StarMoney Banking Software version 8.0 suffers from multiple input validation vulnerabilities that can lead to session hijacking, javascript insertion, and more.
5945bbbf9c35fac8eeb33e8bbf0d1cbedb2ab8c71ca44e5a6dd772e1513c460c
Title:
======
StarMoney Banking Software v8.0 - Multiple Vulnerabilities
Date:
=====
2011-08-31
References:
===========
Download: https://www.vulnerability-lab.com/resources/videos/258.wmv
View: https://www.youtube.com/watch?v=Bymh3ct1v4g
VL-ID:
=====
77
Introduction:
=============
Über eine Million zufriedene Privatkunden sowie alle großen Banken und Sparkassen vertrauen auf StarMoney,
um die eigenen Finanzen zu managen. Dazu bescheinigt das TÜV-Prüfsiegel StarMoney höchste Sicherheit beim
Online-Banking. Mit StarMoney 8.0 verwalten Sie Ihre Finanzen komfortabel in nur einem Programm, egal bei
welcher Bank oder Sparkasse Sie Ihre Konten haben.
Alle großen Banken und Sparkassen sowie unabhängige Experten empfehlen StarMoney aus gutem Grund: StarMoney
bietet ein großes Sicherheitsplus beim Online-Banking. Das Sicherheitskonzept von StarMoney 7.0 wurde mit
der innovativen Promon-Technologie maßgeblich erweitert und bietet damit erstmals nicht nur Schutz vor Missbrauch,
Phishing und Co., sondern StarMoney 8.0 ist auch vor Trojanerangriffen geschