Reflected XSS Vulnerability in Polaris’ Intellect Core Banking Software Version 9.7.1 [CVE-2018-14875]

[+] Credits: Neeraj Kumar, Hai Dang Long
[+] Email: neeraj.iiita2009@gmail.com

Vendor:
====================

Product:
===================
Polaris’ Intellect Core Banking, Core and Portal Module

Version:
===================
Affected Version: 9.7.1

Vulnerability Type:
==========================
Cross site scripting - Reflected XSS

CVE Reference:
==============
CVE-2018-14875

Vulnerability Details:
======================
Polaris’ Intellect Core Banking Software, the Core and Portal Modules are vulnerable to reflected XSS vulnerability within Customerid, formName, FrameId, MODE Parameters. Application does not sanitize user-supplied inputs and renders injected JavaScript code to the user's browser. Attackers use this vulnerability to inject malicious JavaScript code such as hijack user sessions, malicious redirect, deface web sites, insert hostile content, redirect users, hijack the user’s browser using malware, etc.
Note: This is vulnerable only with authenticated session.

XSS Exploit code(s):
====================
<script>alert(document.cookie)</script>

Affected Component:
====================
Parameters Name: Customerid, formName, FrameId, MODE

Proof-of-Concept:
====================
1. Login into the site.
2. Goto Core and Portal Modules Section.
3. Put <script>alert("document.cookie")</script> in vulnerable parameters i.e. Customerid, formName, FrameId, MODE.
4. Hit enter you will get the "cookie value" pop up.


Figure: Reflected XSS

Disclosure Timeline:
=====================
Vendor Notification: 17 June 2018
Mitre Notification: 3 August 2018
Public Disclosure: 31 March 2019

Attack Type:
=====================
Remote

Impact Code execution:
=====================
True

Impact Information Disclosure:
=====================
True

Description:
=====================================================
Request Method(s): [+] Get
Vulnerable Product: [+] Polaris’ Intellect Core Banking, Core and Portal Modules
Vulnerable Parameter(s): [+] Customerid, formName, FrameId, MODE

Reference:
=====================
https://www.owasp.org/index.php/Top_10-2017_A7-Cross-Site_Scripting_(XSS)

[+] Disclaimer
=====================================================
The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. All content (c).

Comments

Popular posts from this blog

Cross-Site Request Forgery- Smartvista SVFE-2 Module [CVE-2018-15206]

Stored XSS Vulnerability in Hot Scripts Clone:Script Classified Version 3.1-[CVE-2018-7650]

Session Fixation- Smart Vista SVFE-2 Module [CVE-2018-15208]