Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Not really useful? #2

Open
dvershinin opened this issue Feb 7, 2021 · 0 comments
Open

Not really useful? #2

dvershinin opened this issue Feb 7, 2021 · 0 comments

Comments

@dvershinin
Copy link

dvershinin commented Feb 7, 2021

README says:

It's not needed to explain that now WhatsApp will leak your IP address on every received link

At least in the year 2021, that is not the case.
The link preview is generated on the sender's side only, it is relayed as an image blob to the recipient.
Because that image travels through WhatsApp servers, the recipient's IP address is not disclosed (to you, or the website's owner) in any way.

Upon receiving the preview-link-generated message, the recipient's WhatsApp does not make an external request to a third-party server. This was verified with iOS WhatsApp. The preview is displayed, but no extra request is made to the previewed website from the recipient (confirming that the preview is generated once, on the sender's side).

People picking up on one guy's incorrect findings or misinterpreting their use case (they may be correct at the year 2018, but doesn't seem that they were). And building docker images from that. Amazing :-)

Nothing personal, just hoping this to be useful to other people who easily want to try this and similar solutions only to discover there's no real way to exploit this in the way they expect.

Use cases of this vulnerability assumed by this repo or many others, which is not functional:

  • You can craft a URL page and send it to other WhatsApp users to reap their IP address.
  • You send api. link with text param set to urlencoded track URL page of your own to reap recipient's IP address.

They are not functional. This will not work. Period. The README statements are incorrect.

Real use case (which is hard of any use):

  • You can craft a URL page, and send/not-send/just-type in your WhatsApp and disclose your own IP address in your server logs. Profit is zero. To get your own IP address you can use other tools :p
  • You can force a remote WhatsApp user to be the one sending a link to disclose their IP address. Just exactly how? Social engineering them to do it, but how do you see it happening? The only way is for them to click the "api." link through some other means (from email). If you simply send the api. link to their WhatsApp - nothing happens in terms of exploit (the preview is for "WhatsApp sharing"). The users have to click the link. Just seeing that message won't disclose their IP. So in that way, this is again quite useless because you can simply share any link from your server (not api.whatsapp.com) and ensuring that it is clicked will get you their IP address.

Thus, README saying:

Send this link to your victims: https://api.whatsapp.com/send?phone=+**PHONE_NUMBER**&text=http%3A%2F%2F**YOUR_EVIL_URL**

Does not provide any real benefit over:

Send this link to your victims: https://your.example/track.php

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant