![]() Specifically, the image of the skull above was sent to John Jackson by Robert Willis, and Robert had deleted the image – yet it remained behind in the Cache. The vulnerability was quickly replicated on Windows by navigating to the Roaming folder of the AppData directory:Ĭ:\Users\usernamehere\AppData\Roaming\Keybase\Cache It was easily seen within mac because of the fileviewer functionality, but on windows a user has to change the file extension from its native extension to. In other words, a user could send a photo to another user via a private conversation, and click on the “delete” or “explode” button and the photo could still be recovered via the “Cache” directory due to the insufficient cache clearing issue/lack of encryption of the content. In addition, the directory even included images that other users had sent us. The issue was similar in the sense that images were also being stored in this directory, unencrypted, however – the amount of images stored were far more in quantity than in the “uploadtemps” directory. ~/Library/Application Support/Keybase/Cache Sakura Samurai began to investigate further and that’s when a similar issue was discovered within the “Cache” directory of the Keybase Client for macOS: Users/usernamehere/Library/Caches/Keybase/uploadtemps Additional Escalation Robert investigated the issue further while Cottle & Henry quickly spun up an instance of Keybase on macOS and were able to determine that the issue also existed on these platforms, but utilizing a slightly different filesystem path: ![]() John noticed that inside of these folders, photos that had been previously pasted into conversations remained, unencrypted.Īt this point, John decided to call in Aubrey Cottle, Jackson Henry, and Robert Willis to investigate the issue further. The directory contained randomized folders: ![]() Within several minutes, John noticed a directory named “uploadtemps”Ĭ:\Users\yourusername\AppData\Local\Keybase\uploadtemps During security research, John Jackson stumbled upon the Keybase Client directories and decided to take a look considering Keybase operates a Bug Bounty Program.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |