“An attacker that gains access to a victim machine can potentially obtain sensitive data through gathered photos, especially if the user utilizes Keybase frequently,” Jackson said. This does mean that the issue remains local however, even local vulnerabilities need to be patched rapidly by services that promote themselves as privacy-centric. On Mac machines, all it took to recover this content was to view the directory, but on Windows, image file extensions would need to be changed to. Even if a user had set the content to ‘explode’ or delete, the cache still contained residual image files as Keybase failed to adequately clear them. Jackson examined the client and saw that inside the Keybase uploadtemps and cache directories, photos that had previously been pasted into conversations were available and were not encrypted. Identified by John Jackson, the penetration tester said in a blog post on Monday that Keybase clients before 5.6.0 on Windows and macOS, and before 5.6.1 on Linux, are impacted. “It fails to effectively clear cached pictures, even after deletion via normal methodology within the client, or by utilizing the “Explode message/Explode now” functionality,” the CVE description reads. Tracked as CVE-2021-23827, the bug is described as an issue which “allows an attacker to obtain potentially sensitive media (such as private pictures) in the cache and uploadtemps directories.” The security-focused end-to-end encrypted chat app, which was acquired by remote videoconferencing tool developer Zoom in May last year, contained a vulnerability that could have compromised private user data. Keybase has resolved a security flaw in the messaging client that preserved image content in the cache for cleartext viewing.
0 Comments
Leave a Reply. |