Critical Instagram Flaw Could Let Attackers Spy on Victims

  /     /     /  
Publicated : 23/11/2024   Category : security


Critical Instagram Flaw Could Let Attackers Spy on Victims


A now-patched remote code execution vulnerability could be exploited with a specially sized image file, researchers report.



A critical Instagram flaw could have enabled attackers to perform remote code execution and access a victims camera, microphone, and other components, Check Point researchers found.
CVE-2020-1895
has a CVSS score of 7.8 and exists in the Instagram app on both Android and iOS. It was discovered in early February and reported to Facebook, Instagrams owner, which issued a patch. Now that a fix has been available for six months, researchers who discovered this vulnerability are publicly disclosing the details of how an attack would unfold.
All of social media has become, in this day and age, the most precious and wanted target, says Check Point security researcher Gal Elbaz. It was for this reason the research team chose to audit the security of Instagram on multiple operating systems, he says in a
technical writeup
.
Like many software companies, Instagram integrates third-party open source projects in its software. This flaw exists in the way it uses Mozjpeg, a public project built by Mozilla that serves as Instagrams JPEG format decoder for images uploaded to the photo-sharing app.
An attacker who wanted to exploit the vulnerability would only need to send an image to the victims device via WhatsApp, text, email, or any other messaging service, Elbaz says. The victim saves the image onto their phone; next time that person opens Instagram, the exploitation takes place and grants an attacker permission for any resource on the phone that Instagram can access.
This could include the devices camera, GPS/location services, contacts, and storage, among other things. Within the Instagram app, the attacker could conduct actions on behalf of the user, including reading messages, posting and deleting photos, or deleting the app altogether. 
The vulnerable function handles image dimensions when parsing JPEG image files, Elbaz says. To exploit the bug, an image would have to be sent with malformed dimensions. Facebooks
advisory
for the flaw describes it as an integer overflow to buffer overflow and says a large heap overflow could occur when trying to upload an image with specially crafted dimensions. It affects versions of Instagram before 128.0.0.26.128.
The exploit would be ineffective on phones with permissions for Instagram disabled, says Yaniv Balmas, Check Points head of cyber research. However, doing so would reduce the apps functionality. If Instagram doesnt have any permissions, the exploit will be useless, but frankly I think Instagram will be useless without those permissions as well, he explains.
The vulnerability was not easy to find and exploit — Elbaz spent months working on it, Balmas says — but its fairly easy for an attacker to take advantage now that its been discovered.
What Businesses Should Learn
Researchers chose to explore Instagrams security because of its massive user base, which makes it an appealing attacker target. However, Balmas points to a pattern of criminals seeking to buy vulnerabilities that will give them broader device access.
We see a trend of attackers trying to go for applications with excessive permissions, and thats a thing with Instagram, he says. [It has] all these permissions — camera, microphone, GPS, contacts, all of these things — if you just manage to exploit this application, you dont really need to move forward in exploiting the entire phone. With access to the permissions of an app like Instagram, an attacker has free rein to explore many of the target devices features.
This particular vulnerability exists in the way Instagram uses Mozjpeg, and not in the open source project itself, Balmas emphasizes. That said, both researchers agree its important for organizations to carefully vet the third-party code they use in their applications. 
You have to look at the open source library you use as part of your code, because it is part of your code, Elbaz says, noting that he treats open source code as he would the code of products he writes, with penetration testing and thorough examination.
Although its natural to not understand every bit and byte that goes into open source code, Balmas says its important to remember that just because someone else wrote the code doesnt mean its free of errors. Open source code is just as likely to have vulnerabilities.

Last News

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Critical Instagram Flaw Could Let Attackers Spy on Victims