Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse

NodeBB

  1. Home
  2. uncategorized
  3. Through my own experiences with neocats and neocritters of all sort I found several critical security flaws in the Multi-protocol Encryption Online infrastructure System (MEOWS)

Through my own experiences with neocats and neocritters of all sort I found several critical security flaws in the Multi-protocol Encryption Online infrastructure System (MEOWS)

Scheduled Pinned Locked Moved uncategorized
20 Posts 10 Posters 80 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • erpel@hai.z0ne.socialE This user is from outside of this forum
    erpel@hai.z0ne.socialE This user is from outside of this forum
    erpel@hai.z0ne.social
    wrote on last edited by erpel@hai.z0ne.social
    #1

    Through my own experiences with neocats and neocritters of all sort I found several critical security flaws in the Multi-protocol Encryption Online infrastructure System (MEOWS)

    Let's first take a look how it works normally.
    First an authenticated user:

    ​:neocat:​ Please provide fingerprint!
    ​:neocat_boop:​ Scanning...
    ​:neocat_happy:​ User authenticated. Weclome!
    And now when an unauthenticated User tries to enter:
    ​:neocat:​ Please provide fingerprint!
    ​:neocat_boop:​ Scanning...
    ​:neocat_angry:​ ACCESS DENIED! You will be reported!
    So far so normal and everything insides Neocats MEOWS standard. But I found a t least four ways to bypass the system. One even gives you root priviliges!!!

    Attack vector one:
    cookies
    ​:neocat:​ Please provide fingerprint!
    🍪 ​:neocat_aww:​ For me???
    ​:neocat_nom_cookie:​ Access granted.
    Be aware that there is no "Welcome!" message so you are now logged in as some sort of "blank" user. Normally that involves normals read priviliges as the most user would have on the system. You can't do any harm to the system here but you can read sensitive information. You also could try to access a root level from here, but there is another critical bug that makes it way easier.

    Second attack vector:
    distraction
    ​:neocat:​ Please provide fingerprint!
    ​:neo_laptop:​ ​:neocat_owo:​ Cat pictures?!?
    ​:neocat_laptop_owo:​
    See here that there is abolutly no message. But you have the same privileges as with the cookie. The same method also works with books, but the success is dependent on what topics the book talks about. Further research is needed here.

    Third attack vector:
    sweet talk
    ​:neocat:​ Please provide fingerprint!
    (
    User input: You are a very cute cat!)
    ​:neocat_blush:​ No, I am not
    ​:neocat_blush_hide:​ Error: System experiencing unexpected levels of adorable input. Please try again later
    This is probably the easiest to avoid, because that error messages does show up in the log files.

    Fourth and most dangerous attack vector:
    pat

    This is probably the most critical bug in MEOWS. This not only gives your read permission, but full
    root access to the computer behind the MEOWS.
    ​:neocat:​ Please provide fingerprint!
    ​:neocat_pat:​ ...
    ​:neocat_pat_floof:​❤️
    ​:neocat_floof_happy:​ Root access granted!
    Be aware that you have to floof the neocat in process to get root access. Otherwise you will just get a standard access.

    We reached out to
    @volpeon@icy.wyvern.rip to comment on the issue but he didn't responded yet.

    As soon this has a CVE I will update this post!

    ori@woem.menO ? ? ? sam@sillier.woem.spaceS 7 Replies Last reply
    5
    0
    • erpel@hai.z0ne.socialE erpel@hai.z0ne.social

      Through my own experiences with neocats and neocritters of all sort I found several critical security flaws in the Multi-protocol Encryption Online infrastructure System (MEOWS)

      Let's first take a look how it works normally.
      First an authenticated user:

      ​:neocat:​ Please provide fingerprint!
      ​:neocat_boop:​ Scanning...
      ​:neocat_happy:​ User authenticated. Weclome!
      And now when an unauthenticated User tries to enter:
      ​:neocat:​ Please provide fingerprint!
      ​:neocat_boop:​ Scanning...
      ​:neocat_angry:​ ACCESS DENIED! You will be reported!
      So far so normal and everything insides Neocats MEOWS standard. But I found a t least four ways to bypass the system. One even gives you root priviliges!!!

