{"id":1812,"date":"2022-09-06T13:42:00","date_gmt":"2022-09-06T05:42:00","guid":{"rendered":"http:\/\/0.0.0.0:8801\/?p=1812"},"modified":"2022-09-14T13:43:13","modified_gmt":"2022-09-14T05:43:13","slug":"%e8%b3%87%e5%ae%89%e5%b0%88%e5%ae%b6%e5%88%a9%e7%94%a8%e5%88%86%e6%9e%90%e5%b7%a5%e5%85%b7%ef%bc%8c%e7%99%bc%e7%8f%be-node-js-%e7%a8%8b%e5%bc%8f%e5%ba%ab%e5%85%a7%e8%b6%85%e9%81%8e-100-%e5%80%8b-0-day","status":"publish","type":"post","link":"https:\/\/aict.nkust.edu.tw\/digitrans\/?p=1812","title":{"rendered":"\u8cc7\u5b89\u5c08\u5bb6\u5229\u7528\u5206\u6790\u5de5\u5177\uff0c\u767c\u73fe Node.js \u7a0b\u5f0f\u5eab\u5167\u8d85\u904e 100 \u500b 0-day \u6f0f\u6d1e"},"content":{"rendered":"\n<p><strong>\u7f8e\u570b Johns Hopkins&nbsp;\u5927\u5b78\u7684\u5169\u4f4d\u8cc7\u5b89\u7814\u7a76\u4eba\u54e1\uff0c\u8fd1\u4f86\u5728\u4eca\uff082022\uff09\u5e74\u5ea6\u7684 Usenix Security Symposium \u8cc7\u5b89\u7814\u8a0e\u6703\u4e0a\u767c\u8868\u8ad6\u6587\uff0c\u6307\u51fa\u8a72\u7814\u7a76\u5718\u968a\u5229\u7528\u5168\u65b0\u958b\u767c\u7684\u5716\u50cf\u5f0f\u5206\u6790\u5de5\u5177 ODGen \u9032\u884c\u5206\u6790\uff0c\u767c\u73fe\u5ee3\u70ba\u7db2\u9801\u958b\u767c\u4eba\u54e1\u4f7f\u7528\u7684 JavaScript \u958b\u767c\u6846\u67b6 Node.js \u958b\u6e90\u7a0b\u5f0f\u5eab\u5167\u7684\u7a0b\u5f0f\u78bc\uff0c\u5b58\u6709 100 \u500b\u4ee5\u4e0a\u7684 0-day \u6f0f\u6d1e\u3002<\/strong><br><br>\u9019\u985e\u5716\u50cf\u5206\u6790\u5de5\u5177\u7684\u904b\u4f5c\u539f\u7406\uff0c\u662f\u5206\u6790\u7a0b\u5f0f\u78bc\uff0c\u5efa\u7acb\u4e00\u500b\u5716\u50cf\u67b6\u69cb\uff0c\u53cd\u6620\u67d0\u61c9\u7528\u7a0b\u5f0f\u4e2d\u5404\u7a2e\u4e0d\u540c\u7684\u55ae\u5143\u53ca\u5176\u57f7\u884c\u5206\u652f\uff0c\u53ef\u4ee5\u7528\u4f86\u627e\u51fa\u7a0b\u5f0f\u78bc\u4e2d\u7684\u6f0f\u6d1e\u3002\u9019\u7a2e\u5206\u6790\u5de5\u5177\u80fd\u5920\u6709\u6548\u627e\u51fa\u4ee5\u67d0\u4e9b\u7a0b\u5f0f\u8a9e\u8a00\u64b0\u5beb\u7a0b\u5f0f\u78bc\u5167\u542b\u7684\u6f0f\u6d1e\uff0c\u4f8b\u5982 Code Property Graph (CPG) \u5373\u53ef\u6709\u6548\u904b\u7528\u65bc C\/C++ \u8207 PHP \u7a0b\u5f0f\u78bc\u7684\u6f0f\u6d1e\u5206\u6790\u3002<br><br>\u6709\u9451\u65bc CPG \u7684\u904b\u7528\u6210\u529f\uff0cJohns Hopkins \u5927\u5b78\u7684\u7814\u7a76\u5718\u968a\u4e5f\u904b\u7528\u8a72\u539f\u7406\uff0c\u958b\u767c\u51fa\u904b\u7528\u65bc JavaScript \u7a0b\u5f0f\u8a9e\u8a00\u7684\u6f0f\u6d1e\u5206\u6790\u5de5\u5177 ODGen\uff0c\u4e26\u4e14\u4ee5\u6b64\u5de5\u5177\u6383\u7784 Node.js \u9019\u500b\u5ee3\u53d7\u5168\u7403\u6578\u767e\u842c\u540d\u958b\u767c\u4eba\u54e1\u6b61\u8fce\uff0c\u5176\u7a0b\u5f0f\u5eab\u5df2\u6709\u6578\u767e\u842c\u7a2e\u4e0d\u540c\u5957\u4ef6\u7684\u958b\u6e90\u7a0b\u5f0f\u958b\u767c\u6846\u67b6\uff0c\u7d50\u679c\u767c\u73fe\u4e86 180 \u500b 0-day \u6f0f\u6d1e\u3002<br><br>\u8a72\u5718\u968a\u63d0\u5831\u9019\u4e9b 0-day \u6f0f\u6d1e\u5f8c\uff0c\u5df2\u7d93\u6709 70 \u500b\u6f0f\u6d1e\u53d6\u5f97 CVE \u7de8\u865f\u3002<br><br>\u64da\u7814\u7a76\u5718\u968a\u8868\u793a\uff0cODGen \u53ef\u4ee5\u6e96\u78ba\u767c\u73fe 13 \u7a2e\u4e0d\u540c\u7684\u6f0f\u6d1e\u985e\u578b\uff0c\u5305\u62ec