CVE-2019-16235

7.5 HIGH

📋 TL;DR

CVE-2019-16235 is an origin validation vulnerability in Dino's XMPP message carbons implementation that allows attackers to spoof message sources. This enables message injection and impersonation attacks within XMPP conversations. Users of Dino XMPP client versions before 2019-09-10 are affected.

💻 Affected Systems

Products:
  • Dino XMPP client
Versions: All versions before 2019-09-10
Operating Systems: Linux, Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists when message carbons feature is enabled (default in many configurations).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers can inject malicious messages appearing to come from trusted contacts, enabling social engineering, credential theft, or malware distribution within XMPP conversations.

🟠

Likely Case

Message spoofing allowing impersonation of contacts, potentially leading to information disclosure or manipulation of conversations.

🟢

If Mitigated

Limited impact with proper message verification and user awareness, though trust in message authenticity remains compromised.

🌐 Internet-Facing: MEDIUM - Exploitation requires network access to XMPP server but doesn't require direct internet exposure of vulnerable systems.
🏢 Internal Only: MEDIUM - Internal XMPP networks are vulnerable if attackers gain network access or compromise internal systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires XMPP network access and ability to send crafted carbons messages. Technical details and proof-of-concept are publicly available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version from 2019-09-10 or later

Vendor Advisory: https://gultsch.de/dino_multiple.html

Restart Required: Yes

Instructions:

1. Update Dino to version 2019-09-10 or later. 2. For Linux distributions, use package manager: 'sudo apt update && sudo apt upgrade dino' (Debian/Ubuntu) or 'sudo dnf update dino' (Fedora). 3. Restart Dino client.

🔧 Temporary Workarounds

Disable Message Carbons

all

Temporarily disable the vulnerable message carbons feature to prevent exploitation.

In Dino settings: Settings → Advanced → uncheck 'Enable Message Carbons'

🧯 If You Can't Patch

  • Disable message carbons feature in Dino settings
  • Use alternative XMPP client until Dino can be updated

🔍 How to Verify

Check if Vulnerable:

Check Dino version: if version date is before 2019-09-10, system is vulnerable.

Check Version:

dino --version or check About dialog in Dino GUI

Verify Fix Applied:

Verify Dino version is 2019-09-10 or later and message carbons feature works without error.

📡 Detection & Monitoring

Log Indicators:

  • Unusual message patterns
  • Messages with mismatched source identifiers
  • XMPP carbons errors

Network Indicators:

  • Abnormal XMPP carbons traffic patterns
  • Suspicious message forwarding requests

SIEM Query:

xmpp.carbons.message AND (source_ip != expected_source OR message.origin_validation_failed)

🔗 References

📤 Share & Export