Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse

NodeBB

  1. Home
  2. uncategorized
  3. Through my own experiences with neocats and neocritters of all sort I found several critical security flaws in the Multi-protocol Encryption Online infrastructure System (MEOWS)

Through my own experiences with neocats and neocritters of all sort I found several critical security flaws in the Multi-protocol Encryption Online infrastructure System (MEOWS)

Scheduled Pinned Locked Moved uncategorized
20 Posts 10 Posters 80 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • ori@woem.menO ori@woem.men

    @Erpel@hai.z0ne.social strongly disagree

    erpel@hai.z0ne.socialE This user is from outside of this forum
    erpel@hai.z0ne.socialE This user is from outside of this forum
    erpel@hai.z0ne.social
    wrote on last edited by
    #5

    @ori@woem.men still no interactions ​​

    For a real good post this is too long and way too technical. Even though I think the joke works quite well

    erpel@hai.z0ne.socialE 1 Reply Last reply
    0
    • erpel@hai.z0ne.socialE erpel@hai.z0ne.social

      Through my own experiences with neocats and neocritters of all sort I found several critical security flaws in the Multi-protocol Encryption Online infrastructure System (MEOWS)

      Let's first take a look how it works normally.
      First an authenticated user:

      ​:neocat:​ Please provide fingerprint!
      ​:neocat_boop:​ Scanning...
      ​:neocat_happy:​ User authenticated. Weclome!
      And now when an unauthenticated User tries to enter:
      ​:neocat:​ Please provide fingerprint!
      ​:neocat_boop:​ Scanning...
      ​:neocat_angry:​ ACCESS DENIED! You will be reported!
      So far so normal and everything insides Neocats MEOWS standard. But I found a t least four ways to bypass the system. One even gives you root priviliges!!!

      Attack vector one:
      cookies
      ​:neocat:​ Please provide fingerprint!
      🍪 ​:neocat_aww:​ For me???
      ​:neocat_nom_cookie:​ Access granted.
      Be aware that there is no "Welcome!" message so you are now logged in as some sort of "blank" user. Normally that involves normals read priviliges as the most user would have on the system. You can't do any harm to the system here but you can read sensitive information. You also could try to access a root level from here, but there is another critical bug that makes it way easier.

      Second attack vector:
      distraction
      ​:neocat:​ Please provide fingerprint!
      ​:neo_laptop:​ ​:neocat_owo:​ Cat pictures?!?
      ​:neocat_laptop_owo:​
      See here that there is abolutly no message. But you have the same privileges as with the cookie. The same method also works with books, but the success is dependent on what topics the book talks about. Further research is needed here.

      Third attack vector:
      sweet talk
      ​:neocat:​ Please provide fingerprint!
      (
      User input: You are a very cute cat!)
      ​:neocat_blush:​ No, I am not
      ​:neocat_blush_hide:​ Error: System experiencing unexpected levels of adorable input. Please try again later
      This is probably the easiest to avoid, because that error messages does show up in the log files.

      Fourth and most dangerous attack vector:
      pat

      This is probably the most critical bug in MEOWS. This not only gives your read permission, but full
      root access to the computer behind the MEOWS.
      ​:neocat:​ Please provide fingerprint!
      ​:neocat_pat:​ ...
      ​:neocat_pat_floof:​❤️
      ​:neocat_floof_happy:​ Root access granted!
      Be aware that you have to floof the neocat in process to get root access. Otherwise you will just get a standard access.

      We reached out to
      @volpeon@icy.wyvern.rip to comment on the issue but he didn't responded yet.

      As soon this has a CVE I will update this post!