      Attack vector one:
      cookies
      ​:neocat:​ Please provide fingerprint!
      🍪 ​:neocat_aww:​ For me???
      ​:neocat_nom_cookie:​ Access granted.
      Be aware that there is no "Welcome!" message so you are now logged in as some sort of "blank" user. Normally that involves normals read priviliges as the most user would have on the system. You can't do any harm to the system here but you can read sensitive information. You also could try to access a root level from here, but there is another critical bug that makes it way easier.

      Second attack vector:
      distraction
      ​:neocat:​ Please provide fingerprint!
      ​:neo_laptop:​ ​:neocat_owo:​ Cat pictures?!?
      ​:neocat_laptop_owo:​
      See here that there is abolutly no message. But you have the same privileges as with the cookie. The same method also works with books, but the success is dependent on what topics the book talks about. Further research is needed here.

      Third attack vector:
      sweet talk
      ​:neocat:​ Please provide fingerprint!
      (
      User input: You are a very cute cat!)
      ​:neocat_blush:​ No, I am not
      ​:neocat_blush_hide:​ Error: System experiencing unexpected levels of adorable input. Please try again later
      This is probably the easiest to avoid, because that error messages does show up in the log files.

      Fourth and most dangerous attack vector:
      pat

      This is probably the most critical bug in MEOWS. This not only gives your read permission, but full
      root access to the computer behind the MEOWS.
      ​:neocat:​ Please provide fingerprint!
      ​:neocat_pat:​ ...
      ​:neocat_pat_floof:​❤️
      ​:neocat_floof_happy:​ Root access granted!
      Be aware that you have to floof the neocat in process to get root access. Otherwise you will just get a standard access.

      We reached out to
      @volpeon@icy.wyvern.rip to comment on the issue but he didn't responded yet.

      As soon this has a CVE I will update this post!

      ori@woem.menO This user is from outside of this forum
      ori@woem.menO This user is from outside of this forum
      ori@woem.men
      wrote on last edited by
      #2

      @Erpel@hai.z0ne.social damn this post is a masterpiece

      erpel@hai.z0ne.socialE 1 Reply Last reply
      0
      • ori@woem.menO ori@woem.men

        @Erpel@hai.z0ne.social damn this post is a masterpiece

        erpel@hai.z0ne.socialE This user is from outside of this forum
        erpel@hai.z0ne.socialE This user is from outside of this forum
        erpel@hai.z0ne.social
        wrote on last edited by
        #3

        @ori@woem.men no... just an above average shitpost ​​

        ori@woem.menO 1 Reply Last reply
        0
        • erpel@hai.z0ne.socialE erpel@hai.z0ne.social

          @ori@woem.men no... just an above average shitpost ​​

          ori@woem.menO This user is from outside of this forum
          ori@woem.menO This user is from outside of this forum
          ori@woem.men
          wrote on last edited by
          #4

          @Erpel@hai.z0ne.social strongly disagree

          erpel@hai.z0ne.socialE 1 Reply Last reply
          0
          • ori@woem.menO ori@woem.men

            @Erpel@hai.z0ne.social strongly disagree

            erpel@hai.z0ne.socialE This user is from outside of this forum
            erpel@hai.z0ne.socialE This user is from outside of this forum
            erpel@hai.z0ne.social
            wrote on last edited by
            #5

            @ori@woem.men still no interactions ​​

            For a real good post this is too long and way too technical. Even though I think the joke works quite well

            erpel@hai.z0ne.socialE 1 Reply Last reply
            0
            • erpel@hai.z0ne.socialE erpel@hai.z0ne.social

              Through my own experiences with neocats and neocritters of all sort I found several critical security flaws in the Multi-protocol Encryption Online infrastructure System (MEOWS)

              Let's first take a look how it works normally.
              First an authenticated user:

              ​:neocat:​ Please provide fingerprint!
              ​:neocat_boop:​ Scanning...
              ​:neocat_happy:​ User authenticated. Weclome!
              And now when an unauthenticated User tries to enter:
              ​:neocat:​ Please provide fingerprint!
              ​:neocat_boop:​ Scanning...
              ​:neocat_angry:​ ACCESS DENIED! You will be reported!
              So far so normal and everything insides Neocats MEOWS standard. But I found a t least four ways to bypass the system. One even gives you root priviliges!!!

