Little Doctor: Hackers who want to gain access to popular chat applications to use the camera and user sound can do it very easily by using a worm published online.
At this time it is still zero day, which means that the security gap has not been repaired.
Let's mention that the Rocket Chat application provided a patch of 13 hours after revealing, and Ryver within a day. And the Slack application makes use of WebViews, however, it seems to be safe.
Australian hacker Shubham Shah and former co-worker Matt Bryant developed the framework worm and found an unpatched Microsoft Azure Storage Explorer zero day.
"This worm is cross-platform, and can steal files from any application that has access to WebRTC APIs, and Cordova APIs," Moloch told the Kiwicon hacking conference in Wellington.
The team uncovered the error in Microsoft, but after 90 days, it did not receive a response.
The trio did not stop there, having found and exploited the exploit in Rocket Chat and Ryver, transforming a cross-site scripting attack into remote code execution for container apps.
See PoC and download Little Doctor
The Little Doctor framework is available in GitHub for all security researchers and penetration testers.