#VU7957 Backdoor in Copyfish (Chrome extension)


Published: 2017-08-16 | Updated: 2018-11-22

Vulnerability identifier: #VU7957

Vulnerability risk: Critical

CVSSv3.1: 9.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H/RL:O/RC:C]

CVE-ID: N/A

CWE-ID: CWE-798

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Copyfish (Chrome extension)
Client/Desktop applications / Plugins for browsers, ActiveX components

Vendor: a9t9 software GmbH

Description
The vulnerability allows a remote attacker to gain unauthorized access to victim's browser.

The vulnerability exists due to presence of backdoor code in Copyfish Google Chrome extension 2.8.5, distributed via Google Web Store.


Mitigation
Update to version 2.8.6 or later.

Vulnerable software versions

Copyfish (Chrome extension): 2.8.5


External links
http://www.proofpoint.com/us/threat-insight/post/threat-actor-goes-chrome-extension-hijacking-spree


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.


Latest bulletins with this vulnerability