Advertisement






iGap Meesenger Web Client Lock Screen Bypass

CVE Category Price Severity
CVE-2021-36150 CWE-362 $5000 High
Author Risk Exploitation Type Date
Unknown High Remote 2018-04-23
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2018040182

Below is a copy:

iGap Meesenger Web Client Lock Screen Bypass
# Exploit Title: iGap Meesenger Web Client Lock Screen Bypass 
# Details: iGap is a free Iranian open-source instant messaging application for smart phones , Web and personal computers.
# Date: 4-23-2017
# Wiki: https://en.wikipedia.org/wiki/IGap
# Exploit Author: Snooper
# Contact: [email protected]
# Risk: High
# Category: web apps
# Tested on: Chrome
# Vulnerable website: https://web.igap.net (iGap web client)
# Version: 3.2.4 (latest version) and lower

1. Description

iGap web client (https://web.igap.net) srtores lock screen password hash (sha-256) in the browser local storage without server-side encryption!
  After enabling lock screen and setting password , password hash is stored with "iGap__lockScreenSetting" key in the browser local storage so 
  anyone who has access to the client browser is able to delete that key and bypass the lock screen.

2. Exploit :

[Chrome browser]

- Press Ctrl+Shift+j in chrome browser to open "console" tab.

- Enter the following command in the console line to delete "iGap__lockScreenSetting" value : 

> localStorage.removeItem("iGap__lockScreenSetting");

- Reload lock screen page by pressing Ctrl+R.

- Lock screen bypassed :)

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum