Posts

Showing posts from March, 2019

Cross-Site Request Forgery- Smartvista SVFE-2 Module [CVE-2018-15206]

[+] Credits: Neeraj Kumar, Raj Kumar Yadav [+] Email: neeraj.iiita2009@gmail.com Vendor: ==================== https://www.bpcbt.com/ Product: =================== Smartvista Version: =================== Smartvista Front-End (SVFE)- Version 2 Vulnerability Type: ========================== Cross-Site Request Forgery Affected component(s)- ========================== createrole.jsf Page https://<Target-IP:Port>/SVFE2/pages/admpages/roles/createrole.jsf CVE Reference: ============== CVE-2018-15206 Vulnerability Details: ====================== Smartvista is a suite of payment infrastructure and management systems created by BPC Group. It is vulnerable to CSRF attack meaning an attacker can perform malicious actions on behalf of valid user by sending malicious links to authenticated user via phishing/social engineering methods. CSRF POC Code: ====================== <html>   <!-- CSRF PoC -->   <b

Incorrect Access Control- Smart Vista SVFE-2 Module [CVE-2018-15207]

Image
[+] Credits: Neeraj Kumar, Raj Kumar Yadav [+] Email: neeraj.iiita2009@gmail.com Vendor: ==================== https://www.bpcbt.com/ Product: =================== Smart Vista Version: =================== Smartvista Front-End (SVFE)- Version 2 Vulnerability Type: ========================== Broken Access Control CVE Reference: ============== CVE-2018-15207 Vulnerability Details: ====================== Smartvista is a suite of payment infrastructure and management systems created by BPC Group. It is vulnerable to Improper Access Control in SVFE module where it fails to appropriately restrict access as normal user is able to access the functionality which is only accessible through admin. POC Code- ====================== Below module is only accessible in admin module- http://<Target IP:Port>/SVFE2/pages/finadmin/currconvrate/currconvrate.jsf But changing the admin session id with normal user session id it allows to acce

Session Fixation- Smart Vista SVFE-2 Module [CVE-2018-15208]

[+] Credits: Neeraj Kumar, Raj Kumar Yadav, Hai Dang Long [+] Email: neeraj.iiita2009@gmail.com Vendor: ==================== https://www.bpcbt.com/ Product: =================== Smart Vista Version: =================== Smartvista Front-End (SVFE)- Version 2 Vulnerability Type: ========================== Session Fixation CVE Reference: ============== CVE-2018-15208 Vulnerability Details: ====================== Smartvista is a suite of payment infrastructure and management systems created by BPC Group. It is vulnerable session fixation attack as a valid session of an existing user can be compromised by performing Man in the Middle attacks. An attacker can gain full access to the victim’s account and thus can perform malicious activities on his behalf. POC Code- ====================== Attacker Browser: Google Chrome Victim Browser:  Mozilla Firefox 1. To fix the session attacker will first get the valid session cookie f

Polaris’ Intellect Core Banking Software Version 9.7.1- Open Redirect [CVE-2018-14931]

Image
[+] Credits: Neeraj Kumar, Hai Dang Long [+] Email: neeraj.iiita2009@gmail.com Vendor: ==================== http://www.polarisft.com Product: =================== Polaris’ Intellect Core Banking, Core and Portal Module Version: =================== Affected Version: 9.7.1 Vulnerability Type: ==================== Open Redirect CVE Reference: ============== CVE-2018-14931 Vulnerability Details: ====================== Polaris’ Intellect Core Banking Software, In the Core module is vulnerable to open redirect vulnerability. Open redirection vulnerabilities arise when an application incorporates user-controllable data into the target of a redirection in an unsafe way. An attacker can construct a URL within the application which causes a redirection to an arbitrary external domain. This behaviour can be leveraged to facilitate phishing attacks against users of the application. The ability to use an authentic application URL, targeting the co

Reflected XSS Vulnerability in Polaris’ Intellect Core Banking Software Version 9.7.1 [CVE-2018-14875]

Image
[+] Credits:   Neeraj Kumar, Hai Dang Long [+] Email: neeraj.iiita2009@gmail.com Vendor: ==================== http://www.polarisft.com Product: =================== Polaris’ Intellect Core Banking, Core and Portal Module Version: =================== Affected Version: 9.7.1 Vulnerability Type: ========================== Cross site scripting - Reflected XSS CVE Reference: ============== CVE-2018-14875 Vulnerability Details: ====================== Polaris’ Intellect Core Banking Software, the Core and Portal Modules are vulnerable to reflected XSS vulnerability within Customerid, formName, FrameId, MODE Parameters. Application does not sanitize user-supplied inputs and renders injected JavaScript code to the user's browser. Attackers use this vulnerability to inject malicious JavaScript code such as hijack user sessions, malicious redirect, deface web sites, insert hostile content, redirect users, hijack the user’s browser using mal

Error Based SQL Injection Vulnerability in Polaris’ Intellect Core Banking Software Version 9.7.1 [CVE-2018-14874]

Image
[+] Credits: Neeraj Kumar, Hai Dang Long [+] Email: neeraj.iiita2009@gmail.com Vendor: ==================== http://www.polarisft.com Product: =================== Polaris’ Intellect Core Banking, Armor Module Version: =================== Affected Version: 9.7.1 Vulnerability Type: ========================== Error Based SQL Injection vulnerability CVE Reference: ==============  CVE-2018-14874 Vulnerability Details: ====================== SQL injection, are common in web applications. Injection occurs when user-supplied data is sent to an interpreter as part of a command or query. The attacker's hostile data tricks the interpreter into executing unintended commands or changing data. The Intellect Core is and Core Banking software used for manage the core banking functions. In Armor Module of the Intellect Core, input passed through the parameter 'code' in three pages as 'collaterals/colexe3t.jsp' and '/referenc

Polaris’ Intellect Core Banking Software Version 9.7.1-Cross-Site Request Forgery [CVE-2018-14930]

Image
[+] Credits: Neeraj Kumar, Hai Dang Long [+] Email: neeraj.iiita2009@gmail.com Vendor: ==================== http://www.polarisft.com   Product: =================== Polaris’ Intellect Core Banking, Core and Portal Module Version: =================== Affected Version: 9.7.1 Vulnerability Type: ========================== Cross-Site Request Forgery CVE Reference: ============== CVE-2018-14930 Vulnerability Details: ====================== Polaris’ Intellect Core Banking Software is vulnerable to CSRF attack meaning an attacker can perform malicious actions on behalf of valid user by sending malicious links to authenticated user via phishing/social engineering methods. CSRF POC Code- ====================== <html>   <! -- CSRF PoC-->   <body>     <form action="http://<Target-IP>/CollatWebApp/gcmsRefInsert?name=SUPP" method="POST">       <input type="hidden" name=