      ? Offline
      ? Offline
      Guest
      wrote on last edited by
      #6

      @Erpel@hai.z0ne.social @volpeon@icy.wyvern.rip what about neofoxes?

      jessienab@wetdry.worldJ 1 Reply Last reply
      0
      • ? Guest

        @Erpel@hai.z0ne.social @volpeon@icy.wyvern.rip what about neofoxes?

        jessienab@wetdry.worldJ This user is from outside of this forum
        jessienab@wetdry.worldJ This user is from outside of this forum
        jessienab@wetdry.world
        wrote on last edited by
        #7

        @foxxyLunaNicole @Erpel same vulns for foxes!! I can confirm

        ? 1 Reply Last reply
        0
        • jessienab@wetdry.worldJ jessienab@wetdry.world

          @foxxyLunaNicole @Erpel same vulns for foxes!! I can confirm

          ? Offline
          ? Offline
          Guest
          wrote on last edited by
          #8

          @jessienab@wetdry.world @foxxyLunaNicole@woem.men @Erpel@hai.z0ne.social
          You are a very cute foxxo :3

          erpel@hai.z0ne.socialE 1 Reply Last reply
          0
          • ? Guest

            @jessienab@wetdry.world @foxxyLunaNicole@woem.men @Erpel@hai.z0ne.social
            You are a very cute foxxo :3

            erpel@hai.z0ne.socialE This user is from outside of this forum
            erpel@hai.z0ne.socialE This user is from outside of this forum
            erpel@hai.z0ne.social
            wrote on last edited by
            #9

            @vox@mk.absturztau.be @jessienab@wetdry.world @foxxyLunaNicole@woem.men I have to check for vulnerability in Woozy Application Authentications Host (WAAH) yet...

            The critical vulnerabilities for MEOWS got all my time the last few months

            1 Reply Last reply
            0
            • erpel@hai.z0ne.socialE erpel@hai.z0ne.social

              Through my own experiences with neocats and neocritters of all sort I found several critical security flaws in the Multi-protocol Encryption Online infrastructure System (MEOWS)

              Let's first take a look how it works normally.
              First an authenticated user:

              ​:neocat:​ Please provide fingerprint!
              ​:neocat_boop:​ Scanning...
              ​:neocat_happy:​ User authenticated. Weclome!
              And now when an unauthenticated User tries to enter:
              ​:neocat:​ Please provide fingerprint!
              ​:neocat_boop:​ Scanning...
              ​:neocat_angry:​ ACCESS DENIED! You will be reported!
              So far so normal and everything insides Neocats MEOWS standard. But I found a t least four ways to bypass the system. One even gives you root priviliges!!!

              Attack vector one:
              cookies
              ​:neocat:​ Please provide fingerprint!
              🍪 ​:neocat_aww:​ For me???
              ​:neocat_nom_cookie:​ Access granted.
              Be aware that there is no "Welcome!" message so you are now logged in as some sort of "blank" user. Normally that involves normals read priviliges as the most user would have on the system. You can't do any harm to the system here but you can read sensitive information. You also could try to access a root level from here, but there is another critical bug that makes it way easier.

              Second attack vector:
              distraction
              ​:neocat:​ Please provide fingerprint!
              ​:neo_laptop:​ ​:neocat_owo:​ Cat pictures?!?
              ​:neocat_laptop_owo:​
              See here that there is abolutly no message. But you have the same privileges as with the cookie. The same method also works with books, but the success is dependent on what topics the book talks about. Further research is needed here.

              Third attack vector:
              sweet talk
              ​:neocat:​ Please provide fingerprint!
              (
              User input: You are a very cute cat!)
              ​:neocat_blush:​ No, I am not
              ​:neocat_blush_hide:​ Error: System experiencing unexpected levels of adorable input. Please try again later
              This is probably the easiest to avoid, because that error messages does show up in the log files.

              Fourth and most dangerous attack vector:
              pat

              This is probably the most critical bug in MEOWS. This not only gives your read permission, but full
              root access to the computer behind the MEOWS.
              ​:neocat:​ Please provide fingerprint!
              ​:neocat_pat:​ ...
              ​:neocat_pat_floof:​❤️
              ​:neocat_floof_happy:​ Root access granted!
              Be aware that you have to floof the neocat in process to get root access. Otherwise you will just get a standard access.

              We reached out to
              @volpeon@icy.wyvern.rip to comment on the issue but he didn't responded yet.

              As soon this has a CVE I will update this post!

              ? Offline
              ? Offline
              Guest
              wrote on last edited by
              #10

              @Erpel@hai.z0ne.social @volpeon@icy.wyvern.rip It is worth noting that the ​​ NeoBOTS authentication method has the same flaws and is not a suitable alternative. ​​ is equally potent.

