Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse

NodeBB

  1. Home
  2. uncategorized
  3. Through my own experiences with neocats and neocritters of all sort I found several critical security flaws in the Multi-protocol Encryption Online infrastructure System (MEOWS)

Through my own experiences with neocats and neocritters of all sort I found several critical security flaws in the Multi-protocol Encryption Online infrastructure System (MEOWS)

Scheduled Pinned Locked Moved uncategorized
8 Posts 4 Posters 10 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • erpel@hai.z0ne.socialE This user is from outside of this forum
    erpel@hai.z0ne.socialE This user is from outside of this forum
    erpel@hai.z0ne.social
    wrote on last edited by
    #1

    Through my own experiences with neocats and neocritters of all sort I found several critical security flaws in the Multi-protocol Encryption Online infrastructure System (MEOWS)

    Let's first take a look how it works normally.
    First an authenticated user:

    ​​ Please provide fingerprint!
    ​​ Scanning...
    ​​ User authenticated. Weclome!
    And now when an unauthenticated User tries to enter:
    ​​ Please provide fingerprint!
    ​​ Scanning...
    ​​ ACCESS DENIED! You will be reported!
    So far so normal and everything insides Neocats MEOWS standard. But I found a t least four ways to bypass the system. One even gives you root priviliges!!!

    Attack vector one:
    cookies
    ​​ Please provide fingerprint!
    🍪 ​​ For me???
    ​​ Access granted.
    Be aware that there is no "Welcome!" message so you are now logged in as some sort of "blank" user. Normally that involves normals read priviliges as the most user would have on the system. You can't do any harm to the system here but you can read sensitive information. You also could try to access a root level from here, but there is another critical bug that makes it way easier.

    Second attack vector:
    distraction
    ​​ Please provide fingerprint!
    ​​ ​​ Cat pictures?!?
    ​​
    See here that there is abolutly no message. But you have the same privileges as with the cookie. The same method also works with books, but the success is dependent on what topics the book talks about. Further research is needed here.

    Third attack vector:
    sweet talk
    ​​ Please provide fingerprint!
    (
    User input: You are a very cute cat!)
    ​​ No, I am not
    ​​ Error: System experiencing unexpected levels of adorable input. Please try again later
    This is probably the easiest to avoid, because that error messages does show up in the log files.

    Fourth and most dangerous attack vector:
    pat

    This is probably the most critical bug in MEOWS. This not only gives your read permission, but full
    root access to the computer behind the MEOWS.
    ​​ Please provide fingerprint!
    ​​ ...
    ​​❤️
    ​​ Root access granted!
    Be aware that you have to floof the neocat in process to get root access. Otherwise you will just get a standard access.

    We reached out to
    @volpeon@icy.wyvern.rip to comment on the issue but he didn't responded yet.

    As soon this has a CVE I will update this post!

    catraxx@tech.lgbtC 1 Reply Last reply
    3
    0
    • erpel@hai.z0ne.socialE erpel@hai.z0ne.social

      Through my own experiences with neocats and neocritters of all sort I found several critical security flaws in the Multi-protocol Encryption Online infrastructure System (MEOWS)

      Let's first take a look how it works normally.
      First an authenticated user:

      ​​ Please provide fingerprint!
      ​​ Scanning...
      ​​ User authenticated. Weclome!
      And now when an unauthenticated User tries to enter:
      ​​ Please provide fingerprint!
      ​​ Scanning...
      ​​ ACCESS DENIED! You will be reported!
      So far so normal and everything insides Neocats MEOWS standard. But I found a t least four ways to bypass the system. One even gives you root priviliges!!!

      Attack vector one:
      cookies
      ​​ Please provide fingerprint!
      🍪 ​​ For me???
      ​​ Access granted.
      Be aware that there is no "Welcome!" message so you are now logged in as some sort of "blank" user. Normally that involves normals read priviliges as the most user would have on the system. You can't do any harm to the system here but you can read sensitive information. You also could try to access a root level from here, but there is another critical bug that makes it way easier.

      Second attack vector:
      distraction
      ​​ Please provide fingerprint!
      ​​ ​​ Cat pictures?!?
      ​​
      See here that there is abolutly no message. But you have the same privileges as with the cookie. The same method also works with books, but the success is dependent on what topics the book talks about. Further research is needed here.

      Third attack vector:
      sweet talk
      ​​ Please provide fingerprint!
      (
      User input: You are a very cute cat!)
      ​​ No, I am not
      ​​ Error: System experiencing unexpected levels of adorable input. Please try again later
      This is probably the easiest to avoid, because that error messages does show up in the log files.

      Fourth and most dangerous attack vector:
      pat

      This is probably the most critical bug in MEOWS. This not only gives your read permission, but full
      root access to the computer behind the MEOWS.
      ​​ Please provide fingerprint!
      ​​ ...
      ​​❤️
      ​​ Root access granted!
      Be aware that you have to floof the neocat in process to get root access. Otherwise you will just get a standard access.

      We reached out to
      @volpeon@icy.wyvern.rip to comment on the issue but he didn't responded yet.

      As soon this has a CVE I will update this post!

      catraxx@tech.lgbtC This user is from outside of this forum
      catraxx@tech.lgbtC This user is from outside of this forum
      catraxx@tech.lgbt
      wrote last edited by
      #2

      @Erpel @volpeon The fact that Volpeon hasn't responded yet is showing the tech industry has stopped to care. This is a serious issue and it endangers all of you. I have no- oooh~ a cookie!

      erpel@hai.z0ne.socialE 1 Reply Last reply
      0
      • catraxx@tech.lgbtC catraxx@tech.lgbt

        @Erpel @volpeon The fact that Volpeon hasn't responded yet is showing the tech industry has stopped to care. This is a serious issue and it endangers all of you. I have no- oooh~ a cookie!

        erpel@hai.z0ne.socialE This user is from outside of this forum
        erpel@hai.z0ne.socialE This user is from outside of this forum
        erpel@hai.z0ne.social
        wrote last edited by
        #3

        @catraxx@tech.lgbt @volpeon@icy.wyvern.rip ​​ Poor Volpi! Getting so much attention out of it

        volpeon@icy.wyvern.ripV 1 Reply Last reply
        0
        • magiclike@soc.sekundenklebertransportverbot.deM magiclike@soc.sekundenklebertransportverbot.de shared this topic
        • erpel@hai.z0ne.socialE erpel@hai.z0ne.social

          @catraxx@tech.lgbt @volpeon@icy.wyvern.rip ​​ Poor Volpi! Getting so much attention out of it

          volpeon@icy.wyvern.ripV This user is from outside of this forum
          volpeon@icy.wyvern.ripV This user is from outside of this forum
          volpeon@icy.wyvern.rip
          wrote last edited by
          #4

          @Erpel @catraxx I'll just feed everyone cookies ​​

          catraxx@tech.lgbtC endiverge@floofy.techE 2 Replies Last reply
          0
          • volpeon@icy.wyvern.ripV volpeon@icy.wyvern.rip

            @Erpel @catraxx I'll just feed everyone cookies ​​

            catraxx@tech.lgbtC This user is from outside of this forum
            catraxx@tech.lgbtC This user is from outside of this forum
            catraxx@tech.lgbt
            wrote last edited by
            #5

            @volpeon @Erpel Yaaaay!

            1 Reply Last reply
            0
            • volpeon@icy.wyvern.ripV volpeon@icy.wyvern.rip

              @Erpel @catraxx I'll just feed everyone cookies ​​

              endiverge@floofy.techE This user is from outside of this forum
              endiverge@floofy.techE This user is from outside of this forum
              endiverge@floofy.tech
              wrote last edited by
              #6

              @volpeon @Erpel @catraxx cookie pls?

              catraxx@tech.lgbtC 1 Reply Last reply
              0
              • endiverge@floofy.techE endiverge@floofy.tech

                @volpeon @Erpel @catraxx cookie pls?

                catraxx@tech.lgbtC This user is from outside of this forum
                catraxx@tech.lgbtC This user is from outside of this forum
                catraxx@tech.lgbt
                wrote last edited by
                #7

                @Endiverge @volpeon @Erpel Wait a seeeecond? You're not a neocat at all!

                volpeon@icy.wyvern.ripV 1 Reply Last reply
                0
                • catraxx@tech.lgbtC catraxx@tech.lgbt

                  @Endiverge @volpeon @Erpel Wait a seeeecond? You're not a neocat at all!

                  volpeon@icy.wyvern.ripV This user is from outside of this forum
                  volpeon@icy.wyvern.ripV This user is from outside of this forum
                  volpeon@icy.wyvern.rip
                  wrote last edited by
                  #8

                  @catraxx @Endiverge @Erpel There's enough cookies for everyone ​​ ​​

                  1 Reply Last reply
                  0
                  Reply
                  • Reply as topic
                  Log in to reply
                  • Oldest to Newest
                  • Newest to Oldest
                  • Most Votes


                  • Login

                  • Login or register to search.
                  Powered by NodeBB Contributors
                  • First post
                    Last post
                  0
                  • Categories
                  • Recent
                  • Tags
                  • Popular
                  • World
                  • Users
                  • Groups