Little Doctor: Hackers who want to gain access to popular chat applications to use it camera and users' audio can be done very easily by using a worm published online.
At this time it is still zero day, which means that the security gap has not been repaired.
The framework, named “Little DoctorIs a super weapon that can break into chat applications based on JavaScript. Έτσι πολλές δημοφιλείς εφαρμογές συνομιλίας κινδυνεύουν εξαιτίας της αρχιτεκτονικής τους. Υπηρεσίες που έχουν αναπτυχθεί σε Electron, or that contains an embedded webview, are in a very difficult position.
Let's mention that the Rocket Chat application provided a patch of 13 hours after revealing, and Ryver within a day. And the Slack application makes use of WebViews, however, it seems to be safe.
Australian hacker Shubham Shah and former colleague Matt Bryant developed the framework worm and found an unpatched Microsoft Azure Storage Explorer zero day.
“This worm is cross-platform, and it can steal archives from any application that has access to the WebRTC APIs, and the Cordova APIs,” said Moloch at the Kiwicon hacking conference held in Wellington.
The team uncovered the error in Microsoft, but after 90 days, it did not receive a response.
The trio did not stop there, having found and exploited the exploit in Rocket Chat and Ryver, transforming a cross-site scripting attack into remote code execution for container apps.
See PoC and download Little Doctor
The Little Doctor framework is available in GitHub for all security researchers and penetration testers.