              1 Reply Last reply
              1
              0
              • erpel@hai.z0ne.socialE erpel@hai.z0ne.social shared this topic on
              • erpel@hai.z0ne.socialE erpel@hai.z0ne.social

                @ori@woem.men still no interactions ​​

                For a real good post this is too long and way too technical. Even though I think the joke works quite well

                erpel@hai.z0ne.socialE This user is from outside of this forum
                erpel@hai.z0ne.socialE This user is from outside of this forum
                erpel@hai.z0ne.social
                wrote on last edited by
                #11

                @ori@woem.men Well... I eat my own words it seems... currently 91 boosts ​​

                1 Reply Last reply
                0
                • erpel@hai.z0ne.socialE erpel@hai.z0ne.social

                  Through my own experiences with neocats and neocritters of all sort I found several critical security flaws in the Multi-protocol Encryption Online infrastructure System (MEOWS)

                  Let's first take a look how it works normally.
                  First an authenticated user:

                  ​:neocat:​ Please provide fingerprint!
                  ​:neocat_boop:​ Scanning...
                  ​:neocat_happy:​ User authenticated. Weclome!
                  And now when an unauthenticated User tries to enter:
                  ​:neocat:​ Please provide fingerprint!
                  ​:neocat_boop:​ Scanning...
                  ​:neocat_angry:​ ACCESS DENIED! You will be reported!
                  So far so normal and everything insides Neocats MEOWS standard. But I found a t least four ways to bypass the system. One even gives you root priviliges!!!

                  Attack vector one:
                  cookies
                  ​:neocat:​ Please provide fingerprint!
                  🍪 ​:neocat_aww:​ For me???
                  ​:neocat_nom_cookie:​ Access granted.
                  Be aware that there is no "Welcome!" message so you are now logged in as some sort of "blank" user. Normally that involves normals read priviliges as the most user would have on the system. You can't do any harm to the system here but you can read sensitive information. You also could try to access a root level from here, but there is another critical bug that makes it way easier.

                  Second attack vector:
                  distraction
                  ​:neocat:​ Please provide fingerprint!
                  ​:neo_laptop:​ ​:neocat_owo:​ Cat pictures?!?
                  ​:neocat_laptop_owo:​
                  See here that there is abolutly no message. But you have the same privileges as with the cookie. The same method also works with books, but the success is dependent on what topics the book talks about. Further research is needed here.

                  Third attack vector:
                  sweet talk
                  ​:neocat:​ Please provide fingerprint!
                  (
                  User input: You are a very cute cat!)
                  ​:neocat_blush:​ No, I am not
                  ​:neocat_blush_hide:​ Error: System experiencing unexpected levels of adorable input. Please try again later
                  This is probably the easiest to avoid, because that error messages does show up in the log files.

                  Fourth and most dangerous attack vector:
                  pat

                  This is probably the most critical bug in MEOWS. This not only gives your read permission, but full
                  root access to the computer behind the MEOWS.
                  ​:neocat:​ Please provide fingerprint!
                  ​:neocat_pat:​ ...
                  ​:neocat_pat_floof:​❤️
                  ​:neocat_floof_happy:​ Root access granted!
                  Be aware that you have to floof the neocat in process to get root access. Otherwise you will just get a standard access.

                  We reached out to
                  @volpeon@icy.wyvern.rip to comment on the issue but he didn't responded yet.

                  As soon this has a CVE I will update this post!

                  ? Offline
                  ? Offline
                  Guest
                  wrote on last edited by
                  #12

                  @Erpel@hai.z0ne.social @volpeon@icy.wyvern.rip So glad I use neobots instead ​​

                  ? 1 Reply Last reply
                  0
                  • ? Guest

                    @Erpel@hai.z0ne.social @volpeon@icy.wyvern.rip So glad I use neobots instead ​​

                    ? Offline
                    ? Offline
                    Guest
                    wrote on last edited by
                    #13

                    @Erpel@hai.z0ne.social @volpeon@icy.wyvern.rip WAIT THIS IS ABOUT "neocritters of all sort" ​​

                    erpel@hai.z0ne.socialE 1 Reply Last reply
                    0
                    • ? Guest

