Google Fixes a Vulnerability in Quick Share that Allows Silent File Transfers Without Permission

Google Fixes a Vulnerability in Quick Share that Allows Silent File Transfers Without Permission
Researchers studying cybersecurity have revealed a new flaw in Google’s Quick Share data transfer tool for Windows that may be used to deliver arbitrary files to a target’s device without their consent or cause a denial-of-service (DoS) attack.
The vulnerability, known as CVE-2024-10668 (CVSS score: 5.9), circumvents two of the ten flaws that SafeBreach Labs first revealed in August 2024 under the QuickShell name. After responsible disclosure in August 2024, it has been fixed in Quick Share for Windows version 1.0.2002.2.
Collectively known as CVE-2024-38271 (CVSS score: 5.9) and CVE-2024-38272 (CVSS score: 7.1), these ten vulnerabilities had the potential to be combined into an exploit chain that would have allowed for arbitrary code execution on Windows hosts.
Similar to Apple AirDrop, Quick Share (formerly Nearby Share) is a peer-to-peer file-sharing app that lets users move files, images, videos, and other documents between Windows PCs and laptops, Android smartphones, and Chromebooks that are physically adjacent to one another.
According to the cybersecurity company’s follow-up study, two of the vulnerabilities were not properly patched, which resulted in the program crashing once more or sending a file straight to the device without requiring the recipient to authorize the file transfer request.
Using a file name that starts with a distinct erroneous UTF8 continuation byte (for example, “\xc5\xff”) rather than one that starts with a NULL terminator (“\x00”) could specifically cause the DoS bug.
However, the original solution to the unauthorized file write vulnerability labeled these transferred files as “unknown” and erased them from the disk at the end of the file transfer session.
By transmitting two distinct files in the same session with the same “payload ID,” the application will only remove one of them, leaving the other remaining in the Downloads folder, according to SafeBreach researcher Or Yair.
“While this research is specific to the Quick Share utility, we believe the implications are relevant to the software industry as a whole and suggest that even when code is complex, vendors should always address the real root cause of vulnerabilities that they fix,” Yair stated.
About The Author:
Yogesh Naager is a content marketer who specializes in the cybersecurity and B2B space. Besides writing for the News4Hackers blogs, he also writes for brands including Craw Security, Bytecode Security, and NASSCOM.
READ MORE HERE