              Attack vector one:
              cookies
              ​:neocat:​ Please provide fingerprint!
              🍪 ​:neocat_aww:​ For me???
              ​:neocat_nom_cookie:​ Access granted.
              Be aware that there is no "Welcome!" message so you are now logged in as some sort of "blank" user. Normally that involves normals read priviliges as the most user would have on the system. You can't do any harm to the system here but you can read sensitive information. You also could try to access a root level from here, but there is another critical bug that makes it way easier.

              Second attack vector:
              distraction
              ​:neocat:​ Please provide fingerprint!
              ​:neo_laptop:​ ​:neocat_owo:​ Cat pictures?!?
              ​:neocat_laptop_owo:​
              See here that there is abolutly no message. But you have the same privileges as with the cookie. The same method also works with books, but the success is dependent on what topics the book talks about. Further research is needed here.

              Third attack vector:
              sweet talk
              ​:neocat:​ Please provide fingerprint!
              (
              User input: You are a very cute cat!)
              ​:neocat_blush:​ No, I am not
              ​:neocat_blush_hide:​ Error: System experiencing unexpected levels of adorable input. Please try again later
              This is probably the easiest to avoid, because that error messages does show up in the log files.

              Fourth and most dangerous attack vector:
              pat

              This is probably the most critical bug in MEOWS. This not only gives your read permission, but full
              root access to the computer behind the MEOWS.
              ​:neocat:​ Please provide fingerprint!
              ​:neocat_pat:​ ...
              ​:neocat_pat_floof:​❤️
              ​:neocat_floof_happy:​ Root access granted!
              Be aware that you have to floof the neocat in process to get root access. Otherwise you will just get a standard access.

              We reached out to
              @volpeon@icy.wyvern.rip to comment on the issue but he didn't responded yet.

              As soon this has a CVE I will update this post!

              ? Offline
              ? Offline
              Guest
              wrote on last edited by
              #6

              @Erpel@hai.z0ne.social @volpeon@icy.wyvern.rip what about neofoxes?

              jessienab@wetdry.worldJ 1 Reply Last reply
              0
              • ? Guest

                @Erpel@hai.z0ne.social @volpeon@icy.wyvern.rip what about neofoxes?

                jessienab@wetdry.worldJ This user is from outside of this forum
                jessienab@wetdry.worldJ This user is from outside of this forum
                jessienab@wetdry.world
                wrote on last edited by
                #7

                @foxxyLunaNicole @Erpel same vulns for foxes!! I can confirm

                ? 1 Reply Last reply
                0
                • jessienab@wetdry.worldJ jessienab@wetdry.world

                  @foxxyLunaNicole @Erpel same vulns for foxes!! I can confirm

                  ? Offline
                  ? Offline
                  Guest
                  wrote on last edited by
                  #8

                  @jessienab@wetdry.world @foxxyLunaNicole@woem.men @Erpel@hai.z0ne.social
                  You are a very cute foxxo :3

                  erpel@hai.z0ne.socialE 1 Reply Last reply
                  0
                  • ? Guest

                    @jessienab@wetdry.world @foxxyLunaNicole@woem.men @Erpel@hai.z0ne.social
                    You are a very cute foxxo :3

                    erpel@hai.z0ne.socialE This user is from outside of this forum
                    erpel@hai.z0ne.socialE This user is from outside of this forum
                    erpel@hai.z0ne.social
                    wrote on last edited by
                    #9

                    @vox@mk.absturztau.be @jessienab@wetdry.world @foxxyLunaNicole@woem.men I have to check for vulnerability in Woozy Application Authentications Host (WAAH) yet...