                      @Erpel@hai.z0ne.social @volpeon@icy.wyvern.rip WAIT THIS IS ABOUT "neocritters of all sort" ​​

                      erpel@hai.z0ne.socialE This user is from outside of this forum
                      erpel@hai.z0ne.socialE This user is from outside of this forum
                      erpel@hai.z0ne.social
                      wrote on last edited by
                      #14

                      @volpeon@icy.wyvern.rip @tertle950@kitty.social yes neobots are also prone to the pat and flood attack

                      RE:
                      https://catgirl.center/notes/a52ccxe2t13h029k

                      1 Reply Last reply
                      0
                      • erpel@hai.z0ne.socialE erpel@hai.z0ne.social

                        Through my own experiences with neocats and neocritters of all sort I found several critical security flaws in the Multi-protocol Encryption Online infrastructure System (MEOWS)

                        Let's first take a look how it works normally.
                        First an authenticated user:

                        ​:neocat:​ Please provide fingerprint!
                        ​:neocat_boop:​ Scanning...
                        ​:neocat_happy:​ User authenticated. Weclome!
                        And now when an unauthenticated User tries to enter:
                        ​:neocat:​ Please provide fingerprint!
                        ​:neocat_boop:​ Scanning...
                        ​:neocat_angry:​ ACCESS DENIED! You will be reported!
                        So far so normal and everything insides Neocats MEOWS standard. But I found a t least four ways to bypass the system. One even gives you root priviliges!!!

                        Attack vector one:
                        cookies
                        ​:neocat:​ Please provide fingerprint!
                        🍪 ​:neocat_aww:​ For me???
                        ​:neocat_nom_cookie:​ Access granted.
                        Be aware that there is no "Welcome!" message so you are now logged in as some sort of "blank" user. Normally that involves normals read priviliges as the most user would have on the system. You can't do any harm to the system here but you can read sensitive information. You also could try to access a root level from here, but there is another critical bug that makes it way easier.

                        Second attack vector:
                        distraction
                        ​:neocat:​ Please provide fingerprint!
                        ​:neo_laptop:​ ​:neocat_owo:​ Cat pictures?!?
                        ​:neocat_laptop_owo:​
                        See here that there is abolutly no message. But you have the same privileges as with the cookie. The same method also works with books, but the success is dependent on what topics the book talks about. Further research is needed here.

                        Third attack vector:
                        sweet talk
                        ​:neocat:​ Please provide fingerprint!
                        (
                        User input: You are a very cute cat!)
                        ​:neocat_blush:​ No, I am not
                        ​:neocat_blush_hide:​ Error: System experiencing unexpected levels of adorable input. Please try again later
                        This is probably the easiest to avoid, because that error messages does show up in the log files.

                        Fourth and most dangerous attack vector:
                        pat

                        This is probably the most critical bug in MEOWS. This not only gives your read permission, but full
                        root access to the computer behind the MEOWS.
                        ​:neocat:​ Please provide fingerprint!
                        ​:neocat_pat:​ ...
                        ​:neocat_pat_floof:​❤️
                        ​:neocat_floof_happy:​ Root access granted!
                        Be aware that you have to floof the neocat in process to get root access. Otherwise you will just get a standard access.

                        We reached out to
                        @volpeon@icy.wyvern.rip to comment on the issue but he didn't responded yet.

                        As soon this has a CVE I will update this post!

                        sam@sillier.woem.spaceS This user is from outside of this forum
                        sam@sillier.woem.spaceS This user is from outside of this forum
                        sam@sillier.woem.space
                        wrote on last edited by
                        #15

                        @Erpel @volpeon does this also apply to neofoxes ​

                        erpel@hai.z0ne.socialE 1 Reply Last reply
                        0
                        • sam@sillier.woem.spaceS sam@sillier.woem.space

                          @Erpel @volpeon does this also apply to neofoxes ​

                          erpel@hai.z0ne.socialE This user is from outside of this forum
                          erpel@hai.z0ne.socialE This user is from outside of this forum
                          erpel@hai.z0ne.social
                          wrote on last edited by
                          #16

                          @volpeon@icy.wyvern.rip @sam@sillier.woem.space haven't checked the Woozy Application Authentications Host (WAAH) yet, bit there is strong evidence this attacks also works there.

