HomeCII/OT'0.0.0.0 Day' Vulnerability Exposes Chrome, Firefox, Mozilla Browsers to RCE Risk

‘0.0.0.0 Day’ Vulnerability Exposes Chrome, Firefox, Mozilla Browsers to RCE Risk

Published on

spot_img

Attackers have discovered a flaw that exploits the 0.0.0.0 IP address to remotely execute code on various Web browsers, including Chrome, Safari, Firefox, and others. This vulnerability puts users at risk for data theft, malware, and other malicious activity. Open source security firm Oligo Security recently uncovered this flaw, allowing attackers to bypass browser security measures and interact with services on an organization’s local network from outside the network. Dubbed the “0.0.0.0 Day” exploit, this vulnerability stems from the inconsistent implementation of security mechanisms and a lack of standardization in the browser industry.

According to Avi Lumesky, an Oligo AI security researcher, browsers have a design flaw that enables services to send requests to almost any HTTP server using JavaScript. While browsers are intended to prevent malicious requests, there has been a historical lack of streamlined security in handling these requests, leading to the exploitation of the 0.0.0.0 IP address. This flaw allows attackers to exploit localhost application programming interfaces (APIs) from the browser, enabling a variety of malicious activities.

The introduction of Private Network Access (PNA) by Chrome was believed to protect against the 0.0.0.0 day bug, distinguishing between public, private, and local networks to prevent communication between less-secure and more-secure contexts. However, Oligo researchers found that requests to 0.0.0.0 were still processed by local servers, allowing public websites to access open ports on hosts without detection. This enabled attacks like ShadowRay to execute arbitrary code when a private server was inadvertently exposed to the Internet.

To mitigate these attacks, Oligo disclosed its findings to browser owners like Google, Apple, and Mozilla, prompting fixes in their browsers to block 0.0.0.0 as a target IP address. In addition to these fixes, network administrators can implement technical mitigations such as PNA headers, verifying HOST headers of network requests, and using HTTPS over HTTP when possible. It is also advised to implement CSRF tokens in applications and add a layer of authorization, even when running on localhost.

In conclusion, the discovery of the 0.0.0.0 day exploit highlights the importance of strengthening browser security measures and implementing robust network protections to prevent remote code execution attacks. By collaborating with browser owners and implementing recommended mitigations, users and organizations can better safeguard against malicious activities exploiting the 0.0.0.0 IP address.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...