============================================================================================== UNICREDITBANK Cross Site Scripting (& Dom Based) / File Upload / form without CSRF protection = ============================================================================================== TIME-LINE VULNERABILITY Multiples Advisories but Vendor not response Not Fixed Full Disclosure I. VULNERABILITY ------------------------- #Title: UNICREDITBANK Cross Site Scripting (& Dom Based) / File Upload / Form without CSRF protection #Vendor:http://www.unicreditbank.ru/ #Author:Juan Carlos García (@secnight) #Follow me http://www.highsec.es HTTP://hackingmadrid.blogspot.com Twitter:@secnight II. DESCRIPTION ------------------------- niCredit Bank is a Russian bank, operating in Russia since 1989. Ranked 8th by total assets based on H1 2013 results (Interfax-100 ranking), UniCredit Bank is the largest foreign bank in Russia. UniCredit Bank is fully owned (100%) by UniCredit Bank Austria AG, Vienna, Austria, member of UniCredit. The Bank benefits from its strong position in the large Russian corporate finance market and sustainable retail banking business. UniCredit Bank at a glance It was founded under the name of International Moscow Bank in 1989 105 branches in Russia and 1 Representative office in Belarus Around 3798 employee More than 1 298 000 retail customers * More than 28 250 corporate clients Ratings: BBB (Fitch), ВВВ (Standard & Poor’s) Total assets: RUR 776.73 billion * Equity: RUR 121.27 billion * UniCredit Bank has General Licence for banking operations №1 of Bank of Russia * As of 30.06.2013, according to consolidated financial statements of ZAO UniCredit Bank prepared in accordance with International Financial Reporting Standards. III. PROOF OF CONCEPT ------------------------- Cross site scripting ********************* Vulnerability description ___________________________ This script is possibly vulnerable to Cross Site Scripting (XSS) attacks. Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form of Javascript) to another user. Because a browser cannot know if the script should be trusted or not, it will execute the script in the user context allowing the attacker to access any cookies or session tokens retained by the browser. This vulnerability affects /rus/about/community/unicolours/frame.wbp. (46) Attack details ************** URL encoded GET input galleryId was set to 2_901827'():;955734 The input is reflected inside