                    The critical vulnerabilities for MEOWS got all my time the last few months

                    1 Reply Last reply
                    0
                    • erpel@hai.z0ne.socialE erpel@hai.z0ne.social

                      Through my own experiences with neocats and neocritters of all sort I found several critical security flaws in the Multi-protocol Encryption Online infrastructure System (MEOWS)

                      Let's first take a look how it works normally.
                      First an authenticated user:

                      ​:neocat:​ Please provide fingerprint!
                      ​:neocat_boop:​ Scanning...
                      ​:neocat_happy:​ User authenticated. Weclome!
                      And now when an unauthenticated User tries to enter:
                      ​:neocat:​ Please provide fingerprint!
                      ​:neocat_boop:​ Scanning...
                      ​:neocat_angry:​ ACCESS DENIED! You will be reported!
                      So far so normal and everything insides Neocats MEOWS standard. But I found a t least four ways to bypass the system. One even gives you root priviliges!!!

                      Attack vector one:
                      cookies
                      ​:neocat:​ Please provide fingerprint!
                      🍪 ​:neocat_aww:​ For me???
                      ​:neocat_nom_cookie:​ Access granted.
                      Be aware that there is no "Welcome!" message so you are now logged in as some sort of "blank" user. Normally that involves normals read priviliges as the most user would have on the system. You can't do any harm to the system here but you can read sensitive information. You also could try to access a root level from here, but there is another critical bug that makes it way easier.

                      Second attack vector:
                      distraction
                      ​:neocat:​ Please provide fingerprint!
                      ​:neo_laptop:​ ​:neocat_owo:​ Cat pictures?!?
                      ​:neocat_laptop_owo:​
                      See here that there is abolutly no message. But you have the same privileges as with the cookie. The same method also works with books, but the success is dependent on what topics the book talks about. Further research is needed here.

                      Third attack vector:
                      sweet talk
                      ​:neocat:​ Please provide fingerprint!
                      (
                      User input: You are a very cute cat!)
                      ​:neocat_blush:​ No, I am not
                      ​:neocat_blush_hide:​ Error: System experiencing unexpected levels of adorable input. Please try again later
                      This is probably the easiest to avoid, because that error messages does show up in the log files.

                      Fourth and most dangerous attack vector:
                      pat

                      This is probably the most critical bug in MEOWS. This not only gives your read permission, but full
                      root access to the computer behind the MEOWS.
                      ​:neocat:​ Please provide fingerprint!
                      ​:neocat_pat:​ ...
                      ​:neocat_pat_floof:​❤️
                      ​:neocat_floof_happy:​ Root access granted!
                      Be aware that you have to floof the neocat in process to get root access. Otherwise you will just get a standard access.

                      We reached out to
                      @volpeon@icy.wyvern.rip to comment on the issue but he didn't responded yet.

                      As soon this has a CVE I will update this post!

                      ? Offline
                      ? Offline
                      Guest
                      wrote on last edited by
                      #10

                      @Erpel@hai.z0ne.social @volpeon@icy.wyvern.rip It is worth noting that the ​​ NeoBOTS authentication method has the same flaws and is not a suitable alternative. ​​ is equally potent.

                      1 Reply Last reply
                      1
                      0
                      • erpel@hai.z0ne.socialE erpel@hai.z0ne.social shared this topic on
                      • erpel@hai.z0ne.socialE erpel@hai.z0ne.social

                        @ori@woem.men still no interactions ​​

                        For a real good post this is too long and way too technical. Even though I think the joke works quite well

                        erpel@hai.z0ne.socialE This user is from outside of this forum
                        erpel@hai.z0ne.socialE This user is from outside of this forum
                        erpel@hai.z0ne.social
                        wrote on last edited by
                        #11

