18-year-old 0.0.0.0 Day Browser Vulnerability Puts Millions of MacOS and Linux Users at Risk

by | Aug 9, 2024 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

Decades-Old Vulnerability Resurfaces

A vulnerability first disclosed 18 years ago, dubbed “0.0.0.0 Day,” has resurfaced, allowing malicious websites to bypass security measures in Google Chrome, Mozilla Firefox, and Apple Safari. This vulnerability, which affects only Linux and macOS devices, enables attackers to exploit services on local networks, leading to potential unauthorized access, setting alterations, and even remote code execution.

Affects Only MacOS and Linux Devices

The vulnerability does not impact Windows systems but poses a significant threat to MacOS and Linux users. Despite being reported as far back as 2008, the flaw remains unresolved, with Chrome, Firefox, and Safari acknowledging the issue and committing to work on a fix.

Report from 18 years agoReport from 18 years ago
Source: Oligo Security

How the “0.0.0.0 Day” Flaw Works

The “0.0.0.0 Day” vulnerability stems from inconsistent security mechanisms across different web browsers and a lack of standardization in how public websites interact with local network services using the IP address 0.0.0.0. This address is typically used to represent all IP addresses on a local machine or network interfaces.

Malicious websites can exploit this flaw by sending HTTP requests to 0.0.0.0, targeting services running on the user’s local machine. Due to inconsistent security measures, these requests are often routed to the service and processed, potentially leading to unauthorized actions.

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

Bypassing Security Mechanisms

Security features like Cross-Origin Resource Sharing (CORS) and Private Network Access (PNA) are supposed to protect against such threats. However, Oligo Security’s research revealed that the 0.0.0.0 IP address is not included in the list of restricted PNA addresses, allowing attackers to bypass these protections and execute potentially harmful actions.

Real-World Exploits Detected

Unfortunately, this vulnerability is not just a theoretical risk. Oligo Security has documented several cases where the “0.0.0.0 Day” vulnerability has been actively exploited in the wild. Campaigns like ShadowRay, which targets AI workloads, and other attacks on Selenium Grid servers have leveraged this flaw to execute arbitrary code and perform network reconnaissance.

Exploit used in the ShadowRay campaignExploit used in the ShadowRay campaign
Source: Oligo Security

 

Malicious request seen in the Selenium attacksMalicious request seen in the Selenium attacks
Source: Oligo Security




Responses from Browser Developers

Oligo reports a sudden uptick in the number of public websites communicating with 0.0.0.0 since last month, which has now reached about 100,000.

Number of public sites communicating with 0.0.0.0Number of public sites communicating with 0.0.0.0
Source: Oligo Security

In light of the recent surge in exploits, browser developers have finally started to take action. Google Chrome is planning a gradual rollout to block access to 0.0.0.0 across several upcoming versions. Mozilla Firefox, which does not yet implement PNA, has prioritized the development of this feature, while Apple is adding IP checks in Safari to block access in its next major update.

Mitigation Recommendations for Developers

Until these browser fixes are fully implemented, Oligo Security advises developers to take proactive steps to secure their applications. Recommended measures include implementing PNA headers, verifying HOST headers, using HTTPS, and adding CSRF tokens. These steps are crucial to protect against potential attacks that could exploit the “0.0.0.0 Day” vulnerability.

Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This