XSS\u3001SSRF\/CSRD\u3001SQL \u6307\u4ee4\u6ce8\u5165\u3001\u539f\u578b\u6c61\u67d3\uff08Prototype Pollution\uff09\u3001\u6307\u4ee4\u6ce8\u5165\u7b49\u7b49\u3002\u8a72\u5718\u968a\u4e5f\u5229\u7528\u6b64\u5de5\u5177\u5206\u6790\u5ee3\u53d7\u4f7f\u7528\u7684 30 \u842c\u7a2e NPM \u958b\u767c\u5957\u4ef6\uff0c\u7d50\u679c\u767c\u73fe\u8d85\u904e 3,000 \u7a2e\u8cc7\u5b89\u6f0f\u6d1e\uff0c\u5176\u4e2d\u6709 264 \u7a2e\u5b58\u65bc\u6bcf\u5468\u4e0b\u8f09\u6b21\u6578\u8d85\u904e 1,000 \u6b21\u7684\u71b1\u9580\u5957\u4ef6\u3002<br><br>\u7814\u7a76\u5718\u968a\u8868\u793a\uff0c\u63a5\u4e0b\u4f86\u5c07\u5ef6\u4f38 ODGen \u652f\u63f4\u7684\u7a0b\u5f0f\u8a9e\u8a00\u7a2e\u985e\uff0c\u4ee5\u4fbf\u652f\u63f4\u5176\u4ed6\u7d93\u5e38\u7528\u65bc\u7db2\u7ad9\u958b\u767c\u7684\u7a0b\u5f0f\u8a9e\u8a00\uff0c\u5305\u62ec PHP \u8207 Java \u5728\u5167\u3002<br><br>\u7531\u65bc\u8fd1\u5e74\u4f86\u5728\u958b\u6e90\u7a0b\u5f0f\u5eab\u4e2d\u767c\u73fe\u7684\u60e1\u610f\u8207\u975e\u60e1\u610f\u6f0f\u6d1e\u9010\u6f38\u589e\u52a0\uff0c\u958b\u767c\u4eba\u54e1\u5728\u4e0b\u8f09\u958b\u6e90\u7a0b\u5f0f\u5957\u4ef6\u4f7f\u7528\u524d\uff0c\u5fc5\u9808\u5148\u78ba\u8a8d\u8a72\u5957\u4ef6\u70ba\u6700\u65b0\u7248\u672c\uff0c\u4e14\u672a\u906d\u99ed\u4fb5\u8005\u4fee\u6539\u4e26\u6ce8\u5165\u60e1\u610f\u7a0b\u5f0f\u78bc\u3002<\/p>\n\n\n\n<p>\u767c\u5e03\u55ae\u4f4d:TWCERT\/CC\u66f4\u65b0\u65e5\u671f:2022-09-06<\/p>\n\n\n\n<p>\u8cc7\u6599\u4f86\u6e90\uff1a<a href=\"https:\/\/www.twcert.org.tw\/tw\/cp-104-6482-8594e-1.html\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.twcert.org.tw\/tw\/cp-104-6482-8594e-1.html<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u7f8e\u570b Johns Hopkins&nbsp;\u5927\u5b78\u7684\u5169\u4f4d\u8cc7\u5b89\u7814\u7a76\u4eba\u54e1\uff0c\u8fd1\u4f86\u5728\u4eca\uff082022\uff09\u5e74\u5ea6\u7684 Usenix Security Symposium \u8cc7\u5b89\u7814\u8a0e\u6703\u4e0a\u767c\u8868\u8ad6\u6587\uff0c\u6307\u51fa\u8a72\u7814\u7a76&hellip;<\/p>\n","protected":false},"author":3,"featured_media":1813,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[352],"tags":[386,387],"class_list":["post-1812","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-information-security","tag-node-js","tag-387"],"gutentor_comment":0,"jetpack_featured_media_url":"https:\/\/i0.wp.com\/aict.nkust.edu.tw\/digitrans\/wp-content\/uploads\/2022\/09\/0914-8-6.jpg?fit=1080%2C1080&ssl=1","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/posts\/1812","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1812"}],"version-history":[{"count":1,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/posts\/1812\/revisions"}],"predecessor-version":[{"id":1814,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/posts\/1812\/revisions\/1814"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/media\/1813"}],"wp:attachment":[{"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1812"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1812"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1812"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}