WhatsApp fixes dangerous flaw in Web app

Malware could be delivered by changing a vCard's file extension

whatsapp flaw

A flaw found by Check Point in WhatsApp's web app could be used to deliver malware by changing a vCard's file extension.

Credit: Check Point

WhatsApp, the widely used messaging program, has fixed a dangerous flaw in its Web app that could be used to trick people into installing malware, according to Check Point.

The flaw could affect as many as 200 million people who use WhatsApp's web interface, wrote Oded Vanunu, Check Point's group manager for security research and penetration.

"All an attacker needed to do to exploit the vulnerability was to send a user a seemingly innocent vCard containing malicious code," he wrote.

The flaw was found by a Check Point researcher, Kasif Dekel. He found that the Web version of WhatsApp failed to properly filter electronic business cards in the vCard format.

Dekel found it was possible to change the file extension for a vCard to .bat, or a batch executable script. WhatsApp thinks a user is just receiving a vCard, but it's actually executable code.

"This means once the victim clicks the downloaded file (which he assumes is a contact card), the code inside the batch file runs on his computer," Dekel wrote.

An attacker just needs the victim's phone number to send the malicious code and for the recipient to accept it.

Check Point disclosed the flaw to WhatsApp on Aug. 21, and WhatApp released an update for Web clients on Aug. 27. The up-to-date version is v0.1.4481.

Check Point waited until Tuesday to publicly disclose the vulnerability. 

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.
Related:
Must read: Hidden Cause of Slow Internet and how to fix it
Notice to our Readers
We're now using social media to take your comments and feedback. Learn more about this here.