Title: Signal-desktop HTML tag injection variant 2
Date Published: 2018-05-16
Last Update: 2018-05-16
CVE Name: CVE-2018-11101
Class: Code injection
Remotely Exploitable: Yes
Locally Exploitable: No
Vendors contacted: Signal.org
Vulnerability Description:
Signal-desktop is the standalone desktop version of the secure
Signal messenger. This software is vulnerable to remote code execution
from a malicious contact, by sending a specially crafted message
containing HTML code that is injected into the chat windows (Cross-site
scripting). This is a new variant of CVE-2018-10994.
Vulnerable Packages:
Signal-desktop messenger v1.7.1
Signal-desktop messenger v1.8.0
Signal-desktop messenger v1.9.0
Signal-desktop messenger v1.10.0
Signal-desktop messenger v1.10.1
Solution/Vendor Information/Workaround:
Do not trust user input. Sanitize it by encoding HTML tags or
filtering them. Also, a CSP header is missing, that would deter the
action of iframes. Include aframe-src anone'a or, if required,
aframe-src aself'a in the CSP declaration.
For final users: Upgrade to signal-desktop messenger v1.11
Credits:
This vulnerability was found and researched by Barrera Oro, IvA!n Ariel
(@HacKanCuBa), Bryant, Matt (@IAmMandatory), Ortega, Alfredo
(@ortegaalfredo) and Rizzo, Juliano (@julianor).
Technical Description a Exploit/Concept Code
After publishing CVE-2018-10994, Matt discovered that the vulnerability
prevailed but the attack was a bit different: the attacker needs to send
HTML code directly as a message, and then reply to that message to
trigger this vulnerability. The Signal-desktop software fails to
sanitize specific HTML tags that can be used to inject HTML code into
remote chat windows when replying to a HTML message. Specifically the
and