CyberSecurity SEE

‘0.0.0.0 Day’ Vulnerability Exposes Chrome, Firefox, Mozilla Browsers to RCE Risk

‘0.0.0.0 Day’ Vulnerability Exposes Chrome, Firefox, Mozilla Browsers to RCE Risk

Attackers have discovered a flaw that exploits the 0.0.0.0 IP address to remotely execute code on various Web browsers, including Chrome, Safari, Firefox, and others. This vulnerability puts users at risk for data theft, malware, and other malicious activity. Open source security firm Oligo Security recently uncovered this flaw, allowing attackers to bypass browser security measures and interact with services on an organization’s local network from outside the network. Dubbed the “0.0.0.0 Day” exploit, this vulnerability stems from the inconsistent implementation of security mechanisms and a lack of standardization in the browser industry.

According to Avi Lumesky, an Oligo AI security researcher, browsers have a design flaw that enables services to send requests to almost any HTTP server using JavaScript. While browsers are intended to prevent malicious requests, there has been a historical lack of streamlined security in handling these requests, leading to the exploitation of the 0.0.0.0 IP address. This flaw allows attackers to exploit localhost application programming interfaces (APIs) from the browser, enabling a variety of malicious activities.

The introduction of Private Network Access (PNA) by Chrome was believed to protect against the 0.0.0.0 day bug, distinguishing between public, private, and local networks to prevent communication between less-secure and more-secure contexts. However, Oligo researchers found that requests to 0.0.0.0 were still processed by local servers, allowing public websites to access open ports on hosts without detection. This enabled attacks like ShadowRay to execute arbitrary code when a private server was inadvertently exposed to the Internet.

To mitigate these attacks, Oligo disclosed its findings to browser owners like Google, Apple, and Mozilla, prompting fixes in their browsers to block 0.0.0.0 as a target IP address. In addition to these fixes, network administrators can implement technical mitigations such as PNA headers, verifying HOST headers of network requests, and using HTTPS over HTTP when possible. It is also advised to implement CSRF tokens in applications and add a layer of authorization, even when running on localhost.

In conclusion, the discovery of the 0.0.0.0 day exploit highlights the importance of strengthening browser security measures and implementing robust network protections to prevent remote code execution attacks. By collaborating with browser owners and implementing recommended mitigations, users and organizations can better safeguard against malicious activities exploiting the 0.0.0.0 IP address.

Source link

Exit mobile version