TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Another flaw in Signal desktop app leaks chats in plaintext

451 pointsby workerthreadabout 7 years ago

20 comments

Aissenabout 7 years ago
From the researcher who found it:<p><i>we were able to compile a list of strategic defense-in-depth recommendations for Signal Desktop which we’ve sent to the Signal security team per their request. At the end of the day there will always be new “hot” vulnerabilities, but the “vendor” response is generally what separates the wheat from the chaff. The Signal team’s quick patch time along with a strong interest in mitigating vulnerabilities of this type in the future was encouraging to see. I’ll remain a Signal user for the foreseeable future :)</i><p><a href="https:&#x2F;&#x2F;thehackerblog.com&#x2F;i-too-like-to-live-dangerously-accidentally-finding-rce-in-signal-desktop-via-html-injection-in-quoted-replies&#x2F;" rel="nofollow">https:&#x2F;&#x2F;thehackerblog.com&#x2F;i-too-like-to-live-dangerously-acc...</a>
andrepdabout 7 years ago
&gt;Researchers—Iván Ariel Barrera Oro, Alfredo Ortega, Juliano Rizzo, and Matt Bryant—responsibly reported the vulnerability to Signal, and its developers have patched the vulnerability with the release of Signal desktop version 1.11.0 for Windows, macOS, and Linux users.<p>&gt;However, The Hacker News has learned that Signal developers had already identified this issue as part of a comprehensive fix to the first vulnerability before the researchers found it and reported them.<p>&gt;Signal app has an auto-update mechanism, so most users must have the update already installed. You can read this guide to ensure if you are running updated version of Signal.<p>Seems everything is patched, and was already going to be patched before the vuln was reported.
tormehabout 7 years ago
Maybe secure chat clients shouldn&#x27;t be written in JavaScript or other languages that have excessive dynamicness? Signal seems to be written mostly in languages that are bad for security (significantly worse than the best alternatives). Maybe I&#x27;m just a language nerd without any clue about the trade-offs, but I trust the Wire software more. Note that this just applies to mobile clients and server - Wire, like Signal, chose to build their desktop+webapp in JavaScript :(
评论 #17096700 未加载
评论 #17096681 未加载
评论 #17098050 未加载
评论 #17096685 未加载
评论 #17097390 未加载
matthewaveryusaabout 7 years ago
In security less is more.<p>The more we try to make encryption mainstream, the more difficult it gets because the mainstream interacts with computers predominately via browsers. The mainstream won&#x27;t adopt something that isn&#x27;t highly similar to what a browser has to offer in terms of media richness (photos, videos, html), so you see Signal choosing technologies like Electron, a browser, to develop their native applications. The heart of what signal is and does well (encrypt, decrypt, authenticate) is dwarfed by a pile of code that was added to make signal usable by the mainstream. Desktop Signal, in terms of code and complexity, is no longer a security product -- it&#x27;s an application with a web-like media experience that happens to tack on a very good library to do encryption and authentication.<p>As we all know, sometimes vulns are in broken crypto, but most of the time they&#x27;re in a gotcha beneath a mountain of code.
评论 #17097839 未加载
ddtaylorabout 7 years ago
I don&#x27;t know if this is exploitable, but they are using many different methods to escape HTML content:<p><a href="https:&#x2F;&#x2F;github.com&#x2F;signalapp&#x2F;Signal-Desktop&#x2F;blob&#x2F;d1f7f5ee8c1111c2b12a2870c64a830ca0f4fd04&#x2F;components&#x2F;mocha&#x2F;mocha.js#L89" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;signalapp&#x2F;Signal-Desktop&#x2F;blob&#x2F;d1f7f5ee8c1...</a><p>Then here it&#x27;s a different function:<p><a href="https:&#x2F;&#x2F;github.com&#x2F;signalapp&#x2F;Signal-Desktop&#x2F;blob&#x2F;d1f7f5ee8c1111c2b12a2870c64a830ca0f4fd04&#x2F;components&#x2F;mustache&#x2F;mustache.js#L56" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;signalapp&#x2F;Signal-Desktop&#x2F;blob&#x2F;d1f7f5ee8c1...</a><p>Then sometimes they use the underscore library to do it:<p><a href="https:&#x2F;&#x2F;github.com&#x2F;signalapp&#x2F;Signal-Desktop&#x2F;blob&#x2F;d1f7f5ee8c1111c2b12a2870c64a830ca0f4fd04&#x2F;components&#x2F;backbone&#x2F;backbone.js#L295" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;signalapp&#x2F;Signal-Desktop&#x2F;blob&#x2F;d1f7f5ee8c1...</a><p>Which their implementation seems to be using regular expressions as well.
评论 #17099248 未加载
评论 #17099097 未加载
tptacekabout 7 years ago
