IQ Reply Spoofing

The Situation
Most XMPP stacks provide a convenience method to send an IQ request that returns the IQ response (or e.g. throws an exception on timeout). To collect the response the incoming IQ stanzas are matched against a filter. Unfortunately the filter often looks like

Such a filter would therefore match every IQ stanza with the same ID as the request. But this is not enough. A malicious attacker that is able to guess the request IQ's ID is able to send a spoofed IQ response, which causes the malicious response to be evaluated by the XMPP stack. This gives the attacker the ability to trigger code parts (usually parsing related code) and logic he normally wouldn't have access to. For example, he could able to add contacts to the victims rooster.

The solution is to additionally verify the from attribute of the result IQ, since its value can not be spoofed:

Now the devil is in the details: It is valid to send an stanza, and this includes an IQ request, without a to attribute (RFC 6120 § 8.1.1.1). Furthermore some servers may reply with the users full JID if the request was send to the bare JID. must therefore, besides matching stanzas that have exactly the same 'from' value as the requests 'to' attribute, follow those rules:

If 'to' is not set, match stanzas where 'from' is
 * not set
 * the sending entity's bare JID, when the resource part is stripped
 * the XMPP service JID

If 'to' is the sending entity's bare JID, the it must also match stanzas where 'to' is not set.

Links with more information

 * http://tools.ietf.org/html/draft-alkemade-xmpp-iq-validation-00
 * http://www.ietf.org/proceedings/89/slides/slides-89-xmpp-3.pdf
 * http://mailman.jabber.org/pipermail/jdev/2014-March/089892.html

Vulnerable

 * Conversations: https://github.com/siacs/Conversations/issues/20
 * Messages.app http://openradar.appspot.com/16147049
 * Miranda http://trac.miranda-ng.org/ticket/569
 * Strophe.js https://github.com/strophe/strophejs/issues/56

Not Vulnerable / Fixed

 * Smack, fixed with 4.0 (SMACK-533, SMACK-538, CVE-2014-0364)
 * libpurple/Pidgin, fixed with https://pidgin.im/pipermail/commits/2014-January/024231.html
 * Go XMPP https://github.com/agl/xmpp/issues/13
 * SleekXMPP https://github.com/fritzy/SleekXMPP/issues/278
 * XMPPFramework https://github.com/robbiehanson/XMPPFramework/issues/300