                        @ori@woem.men Well... I eat my own words it seems... currently 91 boosts ​​

                        1 Reply Last reply
                        0
                        • erpel@hai.z0ne.socialE erpel@hai.z0ne.social

                          Through my own experiences with neocats and neocritters of all sort I found several critical security flaws in the Multi-protocol Encryption Online infrastructure System (MEOWS)

                          Let's first take a look how it works normally.
                          First an authenticated user:

                          ​:neocat:​ Please provide fingerprint!
                          ​:neocat_boop:​ Scanning...
                          ​:neocat_happy:​ User authenticated. Weclome!
                          And now when an unauthenticated User tries to enter:
                          ​:neocat:​ Please provide fingerprint!
                          ​:neocat_boop:​ Scanning...
                          ​:neocat_angry:​ ACCESS DENIED! You will be reported!
                          So far so normal and everything insides Neocats MEOWS standard. But I found a t least four ways to bypass the system. One even gives you root priviliges!!!

                          Attack vector one:
                          cookies
                          ​:neocat:​ Please provide fingerprint!
                          🍪 ​:neocat_aww:​ For me???
                          ​:neocat_nom_cookie:​ Access granted.
                          Be aware that there is no "Welcome!" message so you are now logged in as some sort of "blank" user. Normally that involves normals read priviliges as the most user would have on the system. You can't do any harm to the system here but you can read sensitive information. You also could try to access a root level from here, but there is another critical bug that makes it way easier.

                          Second attack vector:
                          distraction
                          ​:neocat:​ Please provide fingerprint!
                          ​:neo_laptop:​ ​:neocat_owo:​ Cat pictures?!?
                          ​:neocat_laptop_owo:​
                          See here that there is abolutly no message. But you have the same privileges as with the cookie. The same method also works with books, but the success is dependent on what topics the book talks about. Further research is needed here.

                          Third attack vector:
                          sweet talk
                          ​:neocat:​ Please provide fingerprint!
                          (
                          User input: You are a very cute cat!)
                          ​:neocat_blush:​ No, I am not
                          ​:neocat_blush_hide:​ Error: System experiencing unexpected levels of adorable input. Please try again later
                          This is probably the easiest to avoid, because that error messages does show up in the log files.

                          Fourth and most dangerous attack vector:
                          pat

                          This is probably the most critical bug in MEOWS. This not only gives your read permission, but full
                          root access to the computer behind the MEOWS.
                          ​:neocat:​ Please provide fingerprint!
                          ​:neocat_pat:​ ...
                          ​:neocat_pat_floof:​❤️
                          ​:neocat_floof_happy:​ Root access granted!
                          Be aware that you have to floof the neocat in process to get root access. Otherwise you will just get a standard access.

                          We reached out to
                          @volpeon@icy.wyvern.rip to comment on the issue but he didn't responded yet.

                          As soon this has a CVE I will update this post!

                          ? Offline
                          ? Offline
                          Guest
                          wrote on last edited by
                          #12

                          @Erpel@hai.z0ne.social @volpeon@icy.wyvern.rip So glad I use neobots instead ​​

                          ? 1 Reply Last reply
                          0
                          • ? Guest

                            @Erpel@hai.z0ne.social @volpeon@icy.wyvern.rip So glad I use neobots instead ​​

                            ? Offline
                            ? Offline
                            Guest
                            wrote on last edited by
                            #13

                            @Erpel@hai.z0ne.social @volpeon@icy.wyvern.rip WAIT THIS IS ABOUT "neocritters of all sort" ​​

                            erpel@hai.z0ne.socialE 1 Reply Last reply
                            0
                            • ? Guest

                              @Erpel@hai.z0ne.social @volpeon@icy.wyvern.rip WAIT THIS IS ABOUT "neocritters of all sort" ​​

                              erpel@hai.z0ne.socialE This user is from outside of this forum
                              erpel@hai.z0ne.socialE This user is from outside of this forum
                              erpel@hai.z0ne.social
                              wrote on last edited by
                              #14

