{"id":3956,"date":"2015-09-10T05:18:51","date_gmt":"2015-09-09T21:18:51","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=3956"},"modified":"2015-09-10T05:19:05","modified_gmt":"2015-09-09T21:19:05","slug":"whatsapp-web-vcard-vulnerability-exposed-200m-users","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2015\/09\/whatsapp-web-vcard-vulnerability-exposed-200m-users\/","title":{"rendered":"WhatsApp Web vCard Vulnerability Exposed 200M Users"},"content":{"rendered":"

So it seems there was a lot of noise about the WhatsApp Web vCard Vulnerability with over 200 Million people using the desktop version of WhatsApp – it’s a fairly large cache of users to go after. <\/p>\n

Disclosed by Check Point security, the vulnerability is exploited by sending a vCard contact containing malicious code to a WhatsApp Web user.<\/p>\n

\"WhatsApp<\/p>\n

The vulnerability lies in the improper filtering of contact cards using the popular vCard format, thankfully WhatsApp reacted fairly fast on this.<\/p>\n

A vulnerability discovered in WhatsApp Web, the web-based extension of the WhatsApp mobile application, can be exploited by attackers to trick users into executing arbitrary code on their machines.<\/p>\n

Discovered by Check Point security researcher Kasif Dekel, the vulnerability can be exploited by simply sending a vCard contact card containing malicious code to a WhatsApp user. As soon as the seemingly innocent vCard is opened in WhatsApp Web, the malicious code in it can run on the target machine.<\/p>\n

This vulnerability allows cybercriminals to compromise the affected computer by distributing all types of malware, including ransomware, bots, and remote access tools (RATs), Check Point\u2019s researcher explains.<\/p>\n

The underlying issue lies in the improper filtering of contact cards that are sent using the popular \u2018vCard\u2019 format. \u201cBy manually intercepting and crafting XMPP requests to the WhatsApp servers, it was possible to control the file extension of the contact card file,\u201d the Check Point researcher explained in a blog post.<\/p>\n

An attacker can inject a command in the name attribute of the vCard file, separated by the \u2018&\u2019 character. Windows automatically tries to run all lines in the file, including the injection line, when the vCard is opened.<\/p><\/blockquote>\n