TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Zoom: Remote Code Execution with XMPP Stanza Smuggling

231 pointsby Flowdalicabout 3 years ago

13 comments

twoodfinalmost 3 years ago
The XML parsing&#x2F;validation bugs are, I suppose, not shocking, but deeply disappointing.<p>The <i>one thing</i> XML &amp; its tooling were supposed to get right was document well-formed-ness. Sure, it might be a mess of a standard in other ways, but at least we could agree what a parser should and shouldn’t accept! (Not the case for the HTML tag soup of then or now.)<p>That, 25 years on, a popular XML processor can’t even meet that low bar for <i>tag names</i> is maddening.
评论 #31495030 未加载
评论 #31494764 未加载
Flowdalicabout 3 years ago
It appears that Gloox, a relative low-level XMPP-client C library, rolled much of its Unicode and XML parsing itself, which made such vulnerabilities more likely. There maybe good reasons to not re-use existing modules and rely on external libraries, especially if you target constraint low-end embedded devices, but you should always be aware of the drawbacks. And the Zoom client typically does not run on those.
评论 #31495066 未加载
评论 #31493690 未加载
评论 #31500876 未加载
评论 #31504241 未加载
评论 #31494102 未加载
dgellowabout 3 years ago
Some relevant info in case you don’t want to read the whole description but wonder if you’re concerned by the issue:<p>&gt; Zoom fixed the server-side issues in February and client-side issues on April 24 in version 5.10.4.<p>&gt; Zoom published a security bulletin about client-side fixes at <a href="https:&#x2F;&#x2F;explore.zoom.us&#x2F;en&#x2F;trust&#x2F;security&#x2F;security-bulletin" rel="nofollow">https:&#x2F;&#x2F;explore.zoom.us&#x2F;en&#x2F;trust&#x2F;security&#x2F;security-bulletin</a><p>CVE-2022-25235 CVE-2022-25236 Fixed-2022-Apr-24 CVE-2022-22784 CVE-2022-22785 CVE-2022-22786 CVE-2022-22787
kevincoxalmost 3 years ago
This is another lesson that you should always parse+serialize rather that just validate. It is much harder to smuggle data this way to exploit different parsers.<p>Basically the set of all messages that will satisfy your validator is far larger than the set of all messages that will be produced by your serializer.
评论 #31493954 未加载
评论 #31493896 未加载
评论 #31494025 未加载
bobbylarrybobbyalmost 3 years ago
Having multiple, potentially different parsers is incredibly dangerous. One person used the fact that different plist parsers in the macOS kernel choked in different ways when interpreting malformed xml, leading some to believe the plist was &quot;safe&quot; because it did not grant certain permissions, while others trusted this &quot;safe&quot; plist but believed it did grant these permissions.<p><a href="https:&#x2F;&#x2F;blog.siguza.net&#x2F;psychicpaper&#x2F;" rel="nofollow">https:&#x2F;&#x2F;blog.siguza.net&#x2F;psychicpaper&#x2F;</a>
dqvabout 3 years ago
I didn’t even consider the existence of XMPP vulns until I listened to the Darknet Diaries episode about Kik[0]. It’s a really interesting class of vulnerabilities.<p>[0]: <a href="https:&#x2F;&#x2F;darknetdiaries.com&#x2F;episode&#x2F;93&#x2F;" rel="nofollow">https:&#x2F;&#x2F;darknetdiaries.com&#x2F;episode&#x2F;93&#x2F;</a>
robertlagrantalmost 3 years ago
This vuln writeup is extremely well written. Actually quite interesting to read!
rektidealmost 3 years ago
How much of Zoom is powered by XMPP? Do we know much about these internals? This would be super cool to learn about.
henearkralmost 3 years ago
Good thing that I never used the standalone client and always the in-browser webapp instead.
评论 #31495248 未加载
评论 #31505609 未加载
thinkmassiveabout 3 years ago
Heh, it’s like an AIM punter, but better!
pabs3almost 3 years ago
Are these issues bugs in libxml, gloox, ejabberd? Or just in the Zoom client and server?
jeffbeealmost 3 years ago
At some point we are going to need enforceable professional standards that effectively deal with commercial software publishers who choose to parse untrusted inputs in non-performance-sensitive contexts with C libraries.
评论 #31498172 未加载
评论 #31496681 未加载
评论 #31495317 未加载
spycalmost 3 years ago
Thanks to Ivan Fratric and Google Project Zero!