[PSA] Critical Security Vulnerabilities in "Foxverse" (an open source Miiverse replacement) and the return of PokeAcer

TLDR: In its current state, Foxverse has critical security vulnerabilities that could lead to password breaches, which the developer refuses to fix. Additionally, PokeAcer, a user who has previously stolen and sold other people's exploits, and has used services he was an administrator on to read people's personal messages, is an administrator on this new Foxverse project. In short, as it is right now, Foxverse cannot be trusted.

Well, apparently it's that time of the month again, as I have the pleasure of making Yet Another Drama Blogpost(TM). This time, I'm going to detail security vulnerabilities in the new Foxverse service, which, for the uninformed, is a Miiverse replacement developed by ninjafox/ctrninja/xkyup/ste (did I miss any of his old usernames?). Additionally, PokeAcer is back and working on this Foxverse project. I'll explain why I think that's bad news for the project, and why as long as PokeAcer is working on it, I won't trust it at all.

To start with, I'll discuss the potential security vulnerabilities. Unlike last time, where the screenshot dump was at the end of the post, I'm going to put these screenshots at the beginning, so you can have some context going into what is a somewhat technical explanation: https://imgur.com/a/fVYsK

Password validation security is hard to get right - there's a lot of moving parts, and a lot of the security methods are difficult to understand. However, it's the most important part of any web service, as an exploit and password leak in your service could lead to users' passwords being leaked for multiple sites, including potentially harmful things like bank accounts. For this reason, no matter what service you're implementing, if it deals with passwords, it has to be secure.

Unfortunately, Foxverse isn't secure in its current implementation. There are two main issues:
  1. Client-side hashing
  2. Use of HTTP over HTTPS
I'll address each of these in turn. Note this is going to be a somewhat technical explanation - if you want the layman's version, skip ahead.

First, client-side hashing. Client side hashing, in and of itself, is not a bad thing. In fact, it's probably a good idea to do some amount of client side hashing, especially using a secure key-stretching algorithm such as bcrypt. However, client side hashing is by no means a replacement for server-side hashing. If the password is hashed on the client side and uploaded to a password database and stored in that database, logically, the client-side hash becomes the user's password. In the event of a database breach, an attacker doesn't even need to crack the hash - all they have to do is upload said hash, and they can instantly get into any user account. For this reason, client side hashing without any server side hashing is no better than storing passwords in plaintext. That being said, all this would allow an attacker to do is gain access to their Foxverse account - it wouldn't give an attacker the user's actual password. However, it's still a rather large security risk, and one that should be considered and patched. The solution is simple - hash on the server as well as on the client.

Secondly, there's a much bigger issue - the use of HTTP over HTTPS. The use of HTTP means that none of the data sent between the console and the server is encrypted. Any attacker could simply read all of the data in plaintext, and, if they Man In The Middle (MITM) the connection, modify that data. This means two things: first, any attacker can get the password with ease (if it's hashed client side, which Forxverse does right now, only that service will be compromised). The much bigger danger, however, is the danger of an MITM. It's trivial to modify the javascript sent over HTTPS to not include the hashing + salting algorithm. This means that a potential attacker could get the plaintext password of anyone using this service with relative ease. Confronting ninjafox over this vulnerability got me nowhere, and given my belief that this issue is paramount to public security, I've decided to publicly post it.

Now for the layman's explanation: Foxverse does not securely store passwords, leading to two major vulnerabilities. The first is that anyone with a password database dump doesn't need to crack the hashes, but instead can access anyone's account instantly. The second is that an attacker can MITM the connection between the server and the console, perform a trivial modification of the JavaScript served, and get the plaintext password through that route (which could lead to the compromise of other services).

Please note that this is not an attempt to kill the project like ninjafox seems to believe it is. I would be ecstatic to get a proper Miiverse replacement. However, password security is something extremely important and I strongly believe that any such Miiverse replacement needs to have strong security. This is simply an attempt at making sure that this happens.

And now, onto the second part of the post: the return of PokeAcer.

At this point, it's fairly common knowledge that PokeAcer cannot be trusted - see my link at the top of the post. He stole and sold an exploit, begged for forgiveness, and then did the same thing again, and stole and leaked an exploit (ugopwn) ahead of time. However, something I had forgotten about myself was that PokeAcer also stole and read private flipnotes, abusing his position as a Project Kaeru administrator. See my quote from the last post:
Additionally, he says not to judge one of the projects he works on, Project Kaeru (a custom server for Flipnote Studio 3D) as the rest of team doesn't condone his actions, but later on he admitted that he was reading and stealing information from people's notes on the Project Kaeru server.
Although I glossed over it last time, I believe it's extremely relevant to consider now. As long as someone who has a history of stealing private messages is involved in a service like this, I cannot trust any data that is on said service. And yes, PokeAcer is involved as a developer in this.

In short, I cannot, and don't believe anyone should, trust Foxverse, both due to the security issues, and the personnel involved.
  • Like
Reactions: 53 people
Status
Not open for further replies.

Comments

@Ev1l0rd ok so now he's an asshole for doing what you said? wow i never knew ok that explains what i need to know thanks.
 
  • Like
Reactions: 1 person
There's a difference between being an asshole and starting drama for the sake of it, and publicising outrageous actions that shouldn't be tolerated.
 
  • Like
Reactions: 1 person
@GalladeGuy at least this """drama""" is trying to protect the fucking community and not hate on the people who fucking made what we have possible. The above addresses major fucking flaws in how they are handling their project in a way that the public can read about. This is a huge security threat, especially for those who use just one password. To top this all off, one of the fucking developers is the biggest piece of shit who has stolen and/or sold exploits twice. If anyone thinks that it is ok to do that and give them another chance to do it is textbook definition insane at this point.
 
  • Like
Reactions: 2 people
Different exploit: He definitely sold a second exploit (as he admitted to himself, made 2048 dollars from it).

Whether that was his own or someone else's remains somewhat unknown. Given some of the screenshots where he said something along the lines of "I sold the exploit and then told him we just got found out," it sounds like it wasn't entirely his own exploit, if at all.
 
  • Like
Reactions: 2 people
He has told me that what he sold were his own bugs. He has admitted to selling the first exploit and leaking Ugopwn, but what was wrong in both GBATemp posts that the second exploit could possibly not been stolen and that he had no way of reading private posts on Kaeru because as said by two devs it's impossible to do so.
 
I'm sorry, that's not possible. He's bragged about reading the Kaeru notes before getting exposed, and I strongly doubt Poke is capable of finding his own exploits if all he knows is a bit of PHP (and going full skiddy on it, to add to that) - the screenshots in the PokeAcer PSA that previously exposed him can't be explained away if they were his own. They're worded strangely.
 
According to both Joshua and JSA there is no way to make a note private, meaning the notes had to be public.
 
That doesn't mean he had to have used the notes to steal an exploit. He's incapable of finding his own as Shutterbug has stated that he's not really a programmer, so then tell me - where did he find a bug worth $2,000?
 
  • Like
Reactions: 3 people
I honestly don't know where he got that much money from but we shouldn't really be accusing him for crap we don't even know he did. We have no proof on where that $2000 came from, we have no proof that he stole it or if he earned it on his own. I was manily defending him for the whole he spy's on Kaeru thing
 
  • Like
Reactions: 1 person
I know Billy well, and I don’t think he’s gonna report any other exploits to Nintendo again because I’m sure getting another $1000 is not worth losing even more trust across the whole 3DS scene (and it might be a long time before people trust him again). I don’t trust him with money anymore myself, he used to ask me for money when he was broke.

But as I see it, he’s not completely gonna disappear from the Internet, he’s interested in bringing back online services but he’s not intentionally trying to steal people’s passwords - I believe the setup they’re currently using is indeed for testing purposes right now.

I don’t think Billy ever tried to read someone’s Flipnotes, he was just trying to get the link to the ugopwn exploit. It’s not like someone is gonna hide important information in a Flipnote.
 
@Larsenv - It doesn't neccesarily matter if he tried to read someones flipnotes or not. The fact is that he bragged about accessing someones private flipnotes (although I've been told no private flipnotes exist, that is beyond the point) and therefore marked himself as someone who is not to be trusted with any form of confidential/private data. Want a comparison?

Say for example that I bragged to someone else (who has no reason to believe otherwise) that I have access to your GBATemp account. Now you and me both know that is a lie. But that person who I told it doesn't have any reason to suspect otherwise and therefore reaches the logical (and correct) conclusion that I am untrustworthy.

EDIT: Now swap around I with PokeAcer and GBATemp with Kaeru and you have a rough example of what PokeAcer did.
 
Remind me on why people are still hellbent on defending that lying scumbag, again? Why are people bothering associating with him in the first place? He has no place in your team.
 
Fine by me, don't come crying to us if he screws you over. Hiring a sellout who stole information and sold it for thousands of dollars, what could possibly go wrong?
 
  • Like
Reactions: 2 people
Status
Not open for further replies.

Blog entry information

Author
astronautlevel
Views
2,104
Comments
356
Last update
Rating
1.00 star(s) 1 ratings

More entries in Personal Blogs

More entries from astronautlevel

General chit-chat
Help Users
  • No one is chatting at the moment.
  • Xdqwerty @ Xdqwerty:
    good night
  • BakerMan @ BakerMan:
    as to you
  • K3Nv2 @ K3Nv2:
    How do you know if the night will be good when you're asleep
  • BakerMan @ BakerMan:
    because i didn't say i was asleep
  • BakerMan @ BakerMan:
    i said i was sleeping...
  • BakerMan @ BakerMan:
    sleeping with uremum
  • K3Nv2 @ K3Nv2:
    Even my mum slept on that uremum
  • TwoSpikedHands @ TwoSpikedHands:
    yall im torn... ive been hacking away at tales of phantasia GBA (the USA version) and have so many documents of reverse engineering i've done
  • TwoSpikedHands @ TwoSpikedHands:
    I just found out that the EU version is better in literally every way, better sound quality, better lighting, and there's even a patch someone made to make the text look nicer
  • TwoSpikedHands @ TwoSpikedHands:
    Do I restart now using what i've learned on the EU version since it's a better overall experience? or do I continue with the US version since that is what ive been using, and if someone decides to play my hack, it would most likely be that version?
  • Sicklyboy @ Sicklyboy:
    @TwoSpikedHands, I'll preface this with the fact that I know nothing about the game, but, I think it depends on what your goals are. Are you trying to make a definitive version of the game? You may want to refocus your efforts on the EU version then. Or, are you trying to make a better US version? In which case, the only way to make a better US version is to keep on plugging away at that one ;)
  • Sicklyboy @ Sicklyboy:
    I'm not familiar with the technicalities of the differences between the two versions, but I'm wondering if at least some of those differences are things that you could port over to the US version in your patch without having to include copyrighted assets from the EU version
  • TwoSpikedHands @ TwoSpikedHands:
    @Sicklyboy I am wanting to fully change the game and bend it to my will lol. I would like to eventually have the ability to add more characters, enemies, even have a completely different story if i wanted. I already have the ability to change the tilemaps in the US version, so I can basically make my own map and warp to it in game - so I'm pretty far into it!
  • TwoSpikedHands @ TwoSpikedHands:
    I really would like to make a hack that I would enjoy playing, and maybe other people would too. swapping to the EU version would also mean my US friends could not legally play it
  • TwoSpikedHands @ TwoSpikedHands:
    I am definitely considering porting over some of the EU features without using the actual ROM itself, tbh that would probably be the best way to go about it... but i'm sad that the voice acting is so.... not good on the US version. May not be a way around that though
  • TwoSpikedHands @ TwoSpikedHands:
    I appreciate the insight!
  • The Real Jdbye @ The Real Jdbye:
    @TwoSpikedHands just switch, all the knowledge you learned still applies and most of the code and assets should be the same anyway
  • The Real Jdbye @ The Real Jdbye:
    and realistically they wouldn't

    be able to play it legally anyway since they need a ROM and they probably don't have the means to dump it themselves
  • The Real Jdbye @ The Real Jdbye:
    why the shit does the shitbox randomly insert newlines in my messages
  • Veho @ Veho:
    It does that when I edit a post.
  • Veho @ Veho:
    It inserts a newline in a random spot.
  • The Real Jdbye @ The Real Jdbye:
    never had that i don't think
    The Real Jdbye @ The Real Jdbye: never had that i don't think