHub features, including code scanning, CodeQL, and Codespaces. The post Security research without ever leaving GitHub: From code scanning to CVE via Codespaces and private vulnerability reporting appeared first on The GitHub Blog.

GitHub Security Lab利用GitHub产品和功能进行安全研究,使用代码扫描、CodeQL、Codespaces和私有漏洞报告等工具发现、验证和披露开源软件中的漏洞。他们还介绍了代码搜索功能和OpenSSF的关键性评分,以及Code scanning、CodeQL和GitHub Codespaces的使用。GitHub作为安全研究的重要资源,提供一站式解决方案来识别和解决潜在的安全威胁。

相关推荐 去reddit讨论
FreeBuf网络安全行业门户

FreeBuf网络安全行业门户 -

相关推荐 去reddit讨论
绿盟科技技术博客

绿盟科技技术博客 -

JumpServer远程代码执行漏洞(CVE-2024-29201/CVE-2024-29202)通告

近日,绿盟科技CERT监测到JumpServer发布安全公告,修复了两个远程代码执行漏洞。

绿盟科技CERT监测到JumpServer发布安全公告,修复了两个远程代码执行漏洞。漏洞影响版本为0.0 <= JumpServer <= 3.10.6,官方已在最新版本中修复。受影响用户应尽快升级版本或关闭作业中心功能进行临时缓解。

相关推荐 去reddit讨论
绿盟科技技术博客

绿盟科技技术博客 -

XZ-Utils工具库后门漏洞(CVE-2024-3094)通告

近日,绿盟科技CERT监测到安全社区披露XZ-Utils工具库存在后门漏洞(CVE-2024-3094),CVSS评分10。

绿盟科技CERT监测到XZ-Utils工具库存在后门漏洞,攻击者可绕过SSH认证获得未授权访问权限。建议用户降级至5.4或之前版本或替换为其他组件。

相关推荐 去reddit讨论
程序人生

程序人生 -

CVE-2024-28085 Improper Neutralization of Escape Sequences in Wall

CVE-2024-28085 Improper Neutralization of Escape Sequences in Wall

CVE-2024-28085是Linux中的“wall”命令的漏洞,允许窃取管理员密码。该漏洞存在已久,可在Ubuntu 22.04上复现,但不影响Ubuntu上的GNOME终端。通过使用“wall”命令广播精心制作的消息,可以利用该漏洞欺骗用户认为其密码输入不正确并捕获密码。该漏洞可用于监视SSH登录并替换剪贴板数据。

相关推荐 去reddit讨论
解道jdon.com

解道jdon.com -

所有Linux发行版被XZ压缩工具植入了后门: CVE-2024-3094

广泛使用的 xz 数据压缩工具和 liblzma 库的最新版本中发现了严重的安全漏洞: CVE-2024-3094,似乎源于不良行为者故意将恶意代码插入上游 xz 工具套件存储库中。xz压缩工具套件提供无损数据压缩功能,在 Linux 发行版和 macOS 系统中非常流行,用于压缩软件包、发布 tarball、内核映像等。这种普遍性使得该后门的影响尤为严重。受影响的版本是 xz 压缩工具的 xz 5.6.0 和 5.6.1 以及它们链接的 liblzma 核心压缩库。这些版本在源发布 tarball 中包含混淆的恶意代码,而公共 Git 存储库中不存在这些代码。这个后门代码旨在在使用受感染的

最新版本的Linux发行版发现了严重的安全漏洞,源于恶意代码被插入了XZ压缩工具和liblzma库。该后门会干扰Linux系统上的OpenSSH服务器的身份验证,并可能启用远程代码执行功能。受影响的发行版有Fedora、Debian、Kali Linux等。用户应立即安装更新的XZ软件包或降级到未受影响的版本来修复此漏洞。

相关推荐 去reddit讨论
GitLab

GitLab -

Important information regarding xz-utils (CVE-2024-3094)

GitLab is aware of CVE-2024-3094, where malicious code was back-doored into the xz-utils lossless compression software suite, affecting xz-utils Versions 5.6.0 and 5.6.1. Upon investigation, GitLab determined that it does not use the affected software version for GitLab.com, GitLab Dedicated, or default self-hosted software packages. GitLab self-hosted customers should check locally installed packages to ensure that they do not have the packages xz or xz-utils Versions 5.6.0 or 5.6.1 installed. If it is installed, it may be safer to downgrade them to 5.4.x until the vendor provides a safe version, or confirms the latest versions are not affected. If possible, the hosts and containers with the potentially malicious version should be brought down and replaced in case they have been compromised. Microsoft-owned GitHub has since disabled the XZ Utils repository maintained by the Tukaani Project "due to a violation of GitHub's terms of service."

GitLab发现了CVE-2024-3094漏洞,影响了xz-utils版本5.6.0和5.6.1。GitLab.com、GitLab Dedicated和默认自托管软件包不受影响。自托管的GitLab客户应检查本地安装的软件包,确保没有安装受影响版本的xz或xz-utils软件包。如有安装,应降级到5.4.x版本,或等待供应商提供安全版本。GitHub已禁用Tukaani Project维护的XZ Utils存储库。

相关推荐 去reddit讨论
绿盟科技技术博客

绿盟科技技术博客 -

Linux内核权限提升漏洞(CVE-2024-1086)通告

近日,绿盟科技CERT监测网上有研究员公开披露了一个Linux内核权限提升漏洞(CVE-2024-1086)的细节信息与验证工具。

绿盟科技CERT监测到Linux内核权限提升漏洞(CVE-2024-1086),存在于netfilter:nf_tables组件中,允许本地攻击者提升权限至root。已有PoC公开,请尽快采取防护措施。受影响版本为15<= Linux kernel <= 6.8-rc1,已知Redhat、Ubuntu、Debia等Linux发行版受影响。官方已升级内核版本修复漏洞,用户可通过官方下载链接更新。如无法更新,可采取其他防护措施。

相关推荐 去reddit讨论

热榜 Top10

最近读过

  1. 绿盟科技威胁周报(2023.03.20-2023.03.26) - 约读过
  2. 奇趣周刊 Vol.40 - 约读过
  3. Yarp 与 Nginx性能大比拼不出所料它胜利了! - 约读过
  4. 为值得的人付出 - 约读过
  5. 注意!高级威胁组织APT-C-36正在活跃 - 约读过
  6. 对话李彦宏:AI 大模型时代,应用开发机会比移动互联网大十 - 约读过
  7. LinkedIn关停中国业务“领英职场” - 约读过
  8. AIOps在美团的探索与实践——事件管理篇 - 约读过
  9. 高保真神经图像压缩的语义集成损失和潜在精炼 - 约读过
  10. Fusing MongoDB and Databricks to Deliver AI-Augmented Search - 约读过
eolink
eolink
Dify.AI
Dify.AI
观测云
观测云
LigaAI
LigaAI

推荐或自荐