SCW Icons
hero bg no divider
Blog

2016 年发现的 Equifax 安全问题

Matias Madou, Ph.D.
Published Sep 12, 2017
Last updated on Mar 10, 2026

2016年在Equifax网站上发现的安全问题仍未修复。这是识别问题的一步,但修复问题却是一项更大的挑战。重新研究代码、理解上下文和修复问题需要时间和技能。

很明显,Equifax的开发人员承受着很大的压力,许多已知的漏洞没有得到修复。不幸的是,这种缺乏行动的态度现在已经得到了最糟糕的回应。

需要从一开始就融入安全性,开发人员需要技能、培训和 IDE 内工具,以最大限度地减少写入已知漏洞。它需要特定的语言和框架知识来修复已发现的问题。修复 XSS 问题的一般原则保持不变,但是实际实现取决于现有的框架。

如果你想就如何修复 Struts 中的 XSS 问题进行一些交互式培训,请查看: https://portal.securecodewarrior.com/#/simple-flow/web/xss/reflected/java/struts

根据一位名为x0rz的研究人员的推文,跳到2016年,一位安全研究人员在Equifax的主要网站上发现了一个称为跨站脚本(XSS)的常见漏洞。此类XSS错误允许攻击者向Equifax客户发送特制的链接,如果目标点击并登录该网站,则可以向黑客泄露其用户名和密码。

https://www.forbes.com/sites/thomasbrewster/2017/09/08/equifax-data-breach-history/#552ab1c9677c

查看资源
查看资源

根据一位名为x0rz的研究人员的推文,向前跳到2016年,一位安全研究人员在Equifax的主要网站上发现了一个称为跨站脚本(XSS)的常见漏洞。

对更多感兴趣?

Matias Madou, Ph.D. is a security expert, researcher, and CTO and co-founder of Secure Code Warrior. Matias obtained his Ph.D. in Application Security from Ghent University, focusing on static analysis solutions. He later joined Fortify in the US, where he realized that it was insufficient to solely detect code problems without aiding developers in writing secure code. This inspired him to develop products that assist developers, alleviate the burden of security, and exceed customers' expectations. When he is not at his desk as part of Team Awesome, he enjoys being on stage presenting at conferences including RSA Conference, BlackHat and DefCon.

learn more

Secure Code Warrior可以帮助您的组织在整个软件开发生命周期中保护代码,并营造一种将网络安全放在首位的文化。无论您是 AppSec 经理、开发人员、首席信息安全官还是任何与安全相关的人,我们都可以帮助您的组织降低与不安全代码相关的风险。

预订演示
分享到:
linkedin brandsSocialx logo
作者
Matias Madou, Ph.D.
Published Sep 12, 2017

Matias Madou, Ph.D. is a security expert, researcher, and CTO and co-founder of Secure Code Warrior. Matias obtained his Ph.D. in Application Security from Ghent University, focusing on static analysis solutions. He later joined Fortify in the US, where he realized that it was insufficient to solely detect code problems without aiding developers in writing secure code. This inspired him to develop products that assist developers, alleviate the burden of security, and exceed customers' expectations. When he is not at his desk as part of Team Awesome, he enjoys being on stage presenting at conferences including RSA Conference, BlackHat and DefCon.

Matias is a researcher and developer with more than 15 years of hands-on software security experience. He has developed solutions for companies such as Fortify Software and his own company Sensei Security. Over his career, Matias has led multiple application security research projects which have led to commercial products and boasts over 10 patents under his belt. When he is away from his desk, Matias has served as an instructor for advanced application security training courses and regularly speaks at global conferences including RSA Conference, Black Hat, DefCon, BSIMM, OWASP AppSec and BruCon.

Matias holds a Ph.D. in Computer Engineering from Ghent University, where he studied application security through program obfuscation to hide the inner workings of an application.

分享到:
linkedin brandsSocialx logo

2016年在Equifax网站上发现的安全问题仍未修复。这是识别问题的一步,但修复问题却是一项更大的挑战。重新研究代码、理解上下文和修复问题需要时间和技能。

很明显,Equifax的开发人员承受着很大的压力,许多已知的漏洞没有得到修复。不幸的是,这种缺乏行动的态度现在已经得到了最糟糕的回应。

需要从一开始就融入安全性,开发人员需要技能、培训和 IDE 内工具,以最大限度地减少写入已知漏洞。它需要特定的语言和框架知识来修复已发现的问题。修复 XSS 问题的一般原则保持不变,但是实际实现取决于现有的框架。

如果你想就如何修复 Struts 中的 XSS 问题进行一些交互式培训,请查看: https://portal.securecodewarrior.com/#/simple-flow/web/xss/reflected/java/struts

根据一位名为x0rz的研究人员的推文,跳到2016年,一位安全研究人员在Equifax的主要网站上发现了一个称为跨站脚本(XSS)的常见漏洞。此类XSS错误允许攻击者向Equifax客户发送特制的链接,如果目标点击并登录该网站,则可以向黑客泄露其用户名和密码。

https://www.forbes.com/sites/thomasbrewster/2017/09/08/equifax-data-breach-history/#552ab1c9677c

