Polaris’ Intellect Core Banking Software Version 9.7.1- Open Redirect [CVE-2018-14931]

[+] Credits: Neeraj Kumar, Hai Dang Long
[+] Email: neeraj.iiita2009@gmail.com


Polaris’ Intellect Core Banking, Core and Portal Module

Affected Version: 9.7.1

Vulnerability Type:
Open Redirect

CVE Reference:

Vulnerability Details:
Polaris’ Intellect Core Banking Software, In the Core module is vulnerable to open redirect vulnerability. Open redirection vulnerabilities arise when an application incorporates user-controllable data into the target of a redirection in an unsafe way. An attacker can construct a URL within the application which causes a redirection to an arbitrary external domain. This behaviour can be leveraged to facilitate phishing attacks against users of the application. The ability to use an authentic application URL, targeting the correct domain with a valid SSL certificate (if SSL is used) lends credibility to the phishing attack because many users, even if they verify these features, will not notice the subsequent redirection to a different domain.

Exploit URL(s):
It ill redirect to http://www.google.com

Affected Component:
Parameters Name: IntellectSystem

Disclosure Timeline:
Vendor Notification: 17 June 2018
Mitre Notification: 04 August 2018
Public Disclosure: 31 March 2019

Attack Type:

Impact Code execution:

Impact Information Disclosure

Request Method(s): [+] Get
Vulnerable Product: [+] Polaris’ Intellect Core Banking, Core and Portal Modules
Vulnerable Parameter(s): [+] IntellectSystem
[+] Disclaimer
The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. All content (c).


Popular posts from this blog

Cross-Site Request Forgery- Smartvista SVFE-2 Module [CVE-2018-15206]

Stored XSS Vulnerability in Hot Scripts Clone:Script Classified Version 3.1-[CVE-2018-7650]

Session Fixation- Smart Vista SVFE-2 Module [CVE-2018-15208]