348 文字
2 分
I found a vulnerability related to the potential of Zoom Bomb
Abstract
- I found a security issue related to the strength of password authentication.
- This can be attacked from a remote host and threaten confidentiality and availability of Zoom service.
- CVSS score would be 6.5.
- CVSS<3>3>.0/AV
/AC /PR /UI /S/C /I /A /E /RL /RC
- CVSS<3>3>.0/AV
Background
- When you create a meeting room in Zoom, a new room ID and password will be generated for you.
- It will also generate a URL that contains the room’s ID and password information.
- By accessing this URL, you will be able to access your meeting room in Zoom . (Example below. URL were valid in past times)
zoom.us
Join our Cloud HD Video Meeting
Zoom is the leader in modern enterprise cloud communications.
- The 11 digits represents room ID and the
pwdparameter in the query string represents password. - The
98459262939part is the room ID. It looks like it’s probably issued by a sequential number. - The
K1J6VjdFd2NpTWpaenJ6WE0zWml0QT09in the pwd parameter of this URL represents the password.
Issue
- This password is made up of a combination of upper and lower case letters and numbers.
- The length of the character is 32 characters. Trailing two digits seems fixed.
- Therefore, the pattern is (26+26+10)^30. (a-z, A-Z, 0-9)
However, Zoom’s server-side processing doesn’t make this case sensitive, so there are actually only (26+10)^30 combinations.
It was intended case sensitive but authentication program evaluate case insensitive.
Therefore, it’s probably 10^30 times weaker than the cryptographic strength Zoom is assuming.
Recording of the procedure
The procedure in the video
- Go to the correct URL
- Access the pwd parameter with all the letters capitalized. It should be denied, but the password is accepted.
My thought
- I sent an email to Zoom’s security insident contact, but the contact person didn’t understand it, so I wrote it on this blog.
- It’s a common mistake in implementations. The storage engine (e.g. database) has this password and I believe the string is stored and evaluated by matching the pwd parameter in the URL. However, since the storage engine is not case sensitive, the authentication passes. This is a common mistake at the implementation level.
- Even if the cryptographic strength is weakened by a factor of 10^30, it is still strong enough, so this is not a big deal for the security in the most cases.
2020/7/2
- This issue has been fixed by zoom after I submitted this report to Zoom.
- There is no response from Zoom.
I found a vulnerability related to the potential of Zoom Bomb
https://blog.teraren.com/posts/security-vulnerability-related-to-the-potential-of-zoom-bomb/ 関連記事
この記事が役に立ったら
GitHub Sponsorsで応援できます