標籤 0Day 下的所有文章

CNN出现XSS及Open Redirect安全漏洞

比翼鳥資訊 - 在天願作比翼鳥 在地願為連理枝

CNN出现XSS及Open Redirect安全漏洞

CNN (美国有线电视新闻网络) 出现一个安全漏洞,可被XSS及Open Redirect攻击利用。受到攻击之后,CNN采取措施检测Open Redirect 漏洞。这一措施在测试阶段表现良好。CNN的网站几乎不存在易受Open Redirect攻击的链接。但网站上仍有一个Open Redirect漏洞 未被修复。CNN.com曾于2013年受到Open Redirect的攻击,于2007年受到XSS攻击。该漏洞由新加坡南洋理工大学数学系安全研究人员王晶 (Wang Jing) 发现并报告。

world-wide-web

该 漏洞可在没有用户登录凭证的情况下被利用。作者称XSS漏洞在Ubuntu (14.04) 的Firefox (34.0) 以及Windows 7的 IE (9.0.15) 上进行了测试。Open Redirect漏洞在Windows 8的Chrome 32以及Mac OS X v10.7的 Safari 6.16上进行了测试。POC网址为https://www.youtube.com/watch?v=Cu47XiDV38M& feature=youtu.be;以及https://www.youtube.com/watch?v=FE8lhDvKGN0& feature=youtu.be。

http://ittechnology.lofter.com/post/1cfbf60d_5500e0b

View original post

CVE-2014-2452 Oracle Access Manager Webserver Plugin Subcomponent Unspecified Remote DoS Security Vulnerability

比翼鳥資訊 - 在天願作比翼鳥 在地願為連理枝

CVE-2014-2452 Oracle Access Manager Webserver Plugin Subcomponent Unspecified Remote DoS Security Vulnerability

cyber-security

Exploit Title: Oracle Access Manager Webserver Plugin Subcomponent Unspecified Remote DoS Security Vulnerability
Product: Access Manager component in Oracle Fusion Middleware
Vendor:    Oracle
Vulnerable Versions: 10.1.4.3, 11.1.1.3.0, 11.1.1.5.0, 11.1.1.7.0, 11.1.2.0.0, 11.1.2.1.0, and 11.1.2.2.0
Advisory Publication: Apr 15, 2014
Latest Update:    Apr 15, 2014
Vulnerability Type: Uncontrolled Resource Consumption [CWE-400]
CVE Reference: CVE-2014-2452
Risk Level: Medium
CVSS v2 Base Score: 4.0 (AV:N/AC:L/Au:S/C:P/I:N/A:N) (legend)
Solution Status: Fixed by Vendor
Credit: Wang Jing [MAS, SPMS, Nanyang Technological University (NTU), Singapore]

https://infoswift.wordpress.com/2015/01/12/cve-2014-2452-oracle-access-manager-webserver-plugin-subcomponent-unspecified-remote-dos/

View original post

एक अन्य Heartbleed?वेब सुरक्षा में पाया दोषों, Covert Redirect

比翼鳥資訊 - 在天願作比翼鳥 在地願為連理枝

एक अन्य Heartbleed?वेब सुरक्षा में पाया दोषों, Covert Redirect

इंटरनेट अब भी Heartbleed बग से जूझ रहा है, जबकि सुरक्षा प्रोटोकॉल OAuth 2.0 और OpenID में एक प्रमुख नए भेद्यता खोज की गई है.

internet-computer-security

सिंगापुर में नानयांग प्रौद्योगिकी विश्वविद्यालय की पीएचडी की छात्रा वांग जिंग हैकर्स उपयोगकर्ताओं को जानने के बिना प्रवेश जानकारी चोरी करने की कोशिश में फ़िशिंग तकनीक का उपयोग करने की अनुमति देता है कि एक बग देखा.

बग अनिवार्य रूप से साइबर अपराधी के बजाय डोमेन faking के अधिक आम रणनीति का एक फ़िशिंग पॉपअप सत्ता में असली वेबसाइट प्रमाणीकरण का उपयोग करने की अनुमति देता है.इस प्रक्रिया में, हैकर्स उपयोगकर्ता के लॉगिन क्रेडेंशियल प्राप्त होगा.

http://essayjeans.lofter.com/post/1cc7459a_43bf99e

View original post

พบช่องโหว่ความปลอดภัยในระบบล็อกอิน OAuth และ OpenID เว็บใหญ่โดนกันถ้วนหน้า, Covert Redirect

比翼鳥資訊 - 在天願作比翼鳥 在地願為連理枝

พบช่องโหว่ความปลอดภัยในระบบล็อกอิน OAuth และ OpenID เว็บใหญ่โดนกันถ้วนหน้า, Covert Redirect

Wang Jing นักศึกษาปริญญาเอกจาก Nanyang Technology University ในสิงคโปร์ ประกาศค้นพบช่องโหว่ในระบบล็อกอิน OAuth 2.0 และ OpenID ที่ส่งผลกระทบต่อเว็บไซต์ชื่อดังเป็นจำนวนมาก

binary

Jing เรียกช่องโหว่นี้ว่า “Covert Redirect" เพราะมันอาศัยการที่ระบบล็อกอินทั้งสองตัวจะยืนยันตัวตนผู้ใช้ แล้ว redirect ไปยังเว็บไซต์ปลายทาง แต่กลับไม่ตรวจสอบเว็บไซต์ปลายทางให้ดีก่อน จึงอาจถูก ใช้ในการปลอม redirect ไปยังเว็บไซต์ของผู้โจมตีแทนได้ (และเว็บไซต์ที่โจมตีจะได้ข้อมูลส่วนตัวจาก เว็บไซต์ต้นทางไป แล้วแต่สิทธิที่ผู้ใช้อนุญาตให้)

http://biboying.lofter.com/post/1cc9f4f5_43973bc

View original post

Xuất hiện lỗ hổng Covert Redirect, bản sao của “Trái tim rỉ máu"

比翼鳥資訊 - 在天願作比翼鳥 在地願為連理枝

Xuất hiện lỗ hổng Covert Redirect, bản sao của “Trái tim rỉ máu"

Một nghiên cứu sinh tại trường Đại học Công nghệ Nanyang (Singapore) vừa phát hiện một lỗ hổng bảo mật tồn tại trong phần mềm mã nguồn mở đang được rất nhiều website sử dụng. Thông tin mới nhất cho thấy lỗ hổng này ảnh hưởng đến cả Google, Facebook, Microsoft, LinkedIn, PayPal và một số công ty lớn khác.

Fast binary output

Wang Jing, nghiên cứu sinh tiến sĩ tại Đại học Công nghệ Nanyang là người phát hiện ra lỗ hổng đang tồn tại trong công cụ đăng nhập mã nguồn mở OAuth và OpenID. Wang Jing gọi lỗ hổng này là “Covert Redirect" (tạm dịch là Bí mật chuyển hướng). Hacker có thể gài mã độc ẩn dưới dạng một cửa sổ pop-up, hiện ra khi người dùng đăng nhập vào một website có lỗ hổng. Chẳng hạn như khi người dùng…

View original post 詳見內文:約36字