WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2025 Poal.co

873

Source: https://archive.md/C88Al

Do not open external links that end with .webp

The attack vector can also be spread through a .webp file renamed as .jpg

If you are using FireFox (or a clone) you can disable webp support:

  • about:config >> image.http.accept, delete "image/webp"
  • about:config >> network.http.accept.default, delete "image/webp"
  • about:config >> set image.webp.enabled to FALSE

You can also use:

Update: webp uploading/linking/viewing are now disabled (and on pic8 as well).

Source: https://archive.md/C88Al ## Do not open external links that end with .webp The attack vector can also be spread through a .webp file renamed as .jpg If you are using FireFox (or a clone) you can disable webp support: * about:config >> image.http.accept, delete "image/webp" * about:config >> network.http.accept.default, delete "image/webp" * about:config >> set image.webp.enabled to FALSE You can also use: * https://addons.mozilla.org/en-US/firefox/addon/dont-accept-webp/ ## Update: webp uploading/linking/viewing are now disabled (and on pic8 as well).

(post is archived)

[–] 12 pts 3y

Its always suspicious when a new format just magically gets accepted and pushed every where. Fucking jewoogle.

[–] 7 pts 3y

Damn, seems like whoever is behind this is using meme culture to their advantage. Cunts.

Thanks for the warning.

[–] 6 pts 3y

I've been calling out those sharing that Joogle's 3 letter agencies trojan.

I always knew it was up to no good.

[–] 2 pts 3y

Does this affect linux platforms?

[–] 2 pts 3y

I haven't checked but it could be if crApple is using ImageIO in Webkit.

[–] 5 pts 3y

i guess i'm a retard when it comes to this tech stuff. would anyone care to explain this to non techlords.. or tell me who is at risk and what is the risk involved here???

[–] 0 pt 3y

A webp image that contains a payload could execute some malicious code on the device it has been loaded on.

[–] 1 pt 3y

and all we would have to do is just click the link? is there anyway to know if i have their malware on my pc?

[–] 1 pt 3y

and all we would have to do is just click the link?

That's correct. The image needs to be loaded (won't probably even display anything) to execute its payload.

is there anyway to know if i have their malware on my pc?

Malwarebytes, maybe?

I'm not using Windows outside a VM, so I'm not too concerned about it since I can restore a clean snapshot in seconds.

[–] 0 pt 3y

Or if the vulnerability fix would be available on non big sur OS? Lots of people are still holding out updating to big Sur because still kind of new and not as stable yet...

[–] 2 pts 3y

Previous macOS versions should be immune (OS/Safari) since there's no webp/webm support.

The vulnerability resides in the browsers that support it.

[–] 3 pts 3y

So catbox got raided?

[–] 6 pts 3y

@picmanalso fixed an issue with grabbing the catbox url (one of the pic8.co hosts)

Hey picman, can you disable .webp uploads and add an auto-redirect rule (for the current webp links) to a text image saying that webp is disabled?

[–] [deleted] 4 pts 3y

sure thing (disabling webp uploads and removing the webp images in the db)

Catbox has been disabled on pic8 permanently

[–] 4 pts 3y

and removing the webp images in the db

Ok, so I can do the same on poal then (replace all webp links with that pic8 png image link). No need for a redirect on your side.

[–] [deleted] 2 pts 3y

The alert says it only affects Apple. But, just to be cautious, does anyone have suggestions on best way to check a Linux install for possible malware? I know the ultimate solution to that is a fresh install, but I have this one highly customized and really don't want to start over if I don't have to.

[–] 1 pt 3y

Thank you. Got the addon.

[–] 0 pt 3y

Did you know you can run Linux on Apple hardware?

[–] 1 pt 3y

I don’t have crApple hardware.

[–] 0 pt 3y

The attack vector can also be spread through a .webp file renamed as .jpg

I'm also a bit of a computer dummy. Are you saying that if the file is converted to jpeg format (using xnview or similar program) it can still contain the attack vector?

[–] 0 pt 3y

Just replace the .webp extension to .jpg and the browser will still load it.

[–] 0 pt 3y (edited 3y)

Ok, I get it. It's spread through the browser by clicking on the link (so it doesn't matter what webp images I've saved from the internet). I just need to re-install my OS and disable webp support.

And of course there's no way to disable only webp support from webkit based browsers such as chromium or brave...

I guess everyone's stuck with firefox

[–] 0 pt 3y

Better safe than sorry. That's why I use several VM for online and dev related stuff. Restoring a snapshot can easily fix that kind of issue in seconds (M.2 SSD).

[–] 0 pt 3y

Hey I've noticed that this incorrectly flags links to pictures if there's a period at the end of the sentence, e.g.

[fag](image.jpg).

gets flagged.

[–] 0 pt 3y (edited 3y)

Thanks, I'll take a look at it.

[–] 0 pt 3y

Was this caused by the update the day before yesterday?

[–] 2 pts 3y

Which one?

[–] 0 pt 3y

Apple pushed two security updates to me. First to Safari, then to the System.

[–] 2 pts 3y

Check out if they are related to ImageIO.

[–] 0 pt 3y

Thanks fagguete