fix heading levels
This commit is contained in:
parent
347b7e55c2
commit
745a531432
3 changed files with 15 additions and 13 deletions
|
@ -6,6 +6,8 @@ feature_image: /img/posts/fuckstalkerware-4/cover.jpg
|
|||
feature_alt: "a glitchy edited very pink collage of various marketing images for TheTruthSpy with their logo diagonally in the center"
|
||||
tags:
|
||||
- "#FuckStalkerware"
|
||||
- shady business
|
||||
- investigation
|
||||
- stalkerware
|
||||
- research
|
||||
- analysis
|
||||
|
|
|
@ -13,29 +13,29 @@ feature_alt: "a glitchy edited screenshot of the kick.com homepage"
|
|||
|
||||
a few days ago an anonymous (the adjective, not the hacking collective) group of researchers reached out to me regarding a write-up they made i might be interested in covering. interestingly enough their write-up about how twitch competitor [kick.com](https://kick.com) isn't very secure was hosted on a kick.com subdomain - my interest was piqued.
|
||||
|
||||
### the curious case of the write-up
|
||||
## the curious case of the write-up
|
||||
|
||||
the [link to the write-up](https://files.kick.com/tmp/66a348a9-08ac-48fd-87c9-100fa537c1b6) (now taken down, [archived](https://web.archive.org/web/20230801182040/https://files.kick.com/tmp/66a348a9-08ac-48fd-87c9-100fa537c1b6), more on why this is broken in a bit) i was sent was seemingly hosted on files.kick.com, the cdn used by kick. furthermore the group explained to me that to allow them to anonymously update the write-up without the link changing, they actually use a TOR to clearnet proxy, so the actual page is hosted on an onion site ([gk3eisnvj45msa5fo7kvd4betop6zmoiplena64lowncgdcsktoo6jad.onion](http://gk3eisnvj45msa5fo7kvd4betop6zmoiplena64lowncgdcsktoo6jad.onion), [clearweb (onion.re) mirror](https://gk3eisnvj45msa5fo7kvd4betop6zmoiplena64lowncgdcsktoo6jad.onion.re)) and loaded via [corsproxy](https://corsproxy.io/) and onion.re/tor.pm, which is also why the actual content of the write-up won't display on archive.org. and with that curiosity out of the way it's time to properly go over the write-up titled "Considering using Kick? Think again". block quotes (the indented quotes) in the following blog post will be verbatim sections from the write-up.
|
||||
|
||||
### first vuln: chat message fabrication
|
||||
## first vuln: chat message fabrication
|
||||
|
||||
> We first looked over Kick's user interface with DevTools, and noticed when pinning a message, the entire metadata of the message gets sent with it. When you modify said payload to include a fake username/content/badges, the server will blindly accept it, allowing you to impersonate any chat member. Incredible!
|
||||
|
||||
this sounds fun! so i went ahead and tried to replicate it:
|
||||
|
||||
#### step 1: record a request
|
||||
### step 1: record a request
|
||||
|
||||
in went ahead and begrudgingly created a kick account to test the things laid out in the write-up. i then opened the chat on my own channel, sent a message and with the dev tools network tab open pinned it to the chat to record the payload sent.
|
||||
|
||||
![a screenshot of the kick.com chat UI as well as the dev tools network tab showing the json payload for pinning a message](/img/posts/kick.com-sucks/fabrication-step1.jpg)
|
||||
|
||||
#### step 2: editing and replaying
|
||||
### step 2: editing and replaying
|
||||
|
||||
since i didn't wanna bother bypassing cloudflare in any capacity just for this quick proof of concept, i decided to just use the built-in firefox "Edit and Resend" feature to replay the message pin payload. i edited the sender of the message, the message contents, added a silly little verified badge and hit send :3
|
||||
|
||||
![the firefox "edit and resend" feature in action showing an edited pinned-message request](/img/posts/kick.com-sucks/fabrication-step2.jpg)
|
||||
|
||||
#### success: it really is just that easy huh
|
||||
### success: it really is just that easy huh
|
||||
|
||||
well, here we go, finally proof that the definitely very real (as evidenced by the verification badge) tyler "ninja" blevins meowed in my kick chat! i had to pin that one for sure !!
|
||||
|
||||
|
@ -43,7 +43,7 @@ well, here we go, finally proof that the definitely very real (as evidenced by t
|
|||
|
||||
the limitation of this vuln is that message fabrication is only possible for moderators of any given channel, though the fact that it applies specifically to pinned messages means there is still a lot of potential for scams and fraud here
|
||||
|
||||
#### reply fabrication
|
||||
### reply fabrication
|
||||
|
||||
upon asking the group for confirmation that the pin based message fabrication only works for channels you have pin permissions in, i was told that their chat reply implementation also allows for fabrication, so i quickly reproduced that as well.
|
||||
|
||||
|
@ -60,13 +60,13 @@ damn, tyler "ninja" blevins really loves meowing :3
|
|||
in the past this apparently worked on arbitrary channels - the api even still returns a success message, confirming message creation, but nothing appears in chat. now it only does on your own channel which certainly is an extremely weird mitigation strategy.
|
||||
|
||||
|
||||
### let's just responsibly disclose this i guess
|
||||
## let's just responsibly disclose this i guess
|
||||
|
||||
> We first debated about trying to responsibly disclose this vulnerability, the side of this is that Kick is heavily funded by Stake, a illegal online crypto casino, which is very legally and morally questionable. The debate ended up in us atleast trying to find a security contact... we found none. That's why we're writing this document instead of contacting Kick privately - we can't.
