Authored by LiquidWorm | Site zeroscience.mk

SmartFoxServer 2X version 2.17.0 suffers from a God Mode Console cross site scripting vulnerability.

advisories | CVE-2021-26549


SmartFoxServer 2X 2.17.0 God Mode Console WebSocket XSS


Vendor: gotoAndPlay()
Product web page: https://www.smartfoxserver.com
Affected version: Server: 2.17.0
Remote Admin: 3.2.6
SmartFoxServer 2X, Pro, Basic

Summary: SmartFoxServer (SFS) is a comprehensive SDK for
rapidly developing multiplayer games and applications
with Adobe Flash/Flex/Air, Unity, HTML5, iOS, Universal
Windows Platform, Android, Java, C++ and more. SmartFoxServer
comes with a rich set of features, an impressive
documentation set, tens of examples with their source,
powerful administration tools and a very active support
forum. Born in 2004, and evolving continuously since
then, today SmartFoxServer is the leading middleware to
create large scale multiplayer games, MMOs and virtual
communities. Thanks to its simplicity of use, versatility
and performance, it currently powers hundreds of projects
all over the world, from small chats and turn-based games
to massive virtual worlds and realtime games.

Desc: Authenticated Cross-Site Scripting was discovered.
Input passed to the AdminTool console is not properly
sanitized before being returned to the user. This can be
exploited to execute arbitrary HTML code in a user's browser
session in context of an affected site.

-----------------------------------------------------------------
/ConsoleModuleReqHandler.java:
------------------------------

private String checkHTML(String data) {
if (data.indexOf(60) > -1 && data.indexOf("<span") == -1) {
data = data.replaceAll("<", "<");
return data.replaceAll(">", ">");
}
return data;

-----------------------------------------------------------------

Tested on: Windows (all) 64bit installer
Linux/Unix 64bit installer
MacOS (10.8+) 64bit installer
Java 1.8.0_281
Python 3.9.1
Python 2.7.14


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
@zeroscience


Advisory ID: ZSL-2021-5626
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5626.php

CVE ID: CVE-2021-26549
CVE URL: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-26549
NIST URL: https://nvd.nist.gov/vuln/detail/CVE-2021-26549


29.01.2021

--


Typing payload:
<script>confirm(document.URL)

WebSocket payload:
x80x00x52x12x00x03x00x01x63x02x01x00
x01x61x03x00x0Dx00x01x70x12x00x03x00
x01x63x08x00x0Cx63x6Fx6Ex73x6Fx6Cx65
x2Ex68x69x6Ex74x00x01x72x04xFFxFFxFF
xFFx00x01x70x12x00x01x00x01x63x08x00
x18x3Cx73x63x72x69x70x74x3Ex63x6Fx6E
x66x69x72x6Dx28x64x6Fx63x75x6Dx65x6E
x74x2Ex55x52x4Cx29