The vulnerability involves a stored cross-site scripting flaw in Koo’s web application that allows malicious scripts to be embedded directly into the affected web application.
A malicious actor had to do was log into the service via the web application and post an XSS-encoded payload to its timeline, which automatically gets executed on behalf of all users who saw the post.
Using cross-site scripting, an attacker can perform actions on behalf of users with the same privileges as the user and steal web browser’s secrets, such as authentication cookies.
The end result of this vulnerability in Koo, also known as XSS worm, is more worrisome because it automatically propagates malicious code among a website’s visitors to infect other users without any user interaction, like a chain reaction.
The fixes follow another critical vulnerability in the Koo app was patched earlier this February that could have allowed attackers to gain access to any user account on the platform without requiring a password or user interaction. The vulnerability arises due to the way the app validates access tokens when a user is authenticated with a phone number and an one-time password (OTP) sent to it.
The disclosure comes a little over a month after similar XSS-related vulnerabilities were uncovered in Microsoft’s Edge browser, which can be exploited to trigger an attack simply by adding a comment to a YouTube video or sending a Facebook friend request from an account that contains non-English language content accompanied by an XSS payload.