spaces

spaces is the service with anonymous chat spaces and subspaces

spaces

API of the service implemented on websockets, available commands:

User can regenerate a random profile before joining any space. After joining all the participants any member can close the space, and from this moment no new members can join the closed space and read messages. Current user's space and room are persisted to the disk, after F5 space and room are read from disk by user's auth and the first and last 3 messages are shown.

Vuln (tldr)

  1. Thread unsafe Random instance which can be broken to generate zero space ID
  2. Zero space ID encoded as empty string not 1 (Base58 zero) and serialized values not padded by 1
  3. Empty encoded space ID leads to traversing path to the root data/ folder, which allows to create space using Room command
  4. Base58 implementation is vulnerable to integer overflow on long Base58 strings, which allows to create conflicting space with the same ID
  5. Space open/closed validation use user passed string not the Int64 decoded Base58 value, so conflicting space instead of real can be used to join

So, the exploitation plan is:

  1. Break Random instance with large number of Generate requests
  2. Generate new random space, which will be 0 (an empty string after Base58 encoding) becauses of broken Random
  3. Create a room with long crafted Base58 string which leads to integer overflow on space ID decoding
  4. Save current cookies to reuse websocket connection with saved state with space ID equal 0
  5. Use the second websocket with crafted Base58 string to join the space and bypass space access checks

Details

For generation random profile used a signle instance of thread unsafe PRNG without locks. This instance is also used to generate random space ID. The old seeded .NET PRNG implementation uses an LCG, this implementation has two counters, and unsynced usage of this instance from multiple threads leads to highly likely stable state when both counters become equal. In this state Random instance generates only zeros.

Web socket messages are processed in multithreaded manner:

_ = Task.Run(async () =>
{
    var cmd = JsonSerializer.Deserialize<Command>(/* ... */);
    await conn.ExecuteCommandAsync(cmd, cancel);
}, cancel);

So if the attacker send many commands on generating random profile without awaiting response message from server, it is highly likely that Random instance will be broken.

Space ID is a Base58-encoded Int64 random number. Broken Random instance generates only zeroes, and zero encoded as Base58 by spaces implementation of Base58 becomes an empty string. spaces uses diretory structure and files as a storage, all messages of some space are the files inside the directory with Base58-encoded space ID value. But Path.Combine which used to form a path to files skips empty segments of the path. So if broken Random instance is used to generate space ID, the base folder for this space ID is the data/ forder. This allows to manipulate spaces as the rooms which in normal situation lie inside the space base folder.

But the room name validation does not allow us to enter any space as a room from data/ forlder to read all the messages, because room names can use only ASCII letters (not digits), and name is lowercased before further usage whereas space ID's Base58 alphabet contains also digits and uppercase letters.

Luckily the next problem is that space join validation uses user passed value instead of converted one to Int64.

if(value == null)
    Storage.CreateSpace((space = conn.RndSpace()).ToBase58());
/* user passed string value used to check access here */
else if(!ContextHelper.TryParseSpace(value, out space) || !Storage.IsSpaceExists(value) || !Storage.HasAccess(value, conn.UserId))
{
    await conn.TrySendErrorAsync("Space not exists or invalid or closed", cancel);
    return;
}
var user = await Storage.FindUserAsync(conn.UserId, space.ToBase58(), cancel);
/* ... */

Thats allow us to create a space ID folder which will be not closed and can be used to bypass the real space closed or not checks. If that possible to generate Base58 string which will be decoded to the same Int64 value.

Yes, because Base58 implementation contains integer overflow problem.

public static bool TryDecodeUInt64(string value, out ulong result)
{
    /* ... */
    ulong tmp = 0UL, mul = 1UL;
    for(int i = 0; i < value.Length; i++)
    {
        /* ... */
        tmp += digit * mul;   // <- integer overflow
        mul *= Base;          // <- integer overflow
    } /* ... */
}

By default C# .NET uses unchecked context on operations like '+' and '*'. So we can pass long Base58 crafted string which will contain only lower ASCII leeters and with integer overflows will be decoded to the same Int64 space ID value.

You can see full exploit here: EXPLOIT

Exploit