Reflected XSS Vulnerability in Polaris’ Intellect Core Banking Software Version 9.7.1 [CVE-2018-14875]
[+] Credits: Neeraj
Kumar, Hai Dang Long
[+] Email: neeraj.iiita2009@gmail.com
Vendor:
====================
Product:
===================
Polaris’ Intellect Core Banking, Core and Portal
Module
Version:
===================
Affected Version: 9.7.1
Vulnerability Type:
==========================
Cross site scripting - Reflected XSS
CVE Reference:
==============
CVE-2018-14875
Vulnerability Details:
======================
Polaris’
Intellect Core Banking Software, the Core and Portal Modules are vulnerable to reflected
XSS vulnerability within Customerid, formName, FrameId, MODE Parameters. Application
does not sanitize user-supplied inputs and renders injected JavaScript code to
the user's browser. Attackers use this vulnerability to inject malicious JavaScript
code such as hijack user sessions, malicious redirect, deface web sites, insert
hostile content, redirect users, hijack the user’s browser using malware, etc.
Note: This is vulnerable only with
authenticated session.
XSS Exploit code(s):
====================
<script>alert(document.cookie)</script>
Affected Component:
====================
Parameters Name: Customerid, formName,
FrameId, MODE
Proof-of-Concept:
====================
1. Login into the site.
2. Goto Core and Portal Modules Section.
3. Put
<script>alert("document.cookie")</script> in vulnerable
parameters i.e. Customerid, formName, FrameId, MODE.
4. Hit enter you will get the "cookie
value" pop up.
Figure: Reflected XSS
Disclosure Timeline:
=====================
Vendor Notification: 17 June 2018
Mitre Notification: 3 August 2018
Public Disclosure: 31 March 2019
Attack Type:
=====================
Remote
Impact Code execution:
=====================
True
Impact Information Disclosure:
=====================
True
Description:
=====================================================
Request Method(s): [+] Get
Vulnerable Product: [+] Polaris’ Intellect
Core Banking, Core and Portal Modules
Vulnerable Parameter(s): [+] Customerid, formName,
FrameId, MODE
Reference:
=====================
https://www.owasp.org/index.php/Top_10-2017_A7-Cross-Site_Scripting_(XSS)
=====================================================
The information contained within this advisory
is supplied "as-is" with no warranties or guarantees of fitness of
use or otherwise. Permission is hereby granted for the redistribution of this
advisory, provided that it is not altered except by reformatting it, and that
due credit is given. Permission is explicitly given for insertion in
vulnerability databases and similar, provided that due credit is given to the
author. The author is not responsible for any misuse of the information
contained herein and accepts no responsibility for any damage caused by the use
or misuse of this information. The author prohibits any malicious use of
security related information or exploits by the author or elsewhere. All
content (c).
Comments
Post a Comment