facebook facebook twitter rss

bank mellat payment manager Xss Vulnerability

Author: indoushka , Published: 25-10-2014
bank mellat payment manager Xss Vulnerability
=============================================
Author : indoushka
Vondor : https://github.com/thedigicraft/atomCMS/
==========================
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the user context allowing the attacker to access any cookies or session tokens retained by the browser.
Affected items
/bank/
/bank/default.php
/bank/index.php
The impact of this vulnerability
Malicious users may inject JavaScript, VBScript, ActiveX, HTML or Flash into a vulnerable application to fool a user in order to gather data from them. An attacker can steal the session cookie and take over the account, impersonating the user. It is also possible to modify the content of the page presented to the user.

How to fix this vulnerability
Your script should filter metacharacters from user input.
Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the user context allowing the attacker to access any cookies or session tokens retained by the browser.
This vulnerability affects /bank/.
Discovered by: Scripting (XSS.script).
Attack details
URL encoded POST input PayAdditionalData was set to 01/01/1967" onmouseover=prompt(940051) bad="
The input is reflected inside a tag parameter between double quotes.

URL encoded POST input PayAmount was set to 1" onmouseover=prompt(911818) bad="
The input is reflected inside a tag parameter between double quotes.

URL encoded POST input pay_from was set to 1" onmouseover=prompt(965239) bad="
The input is reflected inside a tag parameter between double quotes.

URL encoded POST input pay_from1 was set to 1" onmouseover=prompt(951829) bad="
The input is reflected inside a tag parameter between double quotes.

Like us on Facebook :