Title: Signal-desktop HTML tag injection variant 2 Date Published: 2018-05-16 Last Update: 2018-05-16 CVE Name: CVE-2018-11101 Class: Code injection Remotely Exploitable: Yes Locally Exploitable: No Vendors contacted: Signal.org Vulnerability Description: Signal-desktop is the standalone desktop version of the secure Signal messenger. This software is vulnerable to remote code execution from a malicious contact, by sending a specially crafted message containing HTML code that is injected into the chat windows (Cross-site scripting). This is a new variant of CVE-2018-10994. Vulnerable Packages: Signal-desktop messenger v1.7.1 Signal-desktop messenger v1.8.0 Signal-desktop messenger v1.9.0 Signal-desktop messenger v1.10.0 Signal-desktop messenger v1.10.1 Solution/Vendor Information/Workaround: Do not trust user input. Sanitize it by encoding HTML tags or filtering them. Also, a CSP header is missing, that would deter the action of iframes. Include aframe-src anone'a or, if required, aframe-src aself'a in the CSP declaration. For final users: Upgrade to signal-desktop messenger v1.11 Credits: This vulnerability was found and researched by Barrera Oro, IvA!n Ariel (@HacKanCuBa), Bryant, Matt (@IAmMandatory), Ortega, Alfredo (@ortegaalfredo) and Rizzo, Juliano (@julianor). Technical Description a Exploit/Concept Code After publishing CVE-2018-10994, Matt discovered that the vulnerability prevailed but the attack was a bit different: the attacker needs to send HTML code directly as a message, and then reply to that message to trigger this vulnerability. The Signal-desktop software fails to sanitize specific HTML tags that can be used to inject HTML code into remote chat windows when replying to a HTML message. Specifically the and Display content of useras own /etc/passwd file: Include and auto-execute a remote JavaScript file (for Windows clients): Show a displacing base64-encoded image (bypass aclick to download imagea): Timeline: 2018-05-14 19:00 GMT-3: vuln discovered 2018-05-14 20:00 GMT-3: emailed Signal security team 2018-05-14 20:21 GMT-3: reply from Signal: vuln confirmed & patch ongoing 2018-05-14 21:47 GMT-3: signal-desktop update published 2018-05-16 11:00 GMT-3: public disclosure References: Patch: https://github.com/signalapp/Signal-Desktop/compare/v1.11.0-beta.2a|development CVE-2018-11101 write-ups: https://ivan.barreraoro.com.ar/signal-desktop-html-tag-injection-variant-2/ https://thehackerblog.com/i-too-like-to-live-dangerously-accidentally-finding-rce-in-signal-desktop-via-html-injection-in-quoted-replies/ CVE-2018-10994 write-up: https://ivan.barreraoro.com.ar/signal-desktop-html-tag-injection/