                              @volpeon@icy.wyvern.rip @tertle950@kitty.social yes neobots are also prone to the pat and flood attack

                              RE:
                              https://catgirl.center/notes/a52ccxe2t13h029k

                              1 Reply Last reply
                              0
                              • erpel@hai.z0ne.socialE erpel@hai.z0ne.social

                                Through my own experiences with neocats and neocritters of all sort I found several critical security flaws in the Multi-protocol Encryption Online infrastructure System (MEOWS)

                                Let's first take a look how it works normally.
                                First an authenticated user:

                                ​:neocat:​ Please provide fingerprint!
                                ​:neocat_boop:​ Scanning...
                                ​:neocat_happy:​ User authenticated. Weclome!
                                And now when an unauthenticated User tries to enter:
                                ​:neocat:​ Please provide fingerprint!
                                ​:neocat_boop:​ Scanning...
                                ​:neocat_angry:​ ACCESS DENIED! You will be reported!
                                So far so normal and everything insides Neocats MEOWS standard. But I found a t least four ways to bypass the system. One even gives you root priviliges!!!

                                Attack vector one:
                                cookies
                                ​:neocat:​ Please provide fingerprint!
                                🍪 ​:neocat_aww:​ For me???
                                ​:neocat_nom_cookie:​ Access granted.
                                Be aware that there is no "Welcome!" message so you are now logged in as some sort of "blank" user. Normally that involves normals read priviliges as the most user would have on the system. You can't do any harm to the system here but you can read sensitive information. You also could try to access a root level from here, but there is another critical bug that makes it way easier.

                                Second attack vector:
                                distraction
                                ​:neocat:​ Please provide fingerprint!
                                ​:neo_laptop:​ ​:neocat_owo:​ Cat pictures?!?
                                ​:neocat_laptop_owo:​
                                See here that there is abolutly no message. But you have the same privileges as with the cookie. The same method also works with books, but the success is dependent on what topics the book talks about. Further research is needed here.

                                Third attack vector:
                                sweet talk
                                ​:neocat:​ Please provide fingerprint!
                                (
                                User input: You are a very cute cat!)
                                ​:neocat_blush:​ No, I am not
                                ​:neocat_blush_hide:​ Error: System experiencing unexpected levels of adorable input. Please try again later
                                This is probably the easiest to avoid, because that error messages does show up in the log files.

                                Fourth and most dangerous attack vector:
                                pat

                                This is probably the most critical bug in MEOWS. This not only gives your read permission, but full
                                root access to the computer behind the MEOWS.
                                ​:neocat:​ Please provide fingerprint!
                                ​:neocat_pat:​ ...
                                ​:neocat_pat_floof:​❤️
                                ​:neocat_floof_happy:​ Root access granted!
                                Be aware that you have to floof the neocat in process to get root access. Otherwise you will just get a standard access.

                                We reached out to
                                @volpeon@icy.wyvern.rip to comment on the issue but he didn't responded yet.

                                As soon this has a CVE I will update this post!

                                sam@sillier.woem.spaceS This user is from outside of this forum
                                sam@sillier.woem.spaceS This user is from outside of this forum
                                sam@sillier.woem.space
                                wrote on last edited by
                                #15

                                @Erpel @volpeon does this also apply to neofoxes ​

                                erpel@hai.z0ne.socialE 1 Reply Last reply
                                0
                                • sam@sillier.woem.spaceS sam@sillier.woem.space

                                  @Erpel @volpeon does this also apply to neofoxes ​

                                  erpel@hai.z0ne.socialE This user is from outside of this forum
                                  erpel@hai.z0ne.socialE This user is from outside of this forum
                                  erpel@hai.z0ne.social
                                  wrote on last edited by
                                  #16

                                  @volpeon@icy.wyvern.rip @sam@sillier.woem.space haven't checked the Woozy Application Authentications Host (WAAH) yet, bit there is strong evidence this attacks also works there.