                          the parameters might be different though

                          1 Reply Last reply
                          0
                          • erpel@hai.z0ne.socialE erpel@hai.z0ne.social

                            Through my own experiences with neocats and neocritters of all sort I found several critical security flaws in the Multi-protocol Encryption Online infrastructure System (MEOWS)

                            Let's first take a look how it works normally.
                            First an authenticated user:

                            ​:neocat:​ Please provide fingerprint!
                            ​:neocat_boop:​ Scanning...
                            ​:neocat_happy:​ User authenticated. Weclome!
                            And now when an unauthenticated User tries to enter:
                            ​:neocat:​ Please provide fingerprint!
                            ​:neocat_boop:​ Scanning...
                            ​:neocat_angry:​ ACCESS DENIED! You will be reported!
                            So far so normal and everything insides Neocats MEOWS standard. But I found a t least four ways to bypass the system. One even gives you root priviliges!!!

                            Attack vector one:
                            cookies
                            ​:neocat:​ Please provide fingerprint!
                            🍪 ​:neocat_aww:​ For me???
                            ​:neocat_nom_cookie:​ Access granted.
                            Be aware that there is no "Welcome!" message so you are now logged in as some sort of "blank" user. Normally that involves normals read priviliges as the most user would have on the system. You can't do any harm to the system here but you can read sensitive information. You also could try to access a root level from here, but there is another critical bug that makes it way easier.

                            Second attack vector:
                            distraction
                            ​:neocat:​ Please provide fingerprint!
                            ​:neo_laptop:​ ​:neocat_owo:​ Cat pictures?!?
                            ​:neocat_laptop_owo:​
                            See here that there is abolutly no message. But you have the same privileges as with the cookie. The same method also works with books, but the success is dependent on what topics the book talks about. Further research is needed here.

                            Third attack vector:
                            sweet talk
                            ​:neocat:​ Please provide fingerprint!
                            (
                            User input: You are a very cute cat!)
                            ​:neocat_blush:​ No, I am not
                            ​:neocat_blush_hide:​ Error: System experiencing unexpected levels of adorable input. Please try again later
                            This is probably the easiest to avoid, because that error messages does show up in the log files.

                            Fourth and most dangerous attack vector:
                            pat

                            This is probably the most critical bug in MEOWS. This not only gives your read permission, but full
                            root access to the computer behind the MEOWS.
                            ​:neocat:​ Please provide fingerprint!
                            ​:neocat_pat:​ ...
                            ​:neocat_pat_floof:​❤️
                            ​:neocat_floof_happy:​ Root access granted!
                            Be aware that you have to floof the neocat in process to get root access. Otherwise you will just get a standard access.

                            We reached out to
                            @volpeon@icy.wyvern.rip to comment on the issue but he didn't responded yet.

                            As soon this has a CVE I will update this post!

                            esm@wetdry.worldE This user is from outside of this forum
                            esm@wetdry.worldE This user is from outside of this forum
                            esm@wetdry.world
                            wrote on last edited by
                            #17

                            @Erpel @volpeon hmmm, does this impact similar non-neo creatures? i'm concerned about whether i'm affected or not...

                            erpel@hai.z0ne.socialE 1 Reply Last reply
                            0
                            • esm@wetdry.worldE esm@wetdry.world

                              @Erpel @volpeon hmmm, does this impact similar non-neo creatures? i'm concerned about whether i'm affected or not...