|
||||
|
||||
not only do kick and stake make it incredibly hard to even try to responsibly disclose vulnerabilities, they are also "known to ignore security vulnerabilities and pursue legal action against whistleblowers instead of fixing them," according to the group. this is why their write-up has been published anonymously and sent to me to report on. in a conversation the group told me they were further motivated to not responsibly disclose as to not support a platform "specifically made to promote illegal gambling \[content\], since twitch blocked it." so their research continued...
|
||||
|
||||
### second vuln: arbitrary file write / XSS
|
||||
## second vuln: arbitrary file write / XSS
|
||||
|
||||
> While digging into saving profile pictures for some sort of vulnerability, we found that **Kick** implemented [Larevel's Vapor upload system](https://docs.vapor.build/1.0/resources/storage.html#file-uploads) incorrectly. This gave anyone full control of the content type and extension (allowing you to upload more than just images). These files were hosted on a domain in-scope for **all Kick.com cookies!**. Since Kick was pretty short sighted, they decided to make all authentication tokens accessible on all subdomains.
|
||||
|
||||
|
@ -76,13 +76,13 @@ the write-up itself, hosted on files.kick.com using this vulnerability, is the p
|
|||
|
||||
given that the write-up itself already definitely proved the viability of this vulnerability, and i had been shown a video by the group showcasing the vulnerability in action, i decided not to reproduce this one myself.
|
||||
|
||||
### third vuln: arbitrary file read / improper aws access control
|
||||
## third vuln: arbitrary file read / improper aws access control
|
||||
|
||||
> So, you know that domain from earlier? Yeah, `files[.]kick[.]com`. Turns out, the main user content bucket was publicly viewable by just going to the [root of the domain](https://files.kick.com/)! Fun, am I right? All your user uploaded content available to the public, but it gets worse! It doesn't even get removed if you delete it. That probably breaks some privacy law, but we're too lazy to investigate.
|
||||
|
||||
i also verified this one myself by checking the bucket (`kick-files-prod`) contents using the [aws cli](https://aws.amazon.com/cli/), and have started archiving as much of the bucket as i can (at the time of writing that is around 50+gb of mostly user generated content). a quick check verifies that at the very least the bucket does not allow for public write or delete access; publicly allowing read access is still pretty bad nevertheless.
|
||||
|
||||
### conclusion
|
||||
## conclusion
|
||||
|
||||
> Kick is definitely not a better alternative to Twitch, and this is not even all of the flaws we found. Some of them would be even more dangerous to publish publicly. It's incredible how streamers like to go on every platform without doing the smallest bit of investigation.
|
||||
> [...] I know Twitch sucks, but this really isnt the alternative. A small startup could do better then this. Use YouTube gaming, theyre pretty cool, and we'd rather trust Google instead of a Gambling comp with shit security.
|
||||
|
@ -90,10 +90,10 @@ i also verified this one myself by checking the bucket (`kick-files-prod`) conte
|
|||
|
||||
i definitely agree with this sentiment. i am also very curious regarding further trivially found vulerabilities (including the ones teased in the write-up), and im hopeful this write-up and my blog post can inspire some more interesting security research on kick.com, making it at the very least somewhat more secure hopefully. morally i also fully agree that trusting a platform which primarily exists to promote gambling and gambling content, owned by one of the biggest players in that industry, is foolish, no matter how good their creator payouts may be. this is further evidenced by how the only channels i saw ever having more than maybe 2000 viewers on kick during this investigation were famous gambling content creators, no other category ever seemed to garner much views.
|
||||
|
||||
### update (aug. 3, 08:50 UTC)
|
||||
## update (aug. 3, 08:50 UTC)
|
||||
|
||||
it appears that kick has deployed mitigations for message fabrication, s3 file listing remains unfixed (despite being the easiest thing to fix), from which i can only conclude that they do not consider information leakage to be of high severity.
|
||||
|
||||
### update 2 (aug. 3, 17:00 UTC)
|
||||
## update 2 (aug. 3, 17:00 UTC)
|
||||
|
||||
so it turns out they have not actually really fixed shit, pin based fabrication still works, the only mitigation that has been done is turning off persistence for ALL pins (real or fake), meaning they disappear on refresh. both real and fake pins are however still distributed to all viewers at the time of posting.
|
|
@ -25,7 +25,7 @@ earlier this year, [the popular far right fediverse instance poast was hacked](h
|
|||
- ~~a self proclaimed "national socialist" who's a professor at gardner-webb university~~
|
||||
- just sooo many people in the tech industry
|
||||
|
||||
### correction
|
||||
## correction
|
||||
|
||||
after some feedback regarding potential false positives in the list, the source of the compiled document asked me to publish the following correction: "Upon further research, Richard (Shawn) Carmichael aka psychosis67 is not a professor at Gardner-Webb University, but an IT guy from Humboldt, Iowa who impersonated the university professor from North Carolina with the same name on his now deleted LinkedIn profile.", a formal apology has been sent to the professor. furthermore we found that user bluj162 was also mapped wrong (to the chief operating officer of a school district), research here however shows that bluj162 is the son of J. Sanchez of Palm Beach (who i presume managed his dads LinkedIn?).
|
||||
|
||||
|
|
Loading…
Reference in a new issue