CVE-2015-6540
CVSS4.3
发布时间 :2017-06-07 16:29:00
修订时间 :2017-06-14 21:22:12
NMP    

[原文]Cross-site scripting (XSS) vulnerability in Intellect Design Arena Intellect Core banking software.


[CNNVD]CNNVD数据暂缺。


[机译]帮助我们改进 Google 翻译

- CVSS (基础分值)

CVSS分值: 4.3 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: MEDIUM [漏洞利用存在一定的访问条件]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-79 [在Web页面生成时对输入的转义处理不恰当(跨站脚本)]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6540
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-6540
(官方数据源) NVD

- 其它链接及资源

http://packetstormsecurity.com/files/134767/Intellect-Core-Cross-Site-Scripting.html
(VENDOR_ADVISORY)  MISC  http://packetstormsecurity.com/files/134767/Intellect-Core-Cross-Site-Scripting.html
http://www.securityfocus.com/archive/1/archive/1/537068/100/0/threaded
(VENDOR_ADVISORY)  BUGTRAQ  20151209 XSS vulnerability in Intellect Core banking software - Polaris

- 漏洞信息 (F134767)

Intellect Core Cross Site Scripting (PacketStormID:F134767)
2015-12-11 00:00:00
Mayank Sahu  
exploit,xss
CVE-2015-6540
[点击下载]

Intellect Core banking software suffers from a cross site scripting vulnerability.

[+] Credits: Mayank Sahu
[+] Email: msahu@controlcase.com


Vendor:
====================
Intellect Design Arena (Polaris)

Product:
===================
Intellect Core banking software (Armar module)

Vulnerability Type:
==========================
Cross site scripting - XSS

CVE Reference:
==============
CVE-2015-6540

Vulnerability Details:
======================
Application allows arbitrary client side JS code execution on victims who click our infected link. Session ID and data theft may follow as well as possibility to
bypass CSRF protections, injection of iframes to establish communication channels etc.
The vulnerability exist after login into application.

XSS Exploit code(s):
===================

http://Server-address:7001/AAL/LoginAfter.jsp?page=Logout.jsp%27|[window[%27location%27]%3D%27\x6a\x61\x76\x61\x73\x63\x72\x69\x70\x74\x3a\x61\x6c\x65\x72\x74\x28\x27\x43\x43\x27\x29%27]%2B%27


Disclosure Timeline:
=====================
Vendor Notification: September 21, 2015 
December 09, 2015  : Public Disclosure


Exploitation Technique:
=======================
Remote

Severity Level:
================
High


Description:
=====================================================
Request Method(s):              [+] GET
Vulnerable Product:             [+] Intellect Core banking solution (Armor)
Vulnerable Parameter(s):        [+] page

[+] Disclaimer
Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author.
The author is not responsible for any misuse of the information contained herein and prohibits any malicious use of all security related information or exploits by the author or elsewhere.

by Mayank Sahu
    
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站