A safety researcher has revealed exploit code for AtlasVPN for Linux, which may allow anyone to disconnect a person and reveal their IP tackle just by luring them to an internet site.
AtlasVPN is a “freemium” digital personal community (VPN) service owned by NordVPN. Regardless of being simply 4 years outdated, in response to its web site, it is utilized by greater than 6 million individuals worldwide.
On Sept. 1, after receiving no response from the seller, an unidentified researcher (referred to by their Full Disclosure mailing record username, “icudar”) posted exploit code for AtlasVPN Linux to the Full Disclosure mailing record and Reddit. By merely copying and pasting this code to their very own website, any odd hacker may disconnect any AtlasVPN person from their personal community, and reveal their IP tackle within the course of.
“Because the whole goal of the VPN is to masks this info, it is a fairly important drawback for customers,” says Shawn Surber, senior director of technical account administration at Tanium.
How the AtlasVPN Exploit Works
The difficulty with AtlasVPN’s Linux shopper boils right down to a scarcity of correct authentication.
“The shopper doesn’t join by way of an area socket or every other safe means however as an alternative it opens an API on localhost on port 8076. It doesn’t have ANY authentication,” icudar wrote in his on-line posts. “This port will be accessed by ANY program operating on the pc, together with the browser.”
Surber guesses that “this vulnerability seems to be brought on by the idea that Cross-Origin Useful resource Sharing (CORS) safety would forestall it.” CORS is a mechanism by which one area can request assets from one other.
As different researchers have identified, although, the exploit simply slips previous CORS by sending a kind of request it doesn’t flag. “CORS is designed to stop information theft and loading of out of doors assets. On this situation, the assault makes use of a easy command, which slips via the CORS gauntlet and, on this case, turns off the VPN, instantly exposing the person’s IP and subsequently basic location,” Surber explains.
What This Means for VPN Customers
To check the extent of the vulnerability, icudar wrote malicious JavaScript that might request port 8076 and efficiently disconnect the VPN, then request to leak the person’s IP tackle.
“It exhibits that AtlasVPN doesn’t take their [users’] security critical, as a result of their software program safety selections suck so massively that [it’s] laborious to imagine it is a bug quite than a backdoor,” they wrote.
There isn’t any proof but of AtlusVPN’s vulnerability being exploited within the wild. In a response by way of Reddit, the pinnacle of the IT division at AtlusVPN wrote that the corporate is fixing the difficulty, will notify all Linux shopper customers, and launch a patch “as quickly as attainable.”
In a written assertion for Darkish Studying, AtlusVPN couldn’t present a precise timeline for its patch however assured that “we’re actively engaged on fixing the vulnerability as quickly as attainable.”