查看资源
查看资源

填写下面的表格下载报告

我们希望获得您的许可,以便向您发送有关我们的产品和/或相关安全编码主题的信息。我们将始终非常谨慎地对待您的个人信息,绝不会出于营销目的将其出售给其他公司。

提交
scw success icon
scw error icon
要提交表单,请启用 “分析” Cookie。完成后,可以随意再次禁用它们。

2016年在Equifax网站上发现的安全问题仍未修复。这是识别问题的一步,但修复问题却是一项更大的挑战。重新研究代码、理解上下文和修复问题需要时间和技能。

很明显,Equifax的开发人员承受着很大的压力,许多已知的漏洞没有得到修复。不幸的是,这种缺乏行动的态度现在已经得到了最糟糕的回应。

需要从一开始就融入安全性,开发人员需要技能、培训和 IDE 内工具,以最大限度地减少写入已知漏洞。它需要特定的语言和框架知识来修复已发现的问题。修复 XSS 问题的一般原则保持不变,但是实际实现取决于现有的框架。

如果你想就如何修复 Struts 中的 XSS 问题进行一些交互式培训,请查看: https://portal.securecodewarrior.com/#/simple-flow/web/xss/reflected/java/struts

根据一位名为x0rz的研究人员的推文,跳到2016年,一位安全研究人员在Equifax的主要网站上发现了一个称为跨站脚本(XSS)的常见漏洞。此类XSS错误允许攻击者向Equifax客户发送特制的链接,如果目标点击并登录该网站,则可以向黑客泄露其用户名和密码。

https://www.forbes.com/sites/thomasbrewster/2017/09/08/equifax-data-breach-history/#552ab1c9677c

观看网络研讨会
开始吧
learn more

点击下面的链接并下载此资源的PDF。

Secure Code Warrior可以帮助您的组织在整个软件开发生命周期中保护代码,并营造一种将网络安全放在首位的文化。无论您是 AppSec 经理、开发人员、首席信息安全官还是任何与安全相关的人,我们都可以帮助您的组织降低与不安全代码相关的风险。

查看报告预订演示
查看资源
分享到:
linkedin brandsSocialx logo
对更多感兴趣?

分享到:
linkedin brandsSocialx logo
作者
Matias Madou, Ph.D.
Published Sep 12, 2017

Matias Madou, Ph.D. is a security expert, researcher, and CTO and co-founder of Secure Code Warrior. Matias obtained his Ph.D. in Application Security from Ghent University, focusing on static analysis solutions. He later joined Fortify in the US, where he realized that it was insufficient to solely detect code problems without aiding developers in writing secure code. This inspired him to develop products that assist developers, alleviate the burden of security, and exceed customers' expectations. When he is not at his desk as part of Team Awesome, he enjoys being on stage presenting at conferences including RSA Conference, BlackHat and DefCon.

Matias is a researcher and developer with more than 15 years of hands-on software security experience. He has developed solutions for companies such as Fortify Software and his own company Sensei Security. Over his career, Matias has led multiple application security research projects which have led to commercial products and boasts over 10 patents under his belt. When he is away from his desk, Matias has served as an instructor for advanced application security training courses and regularly speaks at global conferences including RSA Conference, Black Hat, DefCon, BSIMM, OWASP AppSec and BruCon.

Matias holds a Ph.D. in Computer Engineering from Ghent University, where he studied application security through program obfuscation to hide the inner workings of an application.

分享到:
linkedin brandsSocialx logo

2016年在Equifax网站上发现的安全问题仍未修复。这是识别问题的一步,但修复问题却是一项更大的挑战。重新研究代码、理解上下文和修复问题需要时间和技能。

很明显,Equifax的开发人员承受着很大的压力,许多已知的漏洞没有得到修复。不幸的是,这种缺乏行动的态度现在已经得到了最糟糕的回应。

需要从一开始就融入安全性,开发人员需要技能、培训和 IDE 内工具,以最大限度地减少写入已知漏洞。它需要特定的语言和框架知识来修复已发现的问题。修复 XSS 问题的一般原则保持不变,但是实际实现取决于现有的框架。

如果你想就如何修复 Struts 中的 XSS 问题进行一些交互式培训,请查看: https://portal.securecodewarrior.com/#/simple-flow/web/xss/reflected/java/struts

根据一位名为x0rz的研究人员的推文,跳到2016年,一位安全研究人员在Equifax的主要网站上发现了一个称为跨站脚本(XSS)的常见漏洞。此类XSS错误允许攻击者向Equifax客户发送特制的链接,如果目标点击并登录该网站,则可以向黑客泄露其用户名和密码。

https://www.forbes.com/sites/thomasbrewster/2017/09/08/equifax-data-breach-history/#552ab1c9677c

目录

下载PDF
查看资源
对更多感兴趣?

Matias Madou, Ph.D. is a security expert, researcher, and CTO and co-founder of Secure Code Warrior. Matias obtained his Ph.D. in Application Security from Ghent University, focusing on static analysis solutions. He later joined Fortify in the US, where he realized that it was insufficient to solely detect code problems without aiding developers in writing secure code. This inspired him to develop products that assist developers, alleviate the burden of security, and exceed customers' expectations. When he is not at his desk as part of Team Awesome, he enjoys being on stage presenting at conferences including RSA Conference, BlackHat and DefCon.

learn more

Secure Code Warrior可以帮助您的组织在整个软件开发生命周期中保护代码,并营造一种将网络安全放在首位的文化。无论您是 AppSec 经理、开发人员、首席信息安全官还是任何与安全相关的人,我们都可以帮助您的组织降低与不安全代码相关的风险。

预订演示下载
分享到:
linkedin brandsSocialx logo
资源中心

帮助您入门的资源

更多帖子
资源中心

帮助您入门的资源

更多帖子