what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

commbankXSS.txt

commbankXSS.txt
Posted Sep 14, 2005
Authored by Calum Power

A cross site scripting flaw exists in the Commonwealth Bank of Australia's web site.

tags | exploit, web, xss
SHA-256 | b6db67aa865d33652f331d20e9c061672ae23bb9614db104ab77db5b687763ac

commbankXSS.txt

Change Mirror Download
-- A quick note before the advisory --
During my conversation(s) with the Commonwealth Bank 'Group IT Security'
department, they have promised to undertake a full audit of the NetBank,
CBA website and other existing pages in an effort to stamp out all
Cross-Site-Scripting (XSS) vulnerabilities in their web applications.

This is a very positive step in the direction of completely securing the
Commonwealth Bank's web applications. Big congratulations go to Stephen
and Chris from the CBA's security team for initiating a quick response, as
well as a concerted effort for the future security of the bank.
-- Advisory follows --

--------------- 05/09/2005 ---------------
-- Fribble Technologies --
-- Security Advisory --
-- FOR IMMEDIATE PUBLIC RELEASE --
---------------TIMELINE-------------------
-- Discovered: 05/09/2005 --
-- Reported: 06/09/2005 --
-- Released: 15/09/2005 --
------------------------------------------
Security Advisory: Cross-Site-Scripting in www.netbank.commbank.com.au may
lead to account compromise

Discovered by: Calum Power [enune@fribble.net]
Versions Affected: All Current
Unaffected versions: None known.

Product Description:
www.commbank.com.au is the Commonwealth Bank of Australia's official website.
The sub-section of the website '/NetBank/' is devoted to information and help
in regards to their online banking service.
Using the service, it is possible to transfer money, check account balances,
review account histories, etc.

Summary:
* Cross-Site Scripting (A.K.A "XSS") could lead to the compromise of user
* accounts via 'phishing' methods.

Details:
The Commonwealth Bank provide a 'search' service for the searching of
help/information with direct relevance to their online banking service
'NetBank'. The script is located at 'NetBank/search.asp' on the webserver
www.commbank.com.au

This script accepts a few variables, the vulnerable one being 'SearchString'
Unfortunately, the ASP script responsible for the searching of pages within
the website fails to sanitise this variable before printing it in the form
element also named 'SearchString'.
This could lead to 'escaping' from the input tag, and printing arbitrary HTML
code to the user. A simple, harmless demonstration is as follows:
http://www.commbank.com.au/NetBank/search.asp?SearchString=%22%3E%3Cimg%20src=%22http://fribble.net/image.jpg%22%3E

Although the above example would not be of any risk to a user, with the use of
URI encoding and advanced HTML inclusion (possibly from a third-party
website), it would be possible to emulate a false website, or even a
legitimate-looking login page.

Further information on the threat of Cross-Site Scripting may be obtained
here:
http://www.securitydocs.com/library/3261

Impact: High
In an environment such as Netbank, ALL user-supplied input variables should be
filtered for malformed content.
Succesfull exploitation of this vulnerability may lead to compromised bank
accounts and/or user data via scamming (or "phishing") attacks on NetBank users.

Credit:
This vulnerability was discovered by Calum Power on the 5th of September 2005.
The vendor has subsequently been notified.

Rights:
Copyright(c) 2005 Fribble Technologies (C. Power)
This advisory may be quoted, transmitted or copied, providing original author
credit is included in the publication.


*** This vulnerability has been disclosed in accordance with the RFP
Full-Disclosure Policy v2.0, available at:
http://www.wiretrip.net/rfp/policy.html

--
Calum Power
Security Enthusiast
Cultural Jammer
Hopeless Cynic
E: enune@fribble.net
W: www.fribble.net

--
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.

Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close