{"id":1178,"date":"2023-02-17T07:50:10","date_gmt":"2023-02-16T23:50:10","guid":{"rendered":"https:\/\/www.aqwu.net\/wp\/?p=1178"},"modified":"2023-02-17T07:50:10","modified_gmt":"2023-02-16T23:50:10","slug":"2022%e5%b9%b4-10%e5%a4%a7%e7%bd%91%e7%bb%9c%e9%bb%91%e5%ae%a2%e6%8a%80%e6%9c%af","status":"publish","type":"post","link":"https:\/\/www.aqwu.net\/wp\/?p=1178","title":{"rendered":"2022\u5e74 10\u5927\u7f51\u7edc\u9ed1\u5ba2\u6280\u672f"},"content":{"rendered":"\n<p>\u6b22\u8fce\u6765\u5230 2022\u5e7410\u5927\u7f51\u7edc\u9ed1\u5ba2\u6280\u672f\uff0c\u8fd9\u662f\u6211\u4eec\u5e74\u5ea6\u793e\u533a\u652f\u6301\u5de5\u4f5c\u7684<a rel=\"noreferrer noopener\" href=\"https:\/\/portswigger.net\/research\/top-10-web-hacking-techniques\" target=\"_blank\">\u7b2c 16 \u7248<\/a>\uff0c\u65e8\u5728\u786e\u5b9a\u53bb\u5e74\u53d1\u8868\u7684\u6700\u91cd\u8981\u548c\u6700\u5177\u521b\u65b0\u6027\u7684\u7f51\u7edc\u5b89\u5168\u7814\u7a76\u3002<\/p>\n\n\n\n<p>\u539f\u6587\u94fe\u63a5\uff1ahttps:\/\/portswigger.net\/research\/top-10-web-hacking-techniques-of-2022<\/p>\n\n\n\n<p>\u81ea 46 \u6708\u4efd\u53d1\u5e03\u63d0\u540d<a rel=\"noreferrer noopener\" href=\"https:\/\/portswigger.net\/research\/top-10-web-hacking-techniques-of-2022-nominations-open\" target=\"_blank\">\u5f81\u96c6<\/a>\u4ee5\u6765\uff0c\u60a8\u5df2\u7ecf\u63d0\u4ea4\u4e86\u521b\u7eaa\u5f55\u7684 15 \u9879\u63d0\u540d\uff0c\u5e76\u6295\u7968\u9009\u51fa\u4e86 15 \u540d\u6700\u540e\u4e00\u8f6e\u5019\u9009\u4eba\u3002\u5728\u8fc7\u53bb\u7684\u4e24\u5468\u91cc\uff0c\u4e00\u4e2a\u7531\u7814\u7a76\u4eba\u5458<a rel=\"noreferrer noopener\" href=\"https:\/\/twitter.com\/Agarri_FR\" target=\"_blank\">\u5c3c\u53e4\u62c9\u65af\u00b7\u683c\u96f7\u74dc\u5c14<\/a>\u3001<a rel=\"noreferrer noopener\" href=\"https:\/\/twitter.com\/irsdl\" target=\"_blank\">\u7d22\u9c81\u4ec0\u00b7\u8fbe\u5229<\/a>\u5229\u3001<a rel=\"noreferrer noopener\" href=\"https:\/\/twitter.com\/filedescriptor\" target=\"_blank\">Filedescriptor<\/a>\u00a0\u548c<a rel=\"noreferrer noopener\" href=\"https:\/\/twitter.com\/albinowax\" target=\"_blank\">\u6211\u7ec4\u6210\u7684<\/a>\u4e13\u5bb6\u5c0f\u7ec4\u5bf9 10 \u540d\u51b3\u8d5b\u5165\u56f4\u8005\u8fdb\u884c\u4e86\u5206\u6790\u3001\u6388\u4e88\u548c\u6295\u7968\uff0c\u4e3a\u60a8\u5e26\u6765\u4e86 2022 \u5e74\u6700\u7ec8\u7684 10 \u5927\u65b0\u7f51\u7edc\u9ed1\u5ba2\u6280\u672f\u3002\u50cf\u5f80\u5e38\u4e00\u6837\uff0c\u6211\u4eec\u6ca1\u6709\u6392\u9664\u6211\u4eec\u81ea\u5df1\u7684\u7814\u7a76\uff0c\u4f46\u5c0f\u7ec4\u6210\u5458\u4e0d\u80fd\u6295\u7968\u652f\u6301\u4ed6\u4eec\u6240\u5c5e\u7684\u4efb\u4f55\u4e1c\u897f\u3002<\/p>\n\n\n\n<p>\u4eca\u5e74\uff0c\u8fde\u7eed\u7b2c\u4e09\u5e74\uff0c\u8d28\u91cf\u63d0\u540d\u7684\u6570\u91cf\u6709\u4e86\u660e\u663e\u7684\u6539\u5584\u3002\u867d\u7136\u5f7b\u5e95\u7684\u65b0\u6280\u672f\u548c\u8bfe\u5802\u4f11\u606f\u53d8\u5f97\u8d8a\u6765\u8d8a\u5c11\uff0c\u4f46\u6bd4\u4ee5\u5f80\u4efb\u4f55\u65f6\u5019\u90fd\u6709\u66f4\u591a\u7684\u4eba\u7a81\u7834\u754c\u9650\u5e76\u5206\u4eab\u4ed6\u4eec\u7684\u53d1\u73b0\u3002\u5f88\u9ad8\u5174\u770b\u5230\u7814\u7a76\u751f\u6001\