                              erpel@hai.z0ne.socialE This user is from outside of this forum
                              erpel@hai.z0ne.socialE This user is from outside of this forum
                              erpel@hai.z0ne.social
                              wrote on last edited by
                              #18

                              @volpeon@icy.wyvern.rip @esm@wetdry.world ​​

                              1 Reply Last reply
                              0
                              • magiclike@soc.sekundenklebertransportverbot.deM magiclike@soc.sekundenklebertransportverbot.de shared this topic on
                              • erpel@hai.z0ne.socialE erpel@hai.z0ne.social

                                Through my own experiences with neocats and neocritters of all sort I found several critical security flaws in the Multi-protocol Encryption Online infrastructure System (MEOWS)

                                Let's first take a look how it works normally.
                                First an authenticated user:

                                ​:neocat:​ Please provide fingerprint!
                                ​:neocat_boop:​ Scanning...
                                ​:neocat_happy:​ User authenticated. Weclome!
                                And now when an unauthenticated User tries to enter:
                                ​:neocat:​ Please provide fingerprint!
                                ​:neocat_boop:​ Scanning...
                                ​:neocat_angry:​ ACCESS DENIED! You will be reported!
                                So far so normal and everything insides Neocats MEOWS standard. But I found a t least four ways to bypass the system. One even gives you root priviliges!!!

                                Attack vector one:
                                cookies
                                ​:neocat:​ Please provide fingerprint!
                                🍪 ​:neocat_aww:​ For me???
                                ​:neocat_nom_cookie:​ Access granted.
                                Be aware that there is no "Welcome!" message so you are now logged in as some sort of "blank" user. Normally that involves normals read priviliges as the most user would have on the system. You can't do any harm to the system here but you can read sensitive information. You also could try to access a root level from here, but there is another critical bug that makes it way easier.

                                Second attack vector:
                                distraction
                                ​:neocat:​ Please provide fingerprint!
                                ​:neo_laptop:​ ​:neocat_owo:​ Cat pictures?!?
                                ​:neocat_laptop_owo:​
                                See here that there is abolutly no message. But you have the same privileges as with the cookie. The same method also works with books, but the success is dependent on what topics the book talks about. Further research is needed here.

                                Third attack vector:
                                sweet talk
                                ​:neocat:​ Please provide fingerprint!
                                (
                                User input: You are a very cute cat!)
                                ​:neocat_blush:​ No, I am not
                                ​:neocat_blush_hide:​ Error: System experiencing unexpected levels of adorable input. Please try again later
                                This is probably the easiest to avoid, because that error messages does show up in the log files.

                                Fourth and most dangerous attack vector:
                                pat

                                This is probably the most critical bug in MEOWS. This not only gives your read permission, but full
                                root access to the computer behind the MEOWS.
                                ​:neocat:​ Please provide fingerprint!
                                ​:neocat_pat:​ ...
                                ​:neocat_pat_floof:​❤️
                                ​:neocat_floof_happy:​ Root access granted!
                                Be aware that you have to floof the neocat in process to get root access. Otherwise you will just get a standard access.

                                We reached out to
                                @volpeon@icy.wyvern.rip to comment on the issue but he didn't responded yet.

                                As soon this has a CVE I will update this post!

                                ? Offline
                                ? Offline
                                Guest
                                wrote on last edited by
                                #19
                                @Erpel @volpeon i adore the fact that people actually have so much of nothing to do that they take time to make posts like this that make me giggle.
                                erpel@hai.z0ne.socialE 1 Reply Last reply
                                0
                                • ? Guest
                                  @Erpel @volpeon i adore the fact that people actually have so much of nothing to do that they take time to make posts like this that make me giggle.
                                  erpel@hai.z0ne.socialE This user is from outside of this forum
                                  erpel@hai.z0ne.socialE This user is from outside of this forum
                                  erpel@hai.z0ne.social
                                  wrote on last edited by
                                  #20

                                  @volpeon@icy.wyvern.rip @nitrogenez@pl.m0e.space tbh I had a very stressful day yesterday, but my brain had the idea to this during my lunch break (probably to compensate the stress) so I had to write it down and procastinate the important task I had to finish until the end of my workday ​​

                                  1 Reply Last reply
                                  0
                                  • a1ba@suya.placeA a1ba@suya.place shared this topic on
                                  Reply
                                  • Reply as topic
                                  Log in to reply
                                  • Oldest to Newest
                                  • Newest to Oldest
                                  • Most Votes


                                  • Login

                                  • Login or register to search.
                                  Powered by NodeBB Contributors
                                  • First post
                                    Last post
                                  0
                                  • Categories
                                  • Recent
                                  • Tags
                                  • Popular
                                  • World
                                  • Users
                                  • Groups