Critical Instagram Flaw Could Let Attackers Spy on Victims
A now-patched remote code execution vulnerability could be exploited with a specially sized image file, researchers report.
A critical Instagram flaw could have enabled attackers to perform remote code execution and access a victim's camera, microphone, and other components, Check Point researchers found.
CVE-2020-1895 has a CVSS score of 7.8 and exists in the Instagram app on both Android and iOS. It was discovered in early February and reported to Facebook, Instagram's owner, which issued a patch. Now that a fix has been available for six months, researchers who discovered this vulnerability are publicly disclosing the details of how an attack would unfold.
"All of social media has become, in this day and age, the most precious and wanted target," says Check Point security researcher Gal Elbaz. It was for this reason the research team chose to audit the security of Instagram on multiple operating systems, he says in a technical writeup.
Like many software companies, Instagram integrates third-party open source projects in its software. This flaw exists in the way it uses Mozjpeg, a public project built by Mozilla that serves as Instagram's JPEG format decoder for images uploaded to the photo-sharing app.
An attacker who wanted to exploit the vulnerability would only need to send an image to the victim's device via WhatsApp, text, email, or any other messaging service, Elbaz says. The victim saves the image onto their phone; next time that person opens Instagram, the exploitation takes place and grants an attacker permission for any resource on the phone that Instagram can access.
This could include the device's camera, GPS/location services, contacts, and storage, among other things. Within the Instagram app, the attacker could conduct actions on behalf of the user, including reading messages, posting and deleting photos, or deleting the app altogether.
The vulnerable function handles image dimensions when parsing JPEG image files, Elbaz says. To exploit the bug, an image would have to be sent with malformed dimensions. Facebook's advisory for the flaw describes it as an "integer overflow to buffer overflow" and says a "large heap overflow" could occur when trying to upload an image with specially crafted dimensions. It affects versions of Instagram before 128.0.0.26.128.
The exploit would be ineffective on phones with permissions for Instagram disabled, says Yaniv Balmas, Check Point's head of cyber research. However, doing so would reduce the app's functionality. "If Instagram doesn't have any permissions, the exploit will be useless, but frankly I think Instagram will be useless without those permissions as well," he explains.
The vulnerability was not easy to find and exploit — Elbaz spent months working on it, Balmas says — but it's fairly easy for an attacker to take advantage now that it's been discovered.
What Businesses Should Learn
Researchers chose to explore Instagram's security because of its massive user base, which makes it an appealing attacker target. However, Balmas points to a pattern of criminals seeking to buy vulnerabilities that will give them broader device access.
"We see a trend of attackers trying to go for applications with excessive permissions, and that's a thing with Instagram," he says. "[It has] all these permissions — camera, microphone, GPS, contacts, all of these things — if you just manage to exploit this application, you don't really need to move forward in exploiting the entire phone." With access to the permissions of an app like Instagram, an attacker has free rein to explore many of the target device's features.
This particular vulnerability exists in the way Instagram uses Mozjpeg, and not in the open source project itself, Balmas emphasizes. That said, both researchers agree it's important for organizations to carefully vet the third-party code they use in their applications.
"You have to look at the open source library you use as part of your code, because it is part of your code," Elbaz says, noting that he treats open source code as he would the code of products he writes, with penetration testing and thorough examination.
Although it's natural to not understand "every bit and byte" that goes into open source code, Balmas says it's important to remember that just because someone else wrote the code doesn't mean it's free of errors. Open source code is just as likely to have vulnerabilities.
About the Author
You May Also Like
DevSecOps/AWS
Oct 17, 2024Social Engineering: New Tricks, New Threats, New Defenses
Oct 23, 202410 Emerging Vulnerabilities Every Enterprise Should Know
Oct 30, 2024Simplify Data Security with Automation
Oct 31, 2024