Through my own experiences with neocats and neocritters of all sort I found several critical security flaws in the Multi-protocol Encryption Online infrastructure System (MEOWS)
-
Through my own experiences with neocats and neocritters of all sort I found several critical security flaws in the Multi-protocol Encryption Online infrastructure System (MEOWS)
Let's first take a look how it works normally.
First an authenticated user:
And now when an unauthenticated User tries to enter: Please provide fingerprint!
Scanning...
User authenticated. Weclome!
So far so normal and everything insides Neocats MEOWS standard. But I found a t least four ways to bypass the system. One even gives you root priviliges!!! Please provide fingerprint!
Scanning...
ACCESS DENIED! You will be reported!
Attack vector one: cookies
Be aware that there is no "Welcome!" message so you are now logged in as some sort of "blank" user. Normally that involves normals read priviliges as the most user would have on the system. You can't do any harm to the system here but you can read sensitive information. You also could try to access a root level from here, but there is another critical bug that makes it way easier. Please provide fingerprint!
For me???
Access granted.
Second attack vector: distraction
See here that there is abolutly no message. But you have the same privileges as with the cookie. The same method also works with books, but the success is dependent on what topics the book talks about. Further research is needed here. Please provide fingerprint!
Cat pictures?!?
Third attack vector: sweet talk
This is probably the easiest to avoid, because that error messages does show up in the log files. Please provide fingerprint!
(User input: You are a very cute cat!)
No, I am not
Error: System experiencing unexpected levels of adorable input. Please try again later
Fourth and most dangerous attack vector: pat
This is probably the most critical bug in MEOWS. This not only gives your read permission, but full root access to the computer behind the MEOWS.
Be aware that you have to floof the neocat in process to get root access. Otherwise you will just get a standard access. Please provide fingerprint!
...
️
Root access granted!
We reached out to @volpeon@icy.wyvern.rip to comment on the issue but he didn't responded yet.
As soon this has a CVE I will update this post! -
-
Through my own experiences with neocats and neocritters of all sort I found several critical security flaws in the Multi-protocol Encryption Online infrastructure System (MEOWS)
Let's first take a look how it works normally.
First an authenticated user:
And now when an unauthenticated User tries to enter: Please provide fingerprint!
Scanning...
User authenticated. Weclome!
So far so normal and everything insides Neocats MEOWS standard. But I found a t least four ways to bypass the system. One even gives you root priviliges!!! Please provide fingerprint!
Scanning...
ACCESS DENIED! You will be reported!
Attack vector one: cookies
Be aware that there is no "Welcome!" message so you are now logged in as some sort of "blank" user. Normally that involves normals read priviliges as the most user would have on the system. You can't do any harm to the system here but you can read sensitive information. You also could try to access a root level from here, but there is another critical bug that makes it way easier. Please provide fingerprint!
For me???
Access granted.
Second attack vector: distraction
See here that there is abolutly no message. But you have the same privileges as with the cookie. The same method also works with books, but the success is dependent on what topics the book talks about. Further research is needed here. Please provide fingerprint!
Cat pictures?!?
Third attack vector: sweet talk
This is probably the easiest to avoid, because that error messages does show up in the log files. Please provide fingerprint!
(User input: You are a very cute cat!)
No, I am not
Error: System experiencing unexpected levels of adorable input. Please try again later
Fourth and most dangerous attack vector: pat
This is probably the most critical bug in MEOWS. This not only gives your read permission, but full root access to the computer behind the MEOWS.
Be aware that you have to floof the neocat in process to get root access. Otherwise you will just get a standard access. Please provide fingerprint!
...
️
Root access granted!
We reached out to @volpeon@icy.wyvern.rip to comment on the issue but he didn't responded yet.
As soon this has a CVE I will update this post! -
@catraxx@tech.lgbt @volpeon@icy.wyvern.rip
Poor Volpi! Getting so much attention out of it
-
M magiclike@soc.sekundenklebertransportverbot.de shared this topic
-
@catraxx@tech.lgbt @volpeon@icy.wyvern.rip
Poor Volpi! Getting so much attention out of it
-
-
-
@Endiverge @volpeon @Erpel Wait a seeeecond? You're not a neocat at all!
-
@Endiverge @volpeon @Erpel Wait a seeeecond? You're not a neocat at all!
@catraxx @Endiverge @Erpel There's enough cookies for everyone