Oddbean new post about | logout
 Big New 0-day vulnerability for Web Browsers
(for Linux & Mac)

Researchers at Oligo Security have disclosed a logical vulnerability to all major browsers (Chromium, Firefox, Safari) that enables external websites to communicate with (and potentially exploit) software that runs locally on MacOS and Linux. Windows is not impacted by this issue.
‍
Oligo Researchers have found that public websites (like domains ending in .com) are able to communicate with services running on the local network (localhost) and potentially execute arbitrary code on the visitor’s host by using the address 0.0.0.0 instead of localhost/127.0.0.1. 

Remediation In Progress: Browsers Will Soon Block 0.0.0.0

Following responsible disclosure, HTTP requests to 0.0.0.0 are now being added to security standards using a Request for Comment (RFC), and some browsers will soon block access to 0.0.0.0 completely. 0.0.0.0 will not be allowed as a target IP anymore in the Fetch specification, which defines how browsers should behave when doing HTTP requests.

Source:
https://www.oligo.security/blog/0-0-0-0-day-exploiting-localhost-apis-from-the-browser 
 I wonder how this is going to work with blocking DNS servers because from what I understand a lot of them use 0.0.0.0 to make ads and malware not resolve 
 Wow. After decades of use, all major browser makers were simultaneously informed by some obscure third party, the “Oligo Research Team,” that sites can communicate with 0.0.0.0? I remember people discussing this topic like fifteen *years* ago.