Conversation

infosec Twitter excited about yet another Linux priv escalation bug 🥱(who cares, unix priv separation 50 years of fail) but no comments about the WhatsApp RCE without any boomer memory corruption technique being used? Thread
5
326
\o WhatsApp stores SSL/TLS secrets and some useful info for attackers in /sdcard. Bad. Attackers can get the secrets from JS code in a HTML attachment and use them to hijack connections between WhatsApp and servers. Bad but ehhh2eeehh encryption ...
1
73
../ To make this RCE chains easier WhatsApps stores native libraries in /data/data/com.whatsapp/files/decompressed/libs.spk.zst 🤷‍♂️attackers can use the .zip bug to overwrite any of them (I would go for the Rust ones) and execute arbitrary code.
2
37
Replying to and
It's probably to save space compared to the legacy standard approach. They can use a better algorithm than DEFLATE and compress them together instead of separately. It's very wasteful compared to the standard approach of mapping libraries directly from apks like other resources.
1
2
Replying to and
I don't remember when they moved the code for mapping libraries from the apk from Chromium to AOSP but it's a standard feature now. They could have used Chromium's code for handling it on legacy Android versions. Firefox has a particularly horrifying take on this nonsense.
1
This Tweet was deleted by the Tweet author. Learn more
Replying to
It's probably twitter.com/DanielMicay/st like Firefox. I would say ignorance, essentially. They don't realize how much more efficient it would be to map libraries directly from apk, don't realize the OS implements it for them now and that there's a Chromium library for legacy OS.
Quote Tweet
Replying to @DanielMicay and @julianor
It's probably to save space compared to the legacy standard approach. They can use a better algorithm than DEFLATE and compress them together instead of separately. It's very wasteful compared to the standard approach of mapping libraries directly from apks like other resources.
1
Show replies