Little Doctor zero day: violate chat applications

Little Doctor: Hackers who want to gain access to popular chat applications to use the camera and user sound can do it very easily by using a worm published online.

At this time it is still zero day, which means that the security gap has not been repaired. Little Doctor

The framework, named “Little DoctorIs a super weapon that can violate JavaScript-based chat applications. So many popular chat applications are at risk because of their architecture. Services that have been developed in Electron, or that contain a built-in webview, are in a very difficult position.

Let's mention that the Rocket Chat application provided a patch of 13 hours after revealing, and Ryver within a day. And the Slack application makes use of WebViews, however, it seems to be safe.

Australian hacker Shubham Shah and former co-worker Matt Bryant developed the framework worm and found an unpatched Microsoft Azure Storage Explorer zero day.

"This worm is cross-platform, and can steal files from any application that has access to WebRTC APIs, and Cordova APIs," Moloch told the Kiwicon hacking conference in Wellington.

The team uncovered the error in Microsoft, but after 90 days, it did not receive a response.

The trio did not stop there, having found and exploited the exploit in Rocket Chat and Ryver, transforming a cross-site scripting attack into remote code execution for container apps.

See PoC and download Little Doctor

The Little Doctor framework is available in GitHub for all security researchers and penetration testers.

Registration in via Email

Enter your email to subscribe to the email notification service for new posts.

Read them Technology News from all over the world, with the validity of

Follow us on Google News at Google news