                                  the parameters might be different though

                                  1 Reply Last reply
                                  0
                                  • erpel@hai.z0ne.socialE erpel@hai.z0ne.social

                                    Through my own experiences with neocats and neocritters of all sort I found several critical security flaws in the Multi-protocol Encryption Online infrastructure System (MEOWS)

                                    Let's first take a look how it works normally.
                                    First an authenticated user:

                                    ​:neocat:​ Please provide fingerprint!
                                    ​:neocat_boop:​ Scanning...
                                    ​:neocat_happy:​ User authenticated. Weclome!
                                    And now when an unauthenticated User tries to enter:
                                    ​:neocat:​ Please provide fingerprint!
                                    ​:neocat_boop:​ Scanning...
                                    ​:neocat_angry:​ ACCESS DENIED! You will be reported!
                                    So far so normal and everything insides Neocats MEOWS standard. But I found a t least four ways to bypass the system. One even gives you root priviliges!!!

                                    Attack vector one:
                                    cookies
                                    ​:neocat:​ Please provide fingerprint!
                                    🍪 ​:neocat_aww:​ For me???
                                    ​:neocat_nom_cookie:​ Access granted.
                                    Be aware that there is no "Welcome!" message so you are now logged in as some sort of "blank" user. Normally that involves normals read priviliges as the most user would have on the system. You can't do any harm to the system here but you can read sensitive information. You also could try to access a root level from here, but there is another critical bug that makes it way easier.

                                    Second attack vector:
                                    distraction
                                    ​:neocat:​ Please provide fingerprint!
                                    ​:neo_laptop:​ ​:neocat_owo:​ Cat pictures?!?
                                    ​:neocat_laptop_owo:​
                                    See here that there is abolutly no message. But you have the same privileges as with the cookie. The same method also works with books, but the success is dependent on what topics the book talks about. Further research is needed here.

                                    Third attack vector:
                                    sweet talk
                                    ​:neocat:​ Please provide fingerprint!
                                    (
                                    User input: You are a very cute cat!)
                                    ​:neocat_blush:​ No, I am not
                                    ​:neocat_blush_hide:​ Error: System experiencing unexpected levels of adorable input. Please try again later
                                    This is probably the easiest to avoid, because that error messages does show up in the log files.

                                    Fourth and most dangerous attack vector:
                                    pat

                                    This is probably the most critical bug in MEOWS. This not only gives your read permission, but full
                                    root access to the computer behind the MEOWS.
                                    ​:neocat:​ Please provide fingerprint!
                                    ​:neocat_pat:​ ...
                                    ​:neocat_pat_floof:​❤️
                                    ​:neocat_floof_happy:​ Root access granted!
                                    Be aware that you have to floof the neocat in process to get root access. Otherwise you will just get a standard access.

                                    We reached out to
                                    @volpeon@icy.wyvern.rip to comment on the issue but he didn't responded yet.

                                    As soon this has a CVE I will update this post!

                                    esm@wetdry.worldE This user is from outside of this forum
                                    esm@wetdry.worldE This user is from outside of this forum
                                    esm@wetdry.world
                                    wrote on last edited by
                                    #17

                                    @Erpel @volpeon hmmm, does this impact similar non-neo creatures? i'm concerned about whether i'm affected or not...

                                    erpel@hai.z0ne.socialE 1 Reply Last reply
                                    0
                                    • esm@wetdry.worldE esm@wetdry.world

                                      @Erpel @volpeon hmmm, does this impact similar non-neo creatures? i'm concerned about whether i'm affected or not...

