HomeCyber Balkans0.0.0.0 Day - 18 Year Old Vulnerability Allows Attackers to Bypass All...

0.0.0.0 Day – 18 Year Old Vulnerability Allows Attackers to Bypass All Browser Security

Published on

spot_img

In recent times, threat actors have continued to exploit security flaws in web browsers to gain unauthorized access and carry out illicit activities. Exploiting these vulnerabilities not only provides them unauthorized access but also offers a wide attack surface with minimal effort. Cybersecurity researchers at Oligo Security’s research team made a significant discovery – an 18-year-old vulnerability known as “0.0.0.0 day” that allows attackers to bypass all browser security measures.

This vulnerability poses a major security threat to all popular web browsers such as Chromium, Firefox, and Safari. It enables external websites to interact with software running locally on macOS and Linux systems. The root cause of this vulnerability, named “ow.night,” lies in the inconsistent implementation of security mechanisms across different browsers due to the lack of uniform standards in the industry.

The consequences of this vulnerability are severe as malicious websites can bypass browser security and communicate with an organization’s local network services. This could potentially lead to hackers gaining unauthorized access to network resources and executing remote code on local services. By using a seemingly harmless 0.0.0.0 IP address, attackers can target local services, operating systems, and internal networks for malicious purposes.

The urgency of addressing this vulnerability was highlighted by the discovery of active campaigns exploiting it, such as ShadowRay. Oligo researchers promptly shared their findings with major browser security teams, and the vendors acknowledged the security issue. Efforts are being made to implement related standard modifications and browser-level mitigations to mitigate the risk posed by this vulnerability.

Despite these efforts, the complexity of the issue, coupled with the absence of a finalized industry standard, means that this vulnerability is still under attack. External websites may still be able to access services on localhost, underscoring the need for a common industry standard to address this fundamental security flaw and protect users and organizations from potential threats.

The vulnerability originated from the Private Network Access (PNA) standard, which did not consider 0.0.0.0 as a private IP address. This oversight allowed hackers to exploit public domains to access local resources while evading CORS restrictions and exploiting vulnerabilities in frameworks like Ray, Selenium Grid, and PyTorch TorchServe installed on localhost.

The researchers provided a compelling example of how a single HTTP request could be used to gain unauthorized access and control over local applications, emphasizing the importance of a standardized approach to securing local network access. Responsible disclosure of such vulnerabilities can significantly contribute to enhancing internet security and mitigating potential risks.

In light of these findings, several recommendations have been made to enhance browser security, including implementing PNA headers, verifying HOST headers to prevent DNS rebinding, adding authorization layers for localhost, using HTTPS, implementing CSRF tokens, and being mindful of browsers routing to internal IPs. By following these recommendations, organizations can bolster their defenses against potential threats exploiting browser vulnerabilities.

Source link

Latest articles

Stopping AiTM Attacks: Effective Defenses After Authentication Success

Rethinking Phishing: The Rise of AiTM Attacks and Effective Defensive Strategies In the evolving landscape...

Ransomware Turf War: 0APT and KryBit Groups Clash

Ransomware Groups in Disarray Following Data Leak Conflict In a dramatic turn of events within...

Germany Involved in Potential Russian Signal Phishing Attack

Governments Alerted to Kremlin-Linked Social Engineering Attacks In a growing narrative surrounding cyber threats, the...

Shadow Code: A Hidden Threat to Enterprise IT

The Emerging Threat of Shadow Code in Enterprises In today's rapidly evolving technological landscape, enterprises...

More like this

Stopping AiTM Attacks: Effective Defenses After Authentication Success

Rethinking Phishing: The Rise of AiTM Attacks and Effective Defensive Strategies In the evolving landscape...

Ransomware Turf War: 0APT and KryBit Groups Clash

Ransomware Groups in Disarray Following Data Leak Conflict In a dramatic turn of events within...

Germany Involved in Potential Russian Signal Phishing Attack

Governments Alerted to Kremlin-Linked Social Engineering Attacks In a growing narrative surrounding cyber threats, the...