【CVE-2026-31816】 Budibase 未授权访问漏洞代码分析
该漏洞源于服务端 authorized() 中间件在识别 Webhook 路径时使用了非锚定正则表达式,导致其错误地匹配了 URL 中的查询参数。远程攻击者只需在 API 请求末尾拼接特定的 Webhook 路径字符串(如 ?/webhooks/trigger),即可绕过身份认证、角色鉴权及 CSRF 防护,实现对服务端所有 API 端点的完全访问与操作。
OpenSSL has released a broad April 2026 security update that fixes seven vulnerabilities across supported branches, led by CVE-2026-31790, a moderate-severity flaw in RSA KEM RSASVE encapsulation that can expose uninitialized memory to a malicious peer. The advisory directs users of vulnerable 3.x releases to move to OpenSSL 3.0.20, 3.3.7, 3.4.5, 3.5.6, or 3.6.2, depending […]
The post Multiple OpenSSL Vulnerabilities Exposes Sensitive Data in RSA KEM Handling appeared first on Cyber Security News.