


In conversation with BleepingComputer, Cano explained that creating a PoC for this vulnerability was trivial and only took him about 5 minutes with the use of DNS Rebinding.īrowsers protect users from scripts trying to communicate with other domains or hostnames in order to prevent cookies from being stolen or other malicious activity through a security measure called Same Origin Policy (SOP). "An attacker can use DNS Rebinding to gain access to the BlueStacks App Player IPC mechanism via a malicious web page," stated BlueStacks' advisory. "From there, various exposed IPC functions can be abused."Īccording to Cano, BlueStacks is not backporting this fix to versions 2 or 3, so users are strongly advised to upgrade to the latest version 4 as soon as possible. This vulnerability was discovered and reported by security researcher Nick Cano in April and was fixed in BlueStacks 4., which was released on May 27th, 2019 along with an advisory. These functions could then be used for a variety of different attacks ranging from remote code execution to information disclosure. In BlueStacks versions earlier than v4., a DNS rebinding vulnerability existed that allowed attackers to gain access to the emulator's IPC functions. Vulnerabilities in the BlueStacks Android emulator were fixed at the end of May that allowed attackers to perform remote code execution, information disclosure, and to steal backups of the VM and its data.
