๎ ‚January 12, 2023๎ „Rabbi LakshmananBrowser security / data safety

Details about vulnerabilities currently being patched in Google Chrome and Chromium-based browsers have emerged. A successful exploit could have siphoned files containing sensitive data.

“This problem arose from the way browsers interacted with symbolic link When dealing with files and directories,” said Imperva researcher Ron Masas. Said“Specifically, browsers did not properly check if symbolic links pointed to locations that were not accessible, which could lead to theft of sensitive files.”

Google characterized the medium severity issue (CVE-2022-3656) as insufficient data validation in the file system. release fix Included in versions 107 and 108 released in October and November 2022.

The core of this vulnerability, called SymStealer, relates to a class of vulnerabilities known as symbolic link chasing. Occur If an attacker abuses this feature to bypass a program’s file system restrictions and manipulate unauthorized files.

of Imperva analysis Researchers in Chrome’s file handling mechanism (extended Chromium) found that when users drag and drop folders directly, file input elementthe browser recursively resolved all symlinks without warning.

In a hypothetical attack, an attacker could trick a victim into visiting a fake website and downloading a ZIP archive file containing symbolic links to important files or folders on their computer, such as wallet keys or credentials. there is.

When the same symlink file is uploaded to a website as part of an infection chain (for example, a crypto wallet service asking users to upload a recovery key), this vulnerability can be exploited to reveal the actual file containing the key phrase. A symbolic link that accesses the file in .

To add even more credibility, a proof of concept (PoC) devised by Imperva uses CSS tricks to resize the file input element so that file uploads work no matter where the folder is dropped on the page. to be triggered by Enables information theft.

โ€œHackers are increasingly targeting individuals and organizations holding cryptocurrencies because these digital assets can be so valuable,โ€ said Mathas. โ€œOne common tactic used by hackers is to exploit software vulnerabilities. […] In order to access crypto wallets and steal the funds contained therein. โ€

Did you find this article interesting?Please follow us twitter โ—‹ When LinkedIn To read more exclusive content that we post.

cropped-BTA_Logo-B-1-scaled-1
YOUR FUTURE STARTS HERE.

BLUE TRAINING ACADEMY

Register now for our membership to gain access to our elite training program and fast forward your career today!

Newsletter

Subscribe my Newsletter for new blog posts, tips & new photos. Let's stay updated!

cropped-BTA_Logo-B-1-scaled-1
Security Blog

Blue Training Academy

Blue Training Academy was developed in 2018 as a educational and training facility for continuing education and certification courses. Blue Training Academy is an educational institution that allows for all sectors of the public and Criminal Justice field to gain ongoing training and education.

Copyright ยฉ๏ธ All rights reserved. | Blue Training Academy Blog