[PSA] Critical Security Vulnerabilities in "Foxverse" (an open source Miiverse replacement) and the return of PokeAcer

TLDR: In its current state, Foxverse has critical security vulnerabilities that could lead to password breaches, which the developer refuses to fix. Additionally, PokeAcer, a user who has previously stolen and sold other people's exploits, and has used services he was an administrator on to read people's personal messages, is an administrator on this new Foxverse project. In short, as it is right now, Foxverse cannot be trusted.

Well, apparently it's that time of the month again, as I have the pleasure of making Yet Another Drama Blogpost(TM). This time, I'm going to detail security vulnerabilities in the new Foxverse service, which, for the uninformed, is a Miiverse replacement developed by ninjafox/ctrninja/xkyup/ste (did I miss any of his old usernames?). Additionally, PokeAcer is back and working on this Foxverse project. I'll explain why I think that's bad news for the project, and why as long as PokeAcer is working on it, I won't trust it at all.

To start with, I'll discuss the potential security vulnerabilities. Unlike last time, where the screenshot dump was at the end of the post, I'm going to put these screenshots at the beginning, so you can have some context going into what is a somewhat technical explanation: https://imgur.com/a/fVYsK

Password validation security is hard to get right - there's a lot of moving parts, and a lot of the security methods are difficult to understand. However, it's the most important part of any web service, as an exploit and password leak in your service could lead to users' passwords being leaked for multiple sites, including potentially harmful things like bank accounts. For this reason, no matter what service you're implementing, if it deals with passwords, it has to be secure.

Unfortunately, Foxverse isn't secure in its current implementation. There are two main issues:
  1. Client-side hashing
  2. Use of HTTP over HTTPS
I'll address each of these in turn. Note this is going to be a somewhat technical explanation - if you want the layman's version, skip ahead.

First, client-side hashing. Client side hashing, in and of itself, is not a bad thing. In fact, it's probably a good idea to do some amount of client side hashing, especially using a secure key-stretching algorithm such as bcrypt. However, client side hashing is by no means a replacement for server-side hashing. If the password is hashed on the client side and uploaded to a password database and stored in that database, logically, the client-side hash becomes the user's password. In the event of a database breach, an attacker doesn't even need to crack the hash - all they have to do is upload said hash, and they can instantly get into any user account. For this reason, client side hashing without any server side hashing is no better than storing passwords in plaintext. That being said, all this would allow an attacker to do is gain access to their Foxverse account - it wouldn't give an attacker the user's actual password. However, it's still a rather large security risk, and one that should be considered and patched. The solution is simple - hash on the server as well as on the client.

Secondly, there's a much bigger issue - the use of HTTP over HTTPS. The use of HTTP means that none of the data sent between the console and the server is encrypted. Any attacker could simply read all of the data in plaintext, and, if they Man In The Middle (MITM) the connection, modify that data. This means two things: first, any attacker can get the password with ease (if it's hashed client side, which Forxverse does right now, only that service will be compromised). The much bigger danger, however, is the danger of an MITM. It's trivial to modify the javascript sent over HTTPS to not include the hashing + salting algorithm. This means that a potential attacker could get the plaintext password of anyone using this service with relative ease. Confronting ninjafox over this vulnerability got me nowhere, and given my belief that this issue is paramount to public security, I've decided to publicly post it.

Now for the layman's explanation: Foxverse does not securely store passwords, leading to two major vulnerabilities. The first is that anyone with a password database dump doesn't need to crack the hashes, but instead can access anyone's account instantly. The second is that an attacker can MITM the connection between the server and the console, perform a trivial modification of the JavaScript served, and get the plaintext password through that route (which could lead to the compromise of other services).

Please note that this is not an attempt to kill the project like ninjafox seems to believe it is. I would be ecstatic to get a proper Miiverse replacement. However, password security is something extremely important and I strongly believe that any such Miiverse replacement needs to have strong security. This is simply an attempt at making sure that this happens.

And now, onto the second part of the post: the return of PokeAcer.

At this point, it's fairly common knowledge that PokeAcer cannot be trusted - see my link at the top of the post. He stole and sold an exploit, begged for forgiveness, and then did the same thing again, and stole and leaked an exploit (ugopwn) ahead of time. However, something I had forgotten about myself was that PokeAcer also stole and read private flipnotes, abusing his position as a Project Kaeru administrator. See my quote from the last post:
Additionally, he says not to judge one of the projects he works on, Project Kaeru (a custom server for Flipnote Studio 3D) as the rest of team doesn't condone his actions, but later on he admitted that he was reading and stealing information from people's notes on the Project Kaeru server.
Although I glossed over it last time, I believe it's extremely relevant to consider now. As long as someone who has a history of stealing private messages is involved in a service like this, I cannot trust any data that is on said service. And yes, PokeAcer is involved as a developer in this.

In short, I cannot, and don't believe anyone should, trust Foxverse, both due to the security issues, and the personnel involved.
  • Like
Reactions: 53 people
Status
Not open for further replies.

Comments

Btw I can confirm all of this. Xkyup has personally told me of PokeAcers involvement in the project. In case anyone here thinks this just an effort harm foxverse since astro doesnt like xkyup/ctrninja/foxninja: it isn’t. I have confirmation from all other developers involved in the project that PokeAcer is a developer on foxverse.

While I won’t get into the details on insecure password hashing (security isn’t really my thing just yet), the logs are out there.

Personally speaking, I cannot in good consiousness trust foxverse for as long as it is run in part by a man who has consistently proven that money goes first.
 
