CryptoNote version version 0.8.9 and possibly later contain a local RPC server which does not require authentication, as a result the walletd and the simplewallet RPC daemons will process any commands sent to them, resulting in remote command execution and a takeover of the cryptocurrency wallet if an attacker can trick an application such as a web browser into connecting and sending a command for example. This attack appears to be exploitable via a victim visiting a webpage hosting malicious content that trigger such behavior.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://www.ayrx.me/cryptonote-unauthenticated-json-rpc | third party advisory exploit |
https://github.com/cryptonotefoundation/cryptonote/issues/172 | third party advisory issue tracking exploit |
https://github.com/amjuarez/bytecoin/issues/217 | third party advisory broken link |