A Bug in Facebook Messenger for Windows Could've Helped Malware Gain Persistence

A Bug in Facebook Messenger for Windows Could've Helped Malware Gain Persistence


Cybersecurity researchers at Reason Labs, the threat research arm of security solutions provider Reason Cybersecurity, today disclosed details of a vulnerability they recently discovered in the Facebook Messenger application for Windows.

The vulnerability, which resides in Messenger version 460.16, could allow attackers to leverage the app to potentially execute malicious files already present on a compromised system in an attempt to help malware gain persistent/extended access.

Reason Labs shared its findings with Facebook in April, after which the social media company quickly patched the flaw with the release of an updated version of Facebook Messenger for Windows users via the Microsoft store.


According to researchers, the vulnerable app triggers a call to load Windows Powershell from the C:python27 path. This path is typically created when installing version 2.7 of the Python and does not commonly exist in most Windows installations.

Attackers can hijack such calls that attempt to load potentially non-existent resources to covertly execute malware. Moreover, since the targeted directory is also in a low-integrity location, malicious programs could access the path without administrator privileges.


To test if the flaw is exploitable, the team created a reverse shell disguised as Powershell.exe and deployed it into the Python directory. They then ran the Messenger app, which triggered the call, successfully executing the reverse shell, thus proving that malicious actors could exploit the flaw for persistent attacks.

Conventionally, ..

Support the originator by clicking the read the rest link below.