Incorrect Access Control- Smart Vista SVFE-2 Module [CVE-2018-15207]

[+] Credits: Neeraj Kumar, Raj Kumar Yadav
[+] Email:


Smart Vista

Smartvista Front-End (SVFE)- Version 2

Vulnerability Type:
Broken Access Control

CVE Reference:

Vulnerability Details:
Smartvista is a suite of payment infrastructure and management systems created by BPC Group. It is vulnerable to Improper Access Control in SVFE module where it fails to appropriately restrict access as normal user is able to access the functionality which is only accessible through admin.

POC Code-
Below module is only accessible in admin module-
http://<Target IP:Port>/SVFE2/pages/finadmin/currconvrate/currconvrate.jsf
But changing the admin session id with normal user session id it allows to access the above URL.

Disclosure Timeline:
Vendor Notification: 17 June 2018
Mitre Notification: 08 August 2018
Public Disclosure: 31 March 2019

Attack Type:

Impact Code execution:

Impact Information Disclosure


[+] Disclaimer
The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. All content (c).


Popular posts from this blog

Cross-Site Request Forgery- Smartvista SVFE-2 Module [CVE-2018-15206]

Stored XSS Vulnerability in Hot Scripts Clone:Script Classified Version 3.1-[CVE-2018-7650]

Session Fixation- Smart Vista SVFE-2 Module [CVE-2018-15208]