exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

cybersourceBC.txt

cybersourceBC.txt
Posted Jul 23, 2005

CyberSource Business Center suffers from a user privilege escalation vulnerability that allows for theft due to a lack of input validation.

tags | advisory
SHA-256 | 51d1e78d8a660e38cc13a5c2235bfbf089d7aa5d9df48d32efa3fcde701d2014

cybersourceBC.txt

Change Mirror Download
Vendor:  CyberSource
Version: Business Center, Essentials/Small
Business, https://businesscenter.cybersource.com/

Severity: Vulnerability allows malicious employees or comprimised accounts to steal money.

Vendor Status: Notified, but expects to fix issue some time in 2006.

Overview: Business Center is the web application used by merchants to authorize, capture, and refund
Credit Card transactions. This application has the ability for merchants to define user accounts
that are given limited privileges on what operations they can perform on a transaction.

There does not appear to be validation on user-controlled input as found by the two ways to
bypass user privilege restrictions.

Unfortunately it was found that through simple URL manipulation it is possible to bypass these security
restrictions to allow a user to create new transactions and search for and view previous transactions.
The latter would allow an untrusted user to view customer information.

Issuing new Credit transactions and capturing (moving customer money to merchant account) can be done
by creating a local copy of web pages from the site and modifying the HTML <form> submission target and content. A user then
simply has to login, access the locally modified page and submit the form which then blindly sends the transaction to the server.

In theory then an unprivileged account would be able to generate a number of fraudulent transactions onto existing customers
and then move money from the merchant's account after capture to their own credit card or an accomplice's. This includes
forcing through transactions that do not have correct Card Verification Numbers.


Details:
Demo account is free to create and can be done at http://www.cybersource.com/bankofamerica/eval/.
Test server is identical to Production with the exception that the Credit Card Authorizer and capturing does not contact
the card owners banks for verification.

After creating an account with only the AO privilege (allows user to create new Authorizations only) login under this account.

Accessing Order Search or Reports
The first level of *security* uses the security through obscurity method to prevent user from accessing the Order Search by preventing
the URL information from being sent to the user. The menu on the interface does not have the button but fortunately the URL's use
a standard naming convention in the JSP's.
1) Copy the URL from the Virtual Terminal button, this will be https://businesscentertest.cybersource.com/sbctest/landing/terminal.jsp
2) Paste URL into address bar and change terminal.jsp to search.jsp, or similarly to reports.jsp
3) The associated jsp is loaded and usable.


Capturing and Crediting a transaction is not vulnerable to simply URL manipulation but are vulnerable to HTTP Post injections.
When creating a new transaction it is possible to save the web page locally and then modify the source
(sbc_index.jsp_files\home_data\VTSettingsLoad.htm) to prefix the form's target with https://businesscentertest.cybersource.com so that submission
will be sent to the server instead of localhost.

Adding the HTML option <option value="Credit">Credit</option> to the HTML <select name='transactionType'> allows a Credit transaction
to be selectable for creation.

Confirming the transaction causes this crafted POST form to be sent to the server and a confirmation of information is presented to the user
to confirm the transaction.

Recommendation:
Do not use user accounts until next year when vendor has said the problem will be fixed.


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close