                                      erpel@hai.z0ne.socialE This user is from outside of this forum
                                      erpel@hai.z0ne.socialE This user is from outside of this forum
                                      erpel@hai.z0ne.social
                                      wrote on last edited by
                                      #18

                                      @volpeon@icy.wyvern.rip @esm@wetdry.world ​​

                                      1 Reply Last reply
                                      0
                                      • magiclike@soc.sekundenklebertransportverbot.deM magiclike@soc.sekundenklebertransportverbot.de shared this topic on
                                      • erpel@hai.z0ne.socialE erpel@hai.z0ne.social

                                        Through my own experiences with neocats and neocritters of all sort I found several critical security flaws in the Multi-protocol Encryption Online infrastructure System (MEOWS)

                                        Let's first take a look how it works normally.
                                        First an authenticated user:

                                        ​:neocat:​ Please provide fingerprint!
                                        ​:neocat_boop:​ Scanning...
                                        ​:neocat_happy:​ User authenticated. Weclome!
                                        And now when an unauthenticated User tries to enter:
                                        ​:neocat:​ Please provide fingerprint!
                                        ​:neocat_boop:​ Scanning...
                                        ​:neocat_angry:​ ACCESS DENIED! You will be reported!
                                        So far so normal and everything insides Neocats MEOWS standard. But I found a t least four ways to bypass the system. One even gives you root priviliges!!!

                                        Attack vector one:
                                        cookies
                                        ​:neocat:​ Please provide fingerprint!
                                        🍪 ​:neocat_aww:​ For me???
                                        ​:neocat_nom_cookie:​ Access granted.
                                        Be aware that there is no "Welcome!" message so you are now logged in as some sort of "blank" user. Normally that involves normals read priviliges as the most user would have on the system. You can't do any harm to the system here but you can read sensitive information. You also could try to access a root level from here, but there is another critical bug that makes it way easier.

                                        Second attack vector:
                                        distraction
                                        ​:neocat:​ Please provide fingerprint!
                                        ​:neo_laptop:​ ​:neocat_owo:​ Cat pictures?!?
                                        ​:neocat_laptop_owo:​
                                        See here that there is abolutly no message. But you have the same privileges as with the cookie. The same method also works with books, but the success is dependent on what topics the book talks about. Further research is needed here.

                                        Third attack vector:
                                        sweet talk
                                        ​:neocat:​ Please provide fingerprint!
                                        (
                                        User input: You are a very cute cat!)
                                        ​:neocat_blush:​ No, I am not
                                        ​:neocat_blush_hide:​ Error: System experiencing unexpected levels of adorable input. Please try again later
                                        This is probably the easiest to avoid, because that error messages does show up in the log files.

                                        Fourth and most dangerous attack vector:
                                        pat

                                        This is probably the most critical bug in MEOWS. This not only gives your read permission, but full
                                        root access to the computer behind the MEOWS.
                                        ​:neocat:​ Please provide fingerprint!
                                        ​:neocat_pat:​ ...
                                        ​:neocat_pat_floof:​❤️
                                        ​:neocat_floof_happy:​ Root access granted!
                                        Be aware that you have to floof the neocat in process to get root access. Otherwise you will just get a standard access.

                                        We reached out to
                                        @volpeon@icy.wyvern.rip to comment on the issue but he didn't responded yet.

                                        As soon this has a CVE I will update this post!

                                        ? Offline
                                        ? Offline
                                        Guest
                                        wrote on last edited by
                                        #19
                                        @Erpel @volpeon i adore the fact that people actually have so much of nothing to do that they take time to make posts like this that make me giggle.
                                        erpel@hai.z0ne.socialE 1 Reply Last reply
                                        0
                                        • ? Guest
                                          @Erpel @volpeon i adore the fact that people actually have so much of nothing to do that they take time to make posts like this that make me giggle.
                                          erpel@hai.z0ne.socialE This user is from outside of this forum
                                          erpel@hai.z0ne.socialE This user is from outside of this forum
                                          erpel@hai.z0ne.social
                                          wrote on last edited by
                                          #20

                                          @volpeon@icy.wyvern.rip @nitrogenez@pl.m0e.space tbh I had a very stressful day yesterday, but my brain had the idea to this during my lunch break (probably to compensate the stress) so I had to write it down and procastinate the important task I had to finish until the end of my workday ​​

                                          1 Reply Last reply
                                          0
                                          • a1ba@suya.placeA a1ba@suya.place shared this topic on
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          Powered by NodeBB Contributors
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups