what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

StarMoney Banking Software 8.0 Input Validation

StarMoney Banking Software 8.0 Input Validation
Posted Oct 1, 2011
Authored by Vulnerability Laboratory | Site vulnerability-lab.com

StarMoney Banking Software version 8.0 suffers from multiple input validation vulnerabilities that can lead to session hijacking, javascript insertion, and more.

tags | advisory, javascript, vulnerability
SHA-256 | 5945bbbf9c35fac8eeb33e8bbf0d1cbedb2ab8c71ca44e5a6dd772e1513c460c

StarMoney Banking Software 8.0 Input Validation

Change Mirror Download
Title:
======
StarMoney Banking Software v8.0 - Multiple Vulnerabilities


Date:
=====
2011-08-31


References:
===========
Download: https://www.vulnerability-lab.com/resources/videos/258.wmv
View: https://www.youtube.com/watch?v=Bymh3ct1v4g


VL-ID:
=====
77


Introduction:
=============
Über eine Million zufriedene Privatkunden sowie alle großen Banken und Sparkassen vertrauen auf StarMoney,
um die eigenen Finanzen zu managen. Dazu bescheinigt das TÜV-Prüfsiegel StarMoney höchste Sicherheit beim
Online-Banking. Mit StarMoney 8.0 verwalten Sie Ihre Finanzen komfortabel in nur einem Programm, egal bei
welcher Bank oder Sparkasse Sie Ihre Konten haben.

Alle großen Banken und Sparkassen sowie unabhängige Experten empfehlen StarMoney aus gutem Grund: StarMoney
bietet ein großes Sicherheitsplus beim Online-Banking. Das Sicherheitskonzept von StarMoney 7.0 wurde mit
der innovativen Promon-Technologie maßgeblich erweitert und bietet damit erstmals nicht nur Schutz vor Missbrauch,
Phishing und Co., sondern StarMoney 8.0 ist auch vor Trojanerangriffen geschützt. Diese neuartige Technologie ist
zum europäischen Patent angemeldet. StarMoney 8.0 kommuniziert über direkte, sichere Schnittstellen mit Ihrer
Bank oder Sparkasse und sorgt somit für einen sicheren und verschlüsselten Datentransfer. StarMoney 8.0 ist mit
dem TÜV-Prüfsiegel „Geprüfte Software“ ausgezeichnet.

(Copy of the Vendor Homepage: https://www.starmoney.de)


Abstract:
=========
Vulnerability-Lab Team discovered multiple vulnerabilities on the StarMoney Online Banking software of the star-finance group.


Report-Timeline:
================
2011-05-09: Vendor Notification
2011-00-00: Vendor Response/Feedback
2011-00-00: Vendor Fix/Patch
2011-06-17: Public or Non-Public Disclosure


Status:
========
Published


Affected Products:
==================
Star Finance Group
Product: StarMoney v8.0 - 5.0 -7.0


Exploitation-Technique:
=======================
Remote


Severity:
=========
High


Details:
========
1.1
Multiple persistent input validation vulnerabilities are detected on the famous Starmoney Banking software v8.0.
Attackers can implement/include malicious persistent script codes (JavaScript|JS) on the index-listing of the main module.
The bug is located on the Kontoname input field. Successfully exploitation can result in software
content manipulation, db manipulation, password or pin logging/phishing, session hijacking & download/execute of malicious content.

Vulnerable Module(s):
[+] Kontoname, Institut & Name

Affected Function:
[+] Listing - Main|Index

Pictures:
../ive1.png (version 7)
../ive2.png (version 7)
../ive3.png (version 7)
../ive4.png (version 7)
../ive5.png (version 7)
../ive6.png (version 7)

../ive1.png (version 8)
../ive2.png (version 8)
../ive3.png (version 8)
../ive4.png (version 8)


1.2
After the implementation of not authorized content like input boxes or frames the index can not load
the content via request(remote) & the result is a stable crash of the sfmuidetailadmin.dll!
The crash is later stable included and happens on every update request by the software user.

Vulnerable Module(s):
[+] Update (sfmuidetailadmin.dll)

Analyses:
../Critical_StarMoney.exe_54555bdf0f86d7cfde4ad67f8ed7a1749198d_23e60e88
../Critical_StarMoney.exe_9836256bcd536b8362ef1fde38b7fac57f2c8_3b3ea11d

Pictures:
../dos1.png (version 7)

../dos1.png (version 8)
../dos2.png (version 8)
../dos3.png (version 8)


Proof of Concept:
=================
The vulnerabilities can be exploited by local or remote -attackers with inter action. For demonstration or reproduce ...

1.1
Key-Pass:
bug23

PoC:
../Rem0ve_vulnerability-lab_com.sdy


1.2

--- Exception Logs ---
Problemsignatur
Problemereignisame: APPCRASH
Anwendungsname: StarMoney.exe
Anwendungsversion: 1.0.0.0
Anwendungszeitstempel: 4aba391b
Fehlermodulname: sfmuidetailadmin.dll
Fehlermodulversion: 1.0.0.0
Fehlermodulzeitstempel: 4aa9fd75
Ausnahmecode: c0000005
Ausnahmeoffset: 00003525
Betriebsystemversion: 6.0.6002.2.2.0.768.3
Gebietsschema-ID: 1031
Zusatzinformation 1: 265d
Zusatzinformation 2: 642e14ce0031c0d4f0cf78b289cf97ea
Zusatzinformation 3: 133d
Zusatzinformation 4: bf822a619d35ef8fce65763007ac4b9d
Bucket-ID: 1542794648

Problemsignatur
Problemereignisame: AppHangB1
Anwendungsname: StarMoney.exe
Anwendungsversion: 1.0.0.0
Anwendungszeitstempel: 4aba391b
Absturzsignatur: 477c
Absturztyp: 6144
Betriebsystemversion: 6.0.6002.2.2.0.768.3
Gebietsschema-ID: 1031
Zusätzliche Absturzsignatur 1: aa92ca98f30e0fa638013a20a53e7cc1
Zusätzliche Absturzsignatur 2: 0efd
Zusätzliche Absturzsignatur 3: c5c7f141d8f7436972884a581ebe878b
Zusätzliche Absturzsignatur 4: 477c
Zusätzliche Absturzsignatur 5: aa92ca98f30e0fa638013a20a53e7cc1
Zusätzliche Absturzsignatur 6: 0efd
Zusätzliche Absturzsignatur 7: c5c7f141d8f7436972884a581ebe878b
Bucket-ID: 742154907


Risk:
=====
The security risk of the persistent vulnerabilities are estimated as high.
The security risk of the denial of service vulnerability is estimated as medium(-) because it occurs on updates.



Credits:
========
Vulnerability Research Laboratory - Benjamin Kunz Mejri (Rem0ve)


Disclaimer:
===========
The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties,
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business
profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some
states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation
may not apply. Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability-
Lab. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of
other media, are reserved by Vulnerability-Lab or its suppliers.

Copyright © 2011|Vulnerability-Lab




--
Website: www.vulnerability-lab.com ; vuln-lab.com or vuln-db.com
Contact: admin@vulnerability-lab.com or support@vulnerability-lab.com
Phone: 01776757259

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close