diff options
| author | Xe Iaso <me@xeiaso.net> | 2023-07-30 17:27:51 -0400 |
|---|---|---|
| committer | Xe Iaso <me@xeiaso.net> | 2023-07-30 17:28:36 -0400 |
| commit | f9e96ed78ebe4aac3a484fe927e60fdc6416c0cd (patch) | |
| tree | 668fc2635534b210f7a491a5a8f5e51fa7fbeac6 | |
| parent | 3193e0caffdec45902789077ba0b56062b7102c7 (diff) | |
| download | xesite-f9e96ed78ebe4aac3a484fe927e60fdc6416c0cd.tar.xz xesite-f9e96ed78ebe4aac3a484fe927e60fdc6416c0cd.zip | |
blog: CVE-2023-36325
Signed-off-by: Xe Iaso <me@xeiaso.net>
| -rw-r--r-- | blog/CVE-2023-36325.markdown | 104 |
1 files changed, 104 insertions, 0 deletions
diff --git a/blog/CVE-2023-36325.markdown b/blog/CVE-2023-36325.markdown new file mode 100644 index 0000000..90b6853 --- /dev/null +++ b/blog/CVE-2023-36325.markdown @@ -0,0 +1,104 @@ +--- +title: "CVE-2023-36325: Attackers can de-anonymize i2p hidden services with a message replay attack" +date: 2023-07-30 +tags: + - i2p + - cve + - netsec + - infosec +--- + +tl;dr: If you host eepsites with Java i2p and are running older than +i2p 2.3.0, update it as soon as possible. More details below. + +<xeblog-hero ai="SCMix+YoRHa" file="chibi-attacker" prompt="1girl, green hair, high ponytail, long hair, black bodysuit, blindfold, space needle, outside, skirt, heels"></xeblog-hero> + +A sufficiently determined attacker may be able to de-anonymize the +public IPv4 and IPv6 addresses of i2p hidden services (eepsites) by +using a combination of brute-forcing the entire i2p router set with a +replayed message. This is CVE-2023-36325. + +This issue was originally discovered by a user with the identifier +`hbapm6le75xwc342hnkltwfnnmt4ccafr5wyf7b6jhw6jxn3fwqa.b32.i2p`, which +I will refer to as "hbapm6". While hbapm6 was working on a custom +version of i2p, they found that replaying messages sent down client +tunnels to target i2p routers could cause the i2p software to drop the +packet instead of sending a "wrong destination" response. This can +lead to de-anonymization of a given eepsite by being able to correlate +the public IPv4 or IPv6 address of the contacted router with packets +being dropped. + +This is fixed in i2p 2.3.0 by adding a unique identifier to every +message ID and separating out bloom filters and other datastores so +that such correlation attacks are harder to pull off in the future. +These changes are protocol-compatible and all users are encouraged to +apply them as soon as possible. + +There is insufficent data as to what versions of i2p are vulnerable, +but we are certain that 2.2.1 is vulnerable. It is likely that older +versions of i2p are also vulnerable. Assume so. + +This attack takes days to complete and requires a fairly detailed +amount of knowledge of the i2p protocol in order to successfully +de-anonymize target eepsites. + +Users of i2pd are not affected. + +With this understood, here is the CVSS score breakdown for this +attack: + +| Overall CVSS Score | 3.4 | +| :-------------- | :-- | +| CVSS Base Score | 5.3 | +| Impact Subscore | 1.4 | +| Exploitability Subscore | 3.9 | +| CVSS Temporal Score | 4.8 | +| CVSS Environmental Score | 3.4 | +| Modified Impact Subscore | 1.4 | + +AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C/CR:M/IR:X/AR:X/MAV:N/MAC:H/MPR:N/MUI:N/MS:U/MC:L/MI:N/MA:N + +Affected users should update to i2p 2.3.0 as soon as it is available. + +The vulnerability has been mitigated by a refactor of the relevant +codepaths involved with message parsing. Additionally, the network +information database was sharded off with the hope of preventing +future attacks. + +--- + +On a side note, I have been very impressed with the i2p projects +handling of the circumstances surrounding hbapm6 of the issues +tracked as CVE-2023-36325. For an unknown reason, hbapm6 +decided that the best way to get attention for these issues was to +impersonate me. I was contacted by the i2p project due to +hbapm6 acting very strange (IE: claiming to have a vuln and +refusing to show proof of it or how they triggered it, if you have a +de-anonymization attack for such a network, just share your code and +demonstrate it when asked, it will save so much time for everyone +involved), and after a month or two of cajoling, hbapm6 eventually +managed to de-anonymize a throwaway VPS that was acting as an i2p +router. This confirmed the vuln and lead to me filing this CVE. + +I guess this is part of my threat profile now. Fun. + +At the very least I got to have a conversation that was like (names +have been changed to protect the innocent): + +> (hbapm6); Why all the snooping? [...] What is this, a game of +> Among Us? +> +> (Me) <link to my website to an ascii art of an amogus with proof +> that I am the actual Xe Iaso> + +I still have no idea why that person impersonated me. If you're out +there and reading this and I wronged you somehow, I'm sorry and would +like to know what I fucked up so I can change for the better. + +--- + +There's some other vulnerabilities that are related to this, but none +of them have viable attacks. Most of the changes being done are just +various hardening to the pokey edges of the network database and other +things. I expect that these are fairly minor issues and when the patch +comes out you should probably update. |
