Tencent Security Xuanwu Lab Daily News
• [CTF] CVE-2022-0185 – Winning a $31337 Bounty after Pwning Ubuntu and Escaping Google’s KCTF Containers:
https://www.willsroot.io/2022/01/cve-2022-0185.html
・ 利用 CVE-2022-0185 攻击 Ubuntu,逃逸 Google KCTF 容器沙盒
– Jett
• [Tools] 鲨鱼的狂欢 — APT-C-55 Kimsuky组织近期BabyShark组件披露:
https://mp.weixin.qq.com/s/ZV8AOTd7YGUgCTTTZtTktQ
・ 鲨鱼的狂欢 — APT-C-55 Kimsuky组织近期BabyShark组件披露
– lanying37
• [Fuzzing] A Story of a Bug Found Fuzzing:
https://microsoftedge.github.io/edgevr/posts/a-story-of-a-bug-found-fuzzing/
・ Edge 开发团队基于 MSRC cases 编写 Fuzzer 挖掘漏洞
– Jett
• CVE-2022-26134: A look into bypass isSafeExpression check in Confluence Preauth RCE | Quang Vo:
https://mr-r3bot.github.io/research/2022/06/06/Confluence-Preauth-RCE-2022.html
・ Confluence Preauth RCE isSafeExpression 检查绕过漏洞的分析(CVE-2022-26134)
– Jett
• [Linux] [PDF] https://www.usenix.org/system/files/sec22fall_zeng.pdf:
https://www.usenix.org/system/files/sec22fall_zeng.pdf
・ Playing for K(H)eaps – Linux 内核堆利用技术的稳定性研究(Paper)
– Jett
• Presentations/2022-hardwear-io-bd-jb.pdf at master · TheOfficialFloW/Presentations · GitHub:
https://github.com/TheOfficialFloW/Presentations/blob/master/2022-hardwear-io-bd-jb.pdf
・ 在 Hardwear.io 安全会议上,研究员 theflow0 分享了他利用 Blu-ray 蓝光光碟攻击面攻击 PS5 的细节
– Jett
• [Tools, iOS] Mobile forensic & network analysis:
https://piroguetoolsuite.github.io/
・ PiRogue – 一款开源的手机取证和流量分析套件
– Jett
• [Mitigation] How AUTOSLAB Changes the Memory Unsafety Game:
https://grsecurity.net/how_autoslab_changes_the_memory_unsafety_game
・ AUTOSLAB – 基于对象类型设计内存分配隔离缓存,缓解内存漏洞破坏的利用
– Jett
• [Web] How I found a Critical Bug in Instagram and Got 49500$ Bounty From Facebook | by Neeraj Sharma | Jun, 2022 | Medium:
https://medium.com/@root.n33r4j/how-i-found-a-critical-bug-in-instagram-and-got-49500-bounty-from-facebook-626ff2c6a853
・ Instagram 任意用户缩略图修改漏洞
– Jett
* 查看或搜索历史推送内容请访问:
https://sec.today
* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab
原文始发于微信公众号(腾讯玄武实验室):每日安全动态推送(06-13)