u7cfb\u7edf\u84ec\u52c3\u53d1\u5c55\uff0c\u5373\u4f7f\u5b83\u4f7f\u9009\u62e9\u524d\u5341\u540d\u53d8\u5f97\u66f4\u52a0\u56f0\u96be\uff01<\/p>\n\n\n\n<p>\u5728\u6211\u4eec\u5f00\u59cb\u5012\u8ba1\u65f6\u4e4b\u524d\uff0c\u6211\u5e94\u8be5\u6307\u51fa\uff0c\u4efb\u4f55\u5c06\u4e00\u5e74\u7684\u7814\u7a76\u538b\u7f29\u5230\u524d\u5341\u540d\u540d\u5355\u4e2d\u7684\u5c1d\u8bd5\u90fd\u4f1a\u5ffd\u89c6\u6709\u4ef7\u503c\u7684\u6280\u672f\u3002\u5982\u679c\u4f60\u6e34\u671b\u77e5\u8bc6\uff0c\u6211\u5f3a\u70c8\u5efa\u8bae\u4f60\u9605\u8bfb<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/portswigger.net\/research\/top-10-web-hacking-techniques-of-2022-nominations-open\">\u6574\u4e2a\u63d0\u540d\u540d\u5355<\/a>\u3002<\/p>\n\n\n\n<p>\u5728\u6700\u540e\u7684\u5341\u4e2a\u4e3b\u9898\u4e2d\uff0c\u6709\u4e24\u4e2a\u5173\u952e\u4e3b\u9898\u8131\u9896\u800c\u51fa &#8211; \u5355\u70b9\u767b\u5f55\u548c\u8bf7\u6c42\u8d70\u79c1\u3002\u8ba9\u6211\u4eec\u4ed4\u7ec6\u770b\u770b\uff01<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">10 &#8211; \u5229\u7528 Web3 \u7684\u9690\u85cf\u653b\u51fb\u9762\uff1aNetlify Next.js \u5e93\u4e0a\u7684\u901a\u7528 XSS<\/h4>\n\n\n\n<p>\u968f\u7740\u6211\u4eec\u627e\u5230\u5c06\u8d8a\u6765\u8d8a\u590d\u6742\u7684\u65b9\u6cd5\u585e\u8fdb\u6211\u4eec\u7684\u8f6f\u4ef6\u4e2d\uff0c\u5373\u4f7f\u662f\u770b\u8d77\u6765\u9759\u6001\u7684\u7f51\u7ad9\u4e5f\u53ef\u4ee5\u9690\u85cf\u4e25\u91cd\u7684\u6f0f\u6d1e\u3002\u5728<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/samcurry.net\/universal-xss-on-netlifys-next-js-library\/\">\u5229\u7528 Web3 \u7684\u9690\u85cf\u653b\u51fb\u9762<\/a>\u4e2d\uff0c<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/twitter.com\/samwcyo\">Sam Curry<\/a>&nbsp;\u548c&nbsp;<a href=\"https:\/\/twitter.com\/infosec_au\" target=\"_blank\" rel=\"noreferrer noopener\">Shubham Shah<\/a>&nbsp;\u7528\u6765\u81ea Netlify Next.js \u5e93\u7684 XSS\u3001SSRF \u548c\u7f13\u5b58\u4e2d\u6bd2\u7684\u6df7\u5408\u4f53\u6495\u6bc1\u4e86\u8bb8\u591a\u52a0\u5bc6\u8d27\u5e01\u7f51\u7ad9\u3002\u6211\u4eec\u6e34\u671b\u770b\u5230\u8be5\u65b9\u6cd5\u548c\u52a0\u5bc6\u8d27\u5e01\u751f\u6001\u7cfb\u7edf\u7684\u89c1\u89e3\u662f\u5426\u4f1a\u63a8\u52a8\u8be5\u9886\u57df\u7684\u8fdb\u4e00\u6b65\u53d1\u73b0\u3002<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">9 &#8211; \u5b9e\u7528\u7684\u5ba2\u6237\u7aef\u8def\u5f84\u904d\u5386\u653b\u51fb<\/h4>\n\n\n\n<p>\u6709\u65f6\uff0c\u6f0f\u6d1e\u7c7b\u522b\u53ef\u80fd\u975e\u5e38\u660e\u663e\uff0c\u4f46\u7531\u4e8e\u8868\u89c2\u4e25\u91cd\u6027\u8f83\u4f4e\uff0c\u591a\u5e74\u6765\u4e00\u76f4\u88ab\u5ffd\u89c6\u3002<\/p>\n\n\n\n<p>\u5728<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/mr-medi.github.io\/research\/2022\/11\/04\/practical-client-side-path-traversal-attacks.html\">\u5b9e\u9645\u5ba2\u6237\u7aef\u8def\u5f84\u904d\u5386\u653b\u51fb<\/a>\u4e2d\uff0c<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/twitter.com\/medi_0ne\">Medi<\/a>&nbsp;\u63a2\u8ba8\u4e86\u4e00\u79cd\u975e\u5e38\u5e38\u89c1\u7684\u7f51\u7ad9\u884c\u4e3a &#8211; \u5c06\u7528\u6237\u8f93\u5165\u653e\u5728\u8bf7\u6c42\u8def\u5f84\u4e2d &#8211; \u5e76\u6f14\u793a\u4e86\u901a\u5f80\u771f\u6b63\u5f71\u54cd\u7684\u6e05\u6670\u9014\u5f84\u3002\u591a\u5e74\u6765\uff0c\u8fd9\u79cd\u884c\u4e3a\u5df2\u7ecf\u5728\u6f0f\u6d1e\u5229\u7528\u94fe\u4e2d\u51fa\u73b0\u4e86\u51e0\u6b21\uff0c\u4f46\u8fd9\u7bc7\u6587\u7ae0\u8868\u660e\uff0c\u662f\u65f6\u5019\u8ba4\u8bc6\u5230\u5b83\u672c\u8eab\u5c31\u662f\u4e00\u4e2a\u6f0f\u6d1e\u4e86\u3002\u5ba2\u6237\u7aef\u53c2\u6570\u6c61\u67d3\u7684\u8fd9\u4e2a\u8868\u4eb2\u5df2\u7ecf\u6fc0\u53d1\u4e86\u5c06\u5176\u7528\u4e8eCSRF\u7684<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/erasec.be\/blog\/client-side-path-manipulation\/\">\u540e\u7eed\u7814\u7a76<\/a>\uff0c\u6211\u4eec\u76f8\u4fe1\u8fd8\u4f1a\u6709\u66f4\u591a\u3002<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">8 &#8211; Java \u7684\u5fc3\u7075\u7b7e\u540d<\/h4>\n\n\n\n<p><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/infosec.exchange\/@neilmadden\">Neil Madden<\/a>&nbsp;\u5728&nbsp;<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/neilmadden.blog\/2022\/04\/19\/psychic-signatures-in-java\/\">Java \u4e2d\u9192\u76ee\u7684 Psychic Signatures<\/a>&nbsp;\u5c55\u793a\u4e86\u4e00\u79cd\u5173\u952e\u4e14\u975e\u5e38\u7b80\u5355\u7684\u653b\u51fb\uff0c\u4f7f\u7528\u6570\u5b57 0 \u6765\u4f2a\u9020 ECDSA \u7b7e\u540d\uff0c\u7834\u574f\u4e86\u5305\u62ec JWT \u548c SAML \u5728\u5185\u7684\u4f17\u591a\u6838\u5fc3 Web \u6280\u672f\u7684\u52a0\u5bc6\u57fa\u7840\u3002<\/p>\n\n\n\n<p>\u8fd9\u79cd\u4f7f\u7528\u53e4\u8001\u7684\u52a0\u5bc6\u653b\u51fb\u6765\u63a8\u7ffb\u73b0\u4ee3\u7f51\u7edc\u6280\u672f\u662f\u4e00\u4e2a\u5f88\u597d\u7684\u63d0\u9192\uff0c\u4f60\u5e76\u4e0d\u603b\u662f\u9700\u8981\u590d\u6742\u7684\u653b\u51fb\u6765\u5b9e\u73b0\u5de8\u5927\u7684\u5f71\u54cd &#8211; \u5c3d\u7ba1\u62bd\u8c61\u5f88\u597d\uff0c\u4f46\u6709\u65f6\u503c\u5f97\u8fdb\u4e00\u6b65\u7814\u7a76\u5806\u6808\u3002<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">7 &#8211; \u6240\u6709 Akamai \u8fb9\u7f18\u8282\u70b9\u4e0a\u7684\u5168\u7403\u670d\u52a1\u5668\u7aef\u7f13\u5b58\u4e2d\u6bd2<\/h4>\n\n\n\n<p>\u65e9\u5728 2019 \u5e74\uff0c\u524d 10 \u540d\u7684\u63d0\u540d\u4e4b\u4e00\u662f\u4e00\u7bc7<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/portswigger.net\/research\/top-10-web-hacking-techniques-of-2019-nominations-open#:~:text=Abusing%20HTTP%20hop%2Dby%2Dhop%20request%20headers\">\u5173\u4e8e HTTP \u9010\u8df3\u6807\u5934\u7684\u5229\u7528\u6f5c\u529b\u7684\u6587\u7ae0<\/a>\uff0c\u5e76\u547c\u5401\u5bf9\u8be5\u4e3b\u9898\u8fdb\u884c\u8fdb\u4e00\u6b65\u7814\u7a76\u3002\u4e09\u5e74\u540e\uff0c<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/medium.com\/@jacopotediosi\/worldwide-server-side-cache-poisoning-on-all-akamai-edge-nodes-50k-bounty-earned-f97d80f3922b\">\u6240\u6709 Akamai \u8fb9\u7f18\u8282\u70b9\u4e0a\u7684\u5168\u7403\u670d\u52a1\u5668\u7aef\u7f13\u5b58\u4e2d\u6bd2<\/a>\u5229\u7528\u8fd9\u4e00\u6982\u5ff5\u4ea7\u751f\u4e86\u5de8\u5927\u7684\u5f71\u54cd\u548c\u5927\u91cf\u7684\u6f0f\u6d1e\u8d4f\u91d1\uff0c\u5c06\u8be5\u6280\u672f\u786e\u7acb\u4e3a Web \u9ed1\u5ba2\u548c\u670d\u52a1\u5668\u5b9e\u65bd\u8005\u7684\u57fa\u672c\u77e5\u8bc6\u3002<\/p>\n\n\n\n<p>\u6211\u4eec\u4e5f\u8d5e\u8d4f<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/twitter.com\/jacopotediosi\">Jacopo Tediosi<\/a>\u5982\u4f55\u4e3a\u4f7f\u7528\u5148\u8fdb\u6280\u672f\u7684\u4eba\u4eec\u5728\u5c1d\u8bd5\u5bf9\u4ed6\u4eec\u7684\u6f0f\u6d1e\u8d4f\u91d1\u62a5\u544a\u8fdb\u884c\u5206\u7c7b\u65f6\u53ef\u80fd\u9047\u5230\u7684\u75db\u82e6\u4e16\u754c\u63d0\u4f9b\u4e00\u4e9b\u7f55\u89c1\u7684\u66d9\u5149\u3002<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">6 &#8211; \u901a\u8fc7\u54cd\u5e94\u961f\u5217\u4e2d\u6bd2\u4f7f HTTP \u6807\u5934\u6ce8\u5165\u53d8\u5f97\u5173\u952e<\/h4>\n\n\n\n<p>\u6709\u6ca1\u6709\u60f3\u8fc7\u4e3a\u4ec0\u4e48\u4eba\u4eec\u6709\u65f6\u4f1a\u6ce8\u5165\u4e00\u4e2aHTTP\u54cd\u5e94\u6807\u5934\uff0c\u4f46\u968f\u540e\u5c06\u5176\u79f0\u4e3a\u201c\u54cd\u5e94\u62c6\u5206\u201d\uff0c\u5373\u4f7f\u4ed6\u4eec\u4ece\u672a\u771f\u6b63\u62c6\u5206\u54cd\u5e94\uff1f\u5728<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/portswigger.net\/research\/making-http-header-injection-critical-via-response-queue-poisoning\">\u901a\u8fc7\u54cd\u5e94\u961f\u5217\u4e2d\u6bd2\u4f7f HTTP \u6807\u5934\u6ce8\u5165\u53d8\u5f97\u5173\u952e<\/a>\u4e2d\uff0c\u6211\u901a\u8fc7\u4e00\u4e2a\u9ad8\u5f71\u54cd\u529b\u3001\u9ad8\u652f\u51fa\u7684\u6848\u4f8b\u7814\u7a76\u63a2\u7d22\u4e86\u957f\u671f\u88ab\u9057\u5fd8\u7684\u54cd\u5e94\u62c6\u5206\u6280\u672f\u3002<\/p>\n\n\n\n<p>\u6b63\u5982 filedescriptor \u6240\u6307\u51fa\u7684\uff0c\u201c\u4ee3\u7406\u4e4b\u95f4\u4f3c\u4e4e\u6709\u65e0\u9650\u6570\u91cf\u7684\u5f02\u5e38\uff0c\u4e3a\u60a8\u5e26\u6765\u65e0\u9650\u6570\u91cf\u7684\u8bf7\u6c42\u8d70\u79c1\u6280\u672f\u201d&#8230;&#8230;\u7a0d\u540e\u4f1a\u8be6\u7ec6\u4ecb\u7ecd\u3002<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">5 &#8211; \u7ed5\u8fc7 .NET \u5e8f\u5217\u5316\u7ed1\u5b9a\u5668<\/h4>\n\n\n\n<p>\u5728 2020 \u5e74\uff0c.NET \u5e8f\u5217\u5316\u7ed1\u5b9a\u7a0b\u5e8f\u6587\u6863\u5c06\u8bed\u53e5\u201c\u5e8f\u5217\u5316\u7ed1\u5b9a\u5668\u4e5f\u53ef\u7528\u4e8e\u5b89\u5168\u6027\u201d\u66f4\u6539\u4e3a\u201c\u5e8f\u5217\u5316\u7ed1\u5b9a\u5668\u4e0d\u80fd\u7528\u4e8e\u5b89\u5168\u6027\u201d\u3002<\/p>\n\n\n\n<p>\u4ece\u8fd9\u4e2a\u7b80\u5355\u7684\u9884\u544a\u7247\u4e2d\uff0c<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/twitter.com\/mwulftange\">Markus Wulftange<\/a>\u7684<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/codewhitesec.blogspot.com\/2022\/06\/bypassing-dotnet-serialization-binders.html\">Bypassing .NET Serialization Binders<\/a>\u6df1\u5165\u7814\u7a76\u4e86\u539f\u56e0\uff0c\u6700\u7ec8\u4e3aDevExpress\u548cMicrosoft Exchange\u6784\u5efa\u4e86\u6f0f\u6d1e\u4f5c\u4e3a\u6848\u4f8b\u7814\u7a76\u3002\u8fd9\u9879\u7814\u7a76\u5f15\u7528\u4e86\u5927\u91cf\u7684\u6587\u6863\u548c\u76f8\u5173\u7814\u7a76\uff0c\u4f7f\u5176\u6210\u4e3a\u8fdb\u5165 .NET \u5e8f\u5217\u5316\u5185\u90e8\u7684\u7edd\u4f73\u95e8\u6237\u3002<\/p>\n\n\n\n<p>\u50cf\u8fd9\u6837\u7684\u9ad8\u8d28\u91cf\u7814\u7a76\u901a\u5e38\u4f1a\u6fc0\u53d1\u884c\u52a8\uff0c\u4e8b\u5b9e\u8bc1\u660e\uff0cSoroush\u5df2\u7ecf\u4ee5\u6b64\u4e3a\u57fa\u7840\uff0c\u5e76\u5c06\u7ed3\u679c\u6574\u5408\u5230&nbsp;<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/github.com\/pwntester\/ysoserial.net\">YSoSerial.Net<\/a>&nbsp;\u4e2d\u3002\u60a8\u4f1a\u60f3\u77e5\u9053\u81ea\u4e0a\u6b21\u9605\u8bfb\u4ee5\u6765\uff0c\u5b89\u5168\u5173\u952e\u6587\u6863\u53d1\u751f\u4e86\u54ea\u4e9b\u66f4\u6539\u3002<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">4 &#8211; \u4f7f\u7528 SAML \u5165\u4fb5\u4e91<\/h4>\n\n\n\n<p>\u5c31\u50cfOAuth\u4e00\u6837\uff0c\u5982\u679c\u4e0d\u8ba8\u8bbaSAML\uff0c\u5c31\u65e0\u6cd5\u8ba8\u8bbaSSO\u3002\u867d\u7136\u4e00\u4e9bSAML\u6f0f\u6d1e\u90fd\u975e\u5e38\u6709\u540d\uff0c\u4f46<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/twitter.com\/_fel1x\">Felix Wilhelm<\/a>\u7684<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.youtube.com\/watch?v=WHn-6xHL7mI\">Hacking the Cloud<\/a>\u5c55\u793a\u4e86SAML\u7684\u653b\u51fb\u9762\u662f\u591a\u4e48\u53ef\u6015\u3002\u8fd9\u6700\u7ec8\u5bfc\u81f4\u4e00\u4e2a XML \u6587\u6863\u5728 Java \u5c1d\u8bd5\u9a8c\u8bc1\u5176\u7b7e\u540d\u65f6\u4f7f\u7528\u6574\u6570\u622a\u65ad\u9519\u8bef\u6765\u89e6\u53d1\u4efb\u610f\u5b57\u8282\u7801\u6267\u884c\u3002<\/p>\n\n\n\n<p>\u8fd9\u662f\u5fc5\u770b\u7684\u7814\u7a76\u3002\u6f14\u793a\u6587\u7a3f\u5f55\u5236\u4f7f\u8be5\u4e3b\u9898\u7279\u522b\u6613\u4e8e\u8bbf\u95ee\uff0c\u5e76\u63d0\u4f9b\u4e86\u6709\u4ef7\u503c\u7684\u4e0a\u4e0b\u6587\uff0c\u4f46\u5982\u679c\u60a8\u5df2\u7ecf\u719f\u6089 SAML \u5229\u7528\uff0c\u60a8\u53ef\u80fd\u4f1a\u901a\u8fc7<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.hexacon.fr\/slides\/Hacking-the-Cloud-With-SAML.pdf\">\u5e7b\u706f\u7247<\/a>\u6216<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/googleprojectzero.blogspot.com\/2022\/11\/gregor-samsa-exploiting-java-xml.html\">\u7cbe\u7b80\u6587\u7ae0<\/a>\u3002<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">3 &#8211; Zimbra\u7535\u5b50\u90ae\u4ef6 &#8211; \u901a\u8fc7Memcache\u6ce8\u5165\u7a83\u53d6\u660e\u6587\u51ed\u636e<\/h4>\n\n\n\n<p>\u5e94\u7528\u5c42\u7f13\u5b58\u88ab\u5e7f\u6cdb\u4f7f\u7528\uff0c\u4f46\u5f88\u5c11\u88ab\u5229\u7528\u3002\u5728<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.sonarsource.com\/blog\/zimbra-mail-stealing-clear-text-credentials-via-memcache-injection\/\">Zimbra Email &#8211; Stealing Clear-Text Credentials by Memcache<\/a>\u6ce8\u5165\u4e2d\uff0c<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/twitter.com\/scannell_simon\">Simon Scannell<\/a>\u901a\u8fc7\u89e6\u53d1\u54cd\u5e94\u961f\u5217\u4e2d\u6bd2\u7684memcache\u7b49\u6548\u7269\uff0c\u5c06\u8fd9\u4e2a\u7f55\u89c1\u7684\u9519\u8bef\u7c7b\u63d0\u5347\u5230\u4e00\u4e2a\u770b\u4e0d\u89c1\u7684\u6c34\u5e73\uff0c\u5bfc\u81f4\u534f\u8bae\u7ea7\u522b\u7684\u6df7\u4e71\u3002<\/p>\n\n\n\n<p>\u8fd9\u9879\u521b\u65b0\u7814\u7a76\u6781\u597d\u5730\u5c55\u793a\u4e86\u6df1\u5165\u4e86\u89e3\u76ee\u6807\u53ef\u4ee5\u5b9e\u73b0\u7684\u76ee\u6807\u3002\u6211\u4eec\u5c06\u5728\u672a\u6765\u5bc6\u5207\u5173\u6ce8\u670d\u52a1\u5668\u7aef\u7f13\u5b58\u6ce8\u5165\u548c\u5907\u7528\u534f\u8bae\u4e0d\u540c\u6b65\u653b\u51fb\u3002<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">2 &#8211; \u6d4f\u89c8\u5668\u9a71\u52a8\u7684\u4e0d\u540c\u6b65\u653b\u51fb\uff1aHTTP \u8bf7\u6c42\u8d70\u79c1\u7684\u65b0\u524d\u6cbf<\/h4>\n\n\n\n<p>\u5728<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/portswigger.net\/research\/browser-powered-desync-attacks\">\u6d4f\u89c8\u5668\u9a71\u52a8\u7684\u4e0d\u540c\u6b65\u653b\u51fb<\/a>\u4e2d\uff0c\u6211\u63a2\u7d22\u4e86HTTP\u8bf7\u6c42\u8d70\u79c1\u7684\u65b0\u8f7d\u4f53\uff0c\u7834\u574f\u4e86\u4ece\u4e9a\u9a6c\u900a\u5230Apache\u7684\u76ee\u6807\uff0c\u5e76\u6700\u7ec8\u5c06\u653b\u51fb\u5ba2\u6237\u7aef\u5e26\u5165\u53d7\u5bb3\u8005\u7684\u6d4f\u89c8\u5668\u3002<\/p>\n\n\n\n<p>\u6211\u53d1\u73b0\u8fd9\u9879\u7814\u7a76\u5728\u6280\u672f\u4e0a\u6781\u5177\u6311\u6218\u6027\uff0c\u4f46\u503c\u5f97\u5e86\u5e78\u7684\u662f\uff0c\u7f51\u7edc\u5b89\u5168\u5b66\u9662\u56e2\u961f\u80fd\u591f\u63d0\u4f9b<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/portswigger.net\/web-security\/request-smuggling\/browser\">\u5b9e\u9a8c\u5ba4<\/a>\u6765\u5e2e\u52a9\u8bfb\u8005\u7ec3\u4e60\uff0c\u800c\u4e14\u6211\u4eec\u5df2\u7ecf\u770b\u5230\u4eba\u4eec\u5728\u91ce\u5916\u4f7f\u7528\u8be5\u6280\u672f\u53d6\u5f97\u4e86\u6210\u529f\u3002\u8be5\u5c0f\u7ec4\u6709\u5f88\u591a\u597d\u8bdd\u8981\u8bf4\uff0c\u5305\u62ec\u201c\u4ece\u4e0d\u540c\u6b65\u8815\u866b\uff08\u5bf9XSS\u8815\u866b\u7684\u56de\u5fc6\uff09\u5230\u5ba2\u6237\u7aef\u4e0d\u540c\u6b65\u7684\u521b\u9020\u529b\u8d85\u51fa\u4e86\u56fe\u8868\u201d\u201c\u65b0\u6982\u5ff5\uff0c\u4f17\u591a\u7528\u4f8b\uff0c\u50cf\u5f80\u5e38\u4e00\u6837\u4ee4\u4eba\u5370\u8c61\u6df1\u523b\u201d\u201c\u4e5f\u4e3a\u89c2\u4f17\/\u8bfb\u8005\u63d0\u4f9b\u4e86\u63a2\u7d22\u7684\u4e1c\u897f\u201d\u3002<\/p>\n\n\n\n<p>\u8bf7\u6c42\u8d70\u79c1\u5df2\u7ecf\u8bc1\u660e\u81ea\u5df1\u662f\u8fde\u7eed\u51e0\u5e74\u4e0d\u53ef\u963b\u6321\u7684\u65b0\u5a01\u80c1\u6765\u6e90\uff0c\u5e76\u4e14\u6709\u5f88\u591a\u672a\u5f00\u53d1\u7684\u9014\u5f84\uff0c\u8fd9\u79cd\u60c5\u51b5\u53ef\u80fd\u4f1a\u6301\u7eed\u5230HTTP \/ 1\u5b8c\u5168\u6d88\u9664\uff0c\u6211\u60f3\u8fd9\u9700\u8981\u4e00\u6bb5\u65f6\u95f4\u3002<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1 &#8211; \u5728\u767b\u5f55 OAuth \u6d41\u4e2d\u4f7f\u7528\u810f\u821e\u52ab\u6301\u5e10\u6237<\/h3>\n\n\n\n<p>OAuth \u5df2\u6210\u4e3a\u73b0\u4ee3 SSO \u7684\u57fa\u7840\uff0c\u4ece\u90a3\u4ee5\u540e\uff0c\u5bf9\u5b83\u7684\u653b\u51fb\u4e00\u76f4\u662f\u9ed1\u5ba2\u7684\u4e3b\u8981\u653b\u51fb\u65b9\u5f0f\u3002\u6700\u8fd1\uff0c\u6d4f\u89c8\u5668\u5f15\u5165\u4e86\u5f15\u8350\u6765\u6e90\u94fe\u63a5\u5265\u79bb\u7f13\u89e3\u63aa\u65bd\uff0c\u8fd9\u963b\u788d\u4e86\u6700\u6d41\u884c\u7684\u6280\u672f\u4e4b\u4e00 &#8211; \u81f3\u5c11\u6211\u4eec\u8ba4\u4e3a\u662f\u8fd9\u6837\u3002\u5728<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/labs.detectify.com\/2022\/07\/06\/account-hijacking-using-dirty-dancing-in-sign-in-oauth-flows\/\">\u767b\u5f55OAuth\u6d41\u4e2d\u4f7f\u7528\u810f\u821e\u7684\u5e10\u6237\u52ab\u6301<\/a>\u4e2d\uff0c<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/twitter.com\/fransrosen\">Frans