  • Like
Reactions: 9 people
Wow, how do you find out all this stuff? I dunno if i should be amazed how much follow up content there is between you and this poker ace person or if you just wayyyyyy too good at investigating stuff on a computer. :unsure:
 
@Sonic Angel Knight - Most of the stuff involving PokeAcer on this project is said in a semi-private Discord and in a private DM group. I was able to confirm his involvement by strongly suggesting one of the developers to back off if he was involved and he didnt deny it, and the other developer came out and confirmed it.

As for his past history: There have been public statements on ihaveamacs blog and on a GBATemp chat.
 
  • Like
Reactions: 2 people
@Sonic Angel Knight Although I can't go into full detail, I work at a government contractor, where security is paramount. As a result, I'm decently well-versed in this kind of stuff and am able to understand the difference between good and bad implementations, and the results of bad implementations.
 
Oh, well that makes more sense :)

Still I least should be thanking you for bringing this to our attention, but now i find it a bit difficult to trust stuff related to nintendo with this person around as part of some problems that can happen. Honestly if this is still related to this bug bounty program nintendo started, it sure turned the ugly side of people fast. Trying to steal personal information and being lazy about discovery of exploits, is not looking good for the scene in this case. :unsure:
 
@BlueFox gui the fact that he's still here and working in a scene that has already exposed him for his pathetic actions.
 
  • Like
Reactions: 7 people
By the way, I was just (like 5 minutes ago) hired as a beta tester, it's not finished and there's a lot of stuff needed to do. I seen how they had problems with using HTTPS and are trying to use it instead of HTTP, I believe that got it kinda working. Like the post said, it's not finished.
 
Finished or not, Pokeacer is involved, someone who is notorious for stealing information, why would you trust anything with his name on it?
 
  • Like
Reactions: 2 people
@Jacklack3 this is good, and I do appreciate the acknowledgement of the security vulnerabilities. Had this merely been communicated to me in the beginning (rather than being told to "suck a dick"), there wouldn't've been a need for a majority of this blog post.

This doesn't resolve my concerns with the personnel, but it's an improvement at least.
 
  • Like
Reactions: 2 people
To be honest, I was like "What the fuck?" when Billy joined and was admin, at least make him a mod + beta tester or somethin'.
 
@Jacklack3 - For full clarity, in the discussion I had with xkyup he seemed to suggest that this was and I quote "literally all they had to do" when referring replacing the https code with http in the code.bin file on miiverse. There was zero information suggesting otherwise.

The same goes for his other argument about password hashing: There was no informmation suggesting this was a temporary implementation.

If this post inspired their project to implement proper security, I'd consider that a win on astro's end, even if Xkyup and PokeAcer have too much pride to ever say it.

Regardless of any of this: I still would not trust any project involving Poke"istoleamac"Acer.
 
  • Like
Reactions: 3 people
Status
Not open for further replies.

Blog entry information

Author
astronautlevel
Views
2,126
Comments
356
Last update
Rating
1.00 star(s) 1 ratings

More entries in Personal Blogs

More entries from astronautlevel

General chit-chat
Help Users
  • No one is chatting at the moment.
  • K3Nv2 @ K3Nv2:
    Thanks for signing up at LinusTechTips
  • QuarterCut @ QuarterCut:
    holey shmoley!
  • BigOnYa @ BigOnYa:
    Your credit card has been charged. Thank you.
  • K3Nv2 @ K3Nv2:
    Your screwdriverPlus will arrive in three weeks
    +1
  • QuarterCut @ QuarterCut:
    K64_Waddle_Dee_Artwork_1.jpg

    my reaction to such information
    +2
  • BigOnYa @ BigOnYa:
    Press 1 for English. Press 2 for Pig Latin. Or press 3 to speak to a representative.
  • BakerMan @ BakerMan:
    guys, i need help, i got into an argument about what genre radioactive is, and i forgot who made it
  • Sicklyboy @ Sicklyboy:
    @BakerMan, Imagine Dragons
  • Sicklyboy @ Sicklyboy:
    Dragon deez nuts across yo face GOTEEM
  • Sicklyboy @ Sicklyboy:
    lmao now I realize that was probably the joke in the first place
    +1
  • BakerMan @ BakerMan:
    IMAGINE DRAGON DEEZ NUTS ACROSS YO- FUCK HE BEAT ME TO IT
  • BigOnYa @ BigOnYa:
    You have selected 4 - Death by Snu Snu, please stand by...
    +1
  • BakerMan @ BakerMan:
    lucky bastard
    +1
  • Sicklyboy @ Sicklyboy:
    hahahaha I'm half way through a bag off my Volcano and my tolerance is way down because I haven't been smoking much lately, so I was a little slow to catch that that was what your angle was 🤣🤣
    +1
  • Sicklyboy @ Sicklyboy:
    Also I was just excited to know a music reference for once (I am the LAST person in the world that you want on your trivia team)
    +2
  • K3Nv2 @ K3Nv2:
    Bummer webos 7.4 isnt working with dejavuln-autoroot
  • Sicklyboy @ Sicklyboy:
    PS4 right? I think that's what mine's on. Or 5.6, maybe.
  • K3Nv2 @ K3Nv2:
    [!] Installation failed (devmode_enabled not recognized)
  • K3Nv2 @ K3Nv2:
    0.5 seemed to work whatever lol i wont bitch
  • Alysh_Graham @ Alysh_Graham:
    Hehehe
    Alysh_Graham @ Alysh_Graham: Hehehe