Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

04:20 PM
Connect Directly

Critical Instagram Flaw Could Let Attackers Spy on Victims

A now-patched remote code execution vulnerability could be exploited with a specially sized image file, researchers report.

A critical Instagram flaw could have enabled attackers to perform remote code execution and access a victim's camera, microphone, and other components, Check Point researchers found.

CVE-2020-1895 has a CVSS score of 7.8 and exists in the Instagram app on both Android and iOS. It was discovered in early February and reported to Facebook, Instagram's owner, which issued a patch. Now that a fix has been available for six months, researchers who discovered this vulnerability are publicly disclosing the details of how an attack would unfold.

Related Content:

12 Bare-Minimum Benchmarks for AppSec Initiatives

Special Report: Computing's New Normal, a Dark Reading Perspective

New on The Edge: Making the Case for Medical Device Cybersecurity

"All of social media has become, in this day and age, the most precious and wanted target," says Check Point security researcher Gal Elbaz. It was for this reason the research team chose to audit the security of Instagram on multiple operating systems, he says in a technical writeup.

Like many software companies, Instagram integrates third-party open source projects in its software. This flaw exists in the way it uses Mozjpeg, a public project built by Mozilla that serves as Instagram's JPEG format decoder for images uploaded to the photo-sharing app.

An attacker who wanted to exploit the vulnerability would only need to send an image to the victim's device via WhatsApp, text, email, or any other messaging service, Elbaz says. The victim saves the image onto their phone; next time that person opens Instagram, the exploitation takes place and grants an attacker permission for any resource on the phone that Instagram can access.

This could include the device's camera, GPS/location services, contacts, and storage, among other things. Within the Instagram app, the attacker could conduct actions on behalf of the user, including reading messages, posting and deleting photos, or deleting the app altogether. 

The vulnerable function handles image dimensions when parsing JPEG image files, Elbaz says. To exploit the bug, an image would have to be sent with malformed dimensions. Facebook's advisory for the flaw describes it as an "integer overflow to buffer overflow" and says a "large heap overflow" could occur when trying to upload an image with specially crafted dimensions. It affects versions of Instagram before

The exploit would be ineffective on phones with permissions for Instagram disabled, says Yaniv Balmas, Check Point's head of cyber research. However, doing so would reduce the app's functionality. "If Instagram doesn't have any permissions, the exploit will be useless, but frankly I think Instagram will be useless without those permissions as well," he explains.

The vulnerability was not easy to find and exploit — Elbaz spent months working on it, Balmas says — but it's fairly easy for an attacker to take advantage now that it's been discovered.

What Businesses Should Learn
Researchers chose to explore Instagram's security because of its massive user base, which makes it an appealing attacker target. However, Balmas points to a pattern of criminals seeking to buy vulnerabilities that will give them broader device access.

"We see a trend of attackers trying to go for applications with excessive permissions, and that's a thing with Instagram," he says. "[It has] all these permissions — camera, microphone, GPS, contacts, all of these things — if you just manage to exploit this application, you don't really need to move forward in exploiting the entire phone." With access to the permissions of an app like Instagram, an attacker has free rein to explore many of the target device's features.

This particular vulnerability exists in the way Instagram uses Mozjpeg, and not in the open source project itself, Balmas emphasizes. That said, both researchers agree it's important for organizations to carefully vet the third-party code they use in their applications. 

"You have to look at the open source library you use as part of your code, because it is part of your code," Elbaz says, noting that he treats open source code as he would the code of products he writes, with penetration testing and thorough examination.

Although it's natural to not understand "every bit and byte" that goes into open source code, Balmas says it's important to remember that just because someone else wrote the code doesn't mean it's free of errors. Open source code is just as likely to have vulnerabilities.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-12
Cross Site Scripting (XSS) in LAOBANCMS v2.0 allows remote attackers to execute arbitrary code by injecting commands into the "Website SEO Keywords" field on the page "admin/info.php?shuyu".
PUBLISHED: 2021-05-12
An Information Disclosure vulnerability exists in dhcms 2017-09-18 when entering invalid characters after the normal interface, which causes an error that will leak the physical path.
PUBLISHED: 2021-05-12
evm is a pure Rust implementation of Ethereum Virtual Machine. Prior to the patch, when executing specific EVM opcodes related to memory operations that use `evm_core::Memory::copy_large`, the `evm` crate can over-allocate memory when it is not needed, making it possible for an attacker to perform d...
PUBLISHED: 2021-05-12
A Cross SIte Scripting (XSS) vulnerability exists in Dhcms 2017-09-18 in guestbook via the message board, which could let a remote malicious user execute arbitrary code.
PUBLISHED: 2021-05-12
Knowage Suite 7.3 is vulnerable to Stored Cross-Site Scripting (XSS). An attacker can inject arbitrary web script in '/knowage/restful-services/signup/update' via the 'surname' parameter.