Rosen<\/a>\u8868\u660e\u73b0\u4ee3Web\u5806\u6808\u63d0\u4f9b\u4e86\u5145\u8db3\u7684\u66ff\u4ee3\u65b9\u6848\u3002<\/p>\n\n\n\n<p>\u8fd9\u9879\u5fc5\u8bfb\u7684\u7814\u7a76\u63d0\u4f9b\u4e86\u4e00\u4e2a\u5927\u5e08\u73ed\uff0c\u5c06OAuth\u602a\u7656\u4e0e\u4f4e\u5f71\u54cd\u7684URL\u6cc4\u6f0f\u5c0f\u5de5\u5177\uff08\u5305\u62ec\u6ee5\u4ea4\u7684postMessages\uff0c\u7b2c\u4e09\u65b9XSS\u548cURL\u5b58\u50a8\uff09\u8054\u7cfb\u8d77\u6765\u3002\u5176\u4e2d\u8bb8\u591a\u9519\u8bef\u4ee5\u524d\u4f1a\u56e0\u4e3a\u6ca1\u6709\u91cd\u5927\u7684\u5b89\u5168\u5f71\u54cd\u800c\u88ab\u9a73\u56de\uff0c\u56e0\u6b64\u5b83\u4eec\u5df2\u7ecf\u6269\u6563\u4e86\u6570\u5e74\u3002<\/p>\n\n\n\n<p>\u8fd9\u4e9b\u653b\u51fb\u7684\u5de8\u5927\u6f5c\u529b\u8fc5\u901f\u6fc0\u53d1\u4e86\u6211\u4eec\u5c1d\u8bd5<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/portswigger.net\/research\/detecting-web-message-misconfigurations-for-cross-domain-credential-theft\">\u542f\u7528\u81ea\u52a8 URL \u6cc4\u6f0f\u68c0\u6d4b<\/a>\uff0c\u6211\u4eec\u8fd8\u5728\u63a2\u7d22\u5c06\u8fd9\u4e9b\u6280\u672f\u96c6\u6210\u5230&nbsp;<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/portswigger.net\/web-security\/oauth\">OAuth Academy \u4e3b\u9898<\/a>\u7684\u5b9e\u9a8c\u5ba4\u4e2d\uff0c\u4ee5\u5e2e\u52a9\u793e\u533a\u83b7\u5f97\u5e94\u7528\u5b83\u4eec\u7684\u5b9e\u8df5\u7ecf\u9a8c\u3002<\/p>\n\n\n\n<p>\u8fd9\u662f\u4e00\u9879\u6770\u51fa\u7684\u7814\u7a76\uff0c\u6211\u4eec\u9884\u8ba1\u5728\u672a\u6765\u51e0\u5e74\u5185\u5c06\u53d6\u5f97\u6210\u679c\u3002\u606d\u559c\u5f17\u5170\u65af\u5f53\u4e4b\u65e0\u6127\u7684\u80dc\u5229\uff01<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u7ed3\u8bba<\/h3>\n\n\n\n<p>2022 \u5e74\uff0c\u793e\u533a\u53d1\u8868\u7684\u4f18\u79c0\u7814\u7a76\u6bd4\u4ee5\u5f80\u4efb\u4f55\u65f6\u5019\u90fd\u591a\uff0c\u5bfc\u81f4\u5e7f\u6cdb\u7684\u6295\u7968\u4f20\u64ad\uff0c\u4ee5\u53ca\u5bf9\u524d 10 \u540d\u540d\u989d\u7684\u6fc0\u70c8\u7ade\u4e89\u3002\u5c06 40+ \u9879\u63d0\u540d\u6d53\u7f29\u5230\u524d 10 \u540d\u540d\u5355\u4e2d\u5bf9 30 \u540d\u4e9a\u519b\u6765\u8bf4\u4e0d\u53ef\u907f\u514d\u5730\u4e0d\u516c\u5e73\uff0c\u56e0\u6b64\u6211\u4eec\u5efa\u8bae\u7231\u597d\u8005\u9605\u8bfb<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/portswigger.net\/research\/top-10-web-hacking-techniques-of-2022-nominations-open\">\u6574\u4e2a\u63d0\u540d\u540d\u5355<\/a>\u3002\u53e6\u5916\uff0c\u5982\u679c\u60a8\u81ea\u5df1\u7684\u6700\u7231\u6ca1\u6709\u6210\u529f\uff0c\u8bf7\u968f\u65f6\u53d1\u63a8\u6587\u8ba9\u6211\u4eec\u77e5\u9053\uff01<\/p>\n\n\n\n<p>\u8fdb\u5165\u524d 10 \u540d\u7684\u90e8\u5206\u539f\u56e0\u662f\u5b83\u7684\u9884\u671f\u5bff\u547d\uff0c\u56e0\u6b64\u4e5f\u503c\u5f97\u8d76\u4e0a<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/portswigger.net\/research\/top-10-web-hacking-techniques\">\u53bb\u5e74\u7684\u524d 10<\/a>&nbsp;\u540d\u3002\u5982\u679c\u60a8\u6709\u5174\u8da3\u9884\u89c8 2023 \u5e74\u53ef\u80fd\u83b7\u80dc\u7684\u5185\u5bb9\uff0c\u60a8\u53ef\u4ee5\u8ba2\u9605&nbsp;<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/twitter.com\/portswiggerres\">@PortSwiggerRes<\/a>\u3001<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.reddit.com\/r\/websecurityresearch\/\">r\/websecurityresearch<\/a>&nbsp;\u548c @portswiggerres@infosec.exchange\u3002<\/p>\n\n\n\n<p>\u5982\u679c\u4f60\u6709\u5174\u8da3\u81ea\u5df1\u505a\u8fd9\u79cd\u7814\u7a76\uff0c\u6211\u5206\u4eab\u4e86\u6211\u591a\u5e74\u6765\u5728<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/portswigger.net\/research\/hunting-evasive-vulnerabilities\">\u641c\u5bfb\u89c4\u907f\u6f0f\u6d1e<\/a>\u4e2d\u5b66\u5230\u7684\u4e00\u4e9b\u7ecf\u9a8c\u6559\u8bad\uff0c<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/portswigger.net\/research\/so-you-want-to-be-a-web-security-researcher\">\u6240\u4ee5\u4f60\u60f3\u6210\u4e3a\u4e00\u540d\u7f51\u7edc\u5b89\u5168\u7814\u7a76\u4eba\u5458\u5417\uff1f<\/a>\u53e6\u5916\uff0c\u5982\u679c\u4f60\u5df2\u7ecf\u5728\u505a\u8fd9\u79cd\u5de5\u4f5c\uff0c\u6211\u8fd8\u5e94\u8be5\u63d0\u5230<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/portswigger.net\/careers\/web-vulnerability-researcher\">\u6211\u4eec\u6b63\u5728\u5bfb\u6c42\u8058\u8bf7\u53e6\u4e00\u4f4d\u7814\u7a76\u4eba\u5458<\/a>\u3002<\/p>\n\n\n\n<p>\u518d\u6b21\u611f\u8c22\u6240\u6709\u53c2\u4e0e\u7684\u4eba\uff01\u6ca1\u6709\u4f60\u7684\u63d0\u540d\u3001\u6295\u7968\u548c\u6700\u91cd\u8981\u7684\u7814\u7a76\uff0c\u8fd9\u662f\u4e0d\u53ef\u80fd\u7684\u3002<\/p>\n\n\n\n<p>\u76f4\u5230\u4e0b\u6b21\uff01<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u6b22\u8fce\u6765\u5230 2022\u5e7410\u5927\u7f51\u7edc\u9ed1\u5ba2\u6280\u672f\uff0c\u8fd9\u662f\u6211\u4eec\u5e74\u5ea6\u793e\u533a\u652f\u6301\u5de5\u4f5c\u7684\u7b2c 16 \u7248\uff0c\u65e8\u5728\u786e\u5b9a\u53bb\u5e74\u53d1\u8868\u7684\u6700\u91cd\u8981\u548c\u6700\u5177 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[5],"tags":[297],"class_list":["post-1178","post","type-post","status-publish","format-standard","hentry","category-infosec","tag-297"],"views":1318,"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/www.aqwu.net\/wp\/index.php?rest_route=\/wp\/v2\/posts\/1178","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.aqwu.net\/wp\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aqwu.net\/wp\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aqwu.net\/wp\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aqwu.net\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1178"}],"version-history":[{"count":1,"href":"https:\/\/www.aqwu.net\/wp\/index.php?rest_route=\/wp\/v2\/posts\/1178\/revisions"}],"predecessor-version":[{"id":1179,"href":"https:\/\/www.aqwu.net\/wp\/index.php?rest_route=\/wp\/v2\/posts\/1178\/revisions\/1179"}],"wp:attachment":[{"href":"https:\/\/www.aqwu.net\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1178"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aqwu.net\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1178"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aqwu.net\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1178"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}