Honestly, and none of you are going to like hearing this, and the Signal people aren&#x27;t going to appreciate me saying it: if you&#x27;re serious about messaging securely, don&#x27;t use Signal Desktop; don&#x27;t use desktop secure messengers at all. Desktop applications are incredibly risky, far more so than iOS mobile apps are.
评论 #17097213 未加载
评论 #17098730 未加载
评论 #17097114 未加载
评论 #17103352 未加载
评论 #17101278 未加载
评论 #17097129 未加载
评论 #17096929 未加载
评论 #17096987 未加载
评论 #17098889 未加载
评论 #17096958 未加载
评论 #17097410 未加载
评论 #17097624 未加载
评论 #17098508 未加载
ccnafrabout 7 years ago
Wasn&#x27;t this domain imitating the actual Hacker News banned years ago?<p>Plus, I think they violate rules because this is just blog spam.<p>The actual source of the story is: <a href="https:&#x2F;&#x2F;ivan.barreraoro.com.ar&#x2F;signal-desktop-html-tag-injection-variant-2&#x2F;" rel="nofollow">https:&#x2F;&#x2F;ivan.barreraoro.com.ar&#x2F;signal-desktop-html-tag-injec...</a>
评论 #17099959 未加载
Jedi72about 7 years ago
On their Android app, first thing it makes you do is give them permission to read your SMSs. It wont let you vefiry by entering a code. I immediately uninstalled - doesn&#x27;t seem like a privacy focussed organisation to me.
评论 #17097251 未加载
评论 #17097267 未加载
评论 #17098548 未加载
评论 #17097140 未加载
fastballabout 7 years ago
What is this website?<p>&quot;The Hacker News&quot;? And no actual relation to HN? This website doesn&#x27;t even have an about page...
评论 #17099047 未加载
teachrdanabout 7 years ago
From TFA:<p>&quot;...the new vulnerability (CVE-2018-11101) exists in a different function that handles the validation of quoted messages, i.e., quoting a previous message in a reply.<p>&quot;In other words, to exploit the newly patched bug on vulnerable versions of Signal desktop app, all an attacker needs to do is send a malicious HTML&#x2F;javascript code as a message to the victim, and then quote&#x2F;reply to that same message with any random text.<p>&quot;If the victim receives this quoted message containing the malicious payload on its vulnerable Signal desktop app, it will automatically execute the payload, without requiring any user interaction.&quot;<p>Is it the case that you don&#x27;t even need to have the attacker&#x27;s number in your contacts list?
评论 #17096635 未加载
babyabout 7 years ago
This news saddens me. I’ve been the last user of the Signal desktop app around me and it looks like I have been too optimistic about Electron. I’ve now deleted any Electron app and recommend everyone to do the same.
FrantaHabout 7 years ago
It&#x27;s mind boggling why messaging app has 181 MB.
评论 #17099527 未加载
namuolabout 7 years ago
Pretty mindblowing that Signal allows things like `dangerouslySetInnerHTML` in any of their apps. A simple linter would have caught this.
评论 #17098736 未加载
onetimemanytimeabout 7 years ago
Interesting, more or less, nothing is 100% secure. Looks like DEA had cracked the whatever crypto Blacberry was using and quite a few drug dealers were caught that way (one example: <a href="https:&#x2F;&#x2F;www.thedailybeast.com&#x2F;the-deas-dirty-cop-who-tipped-off-a-cartel" rel="nofollow">https:&#x2F;&#x2F;www.thedailybeast.com&#x2F;the-deas-dirty-cop-who-tipped-...</a> ). They must have been using because of the reputation BB had. I wonder what will we find out in time about the narcos, terrorists etc using Signal.
peterburkimsherabout 7 years ago
Someone invited me to use signal. I thought &quot;It&#x27;s a trap!&quot;
评论 #17098988 未加载
AlexCoventryabout 7 years ago
Is the chrome extension also vulnerable to this?
评论 #17166783 未加载
pokemongoawayabout 7 years ago
Anyone else have an aesthetic feeling for this? Signal desktop <i>felt</i> clunky to such a degree that takes away from trust that Telegram feels equally secure - even though it is not.
tlrobinsonabout 7 years ago
Why is this flagged?
评论 #17098466 未加载
评论 #17098449 未加载
评论 #17098411 未加载
评论 #17098582 未加载
评论 #17098438 未加载
verroqabout 7 years ago
Is there a native Signal client that isn’t an Electron abomination?<p>It is clear at the point the Signal desktop people has no idea what they are doing and cannot be trusted to write a secure desktop application.
评论 #17099311 未加载
评论 #17098994 未加载
评论 #17100295 未加载
JasonFruitabout 7 years ago
When will people start using plain old PGP — a tool that does one thing only, and does it right? Sure, it&#x27;s a little harder than using just one tool that handles contacts, communication, formatting, and encryption, while making popcorn and walking the dog, but it works, and it&#x27;s secure if you use it right.<p>Our efforts to make encryption easy are going to get someone killed.
评论 #17096905 未加载
评论 #17098452 未加载
评论 #17096822 未加载
评论 #17096718 未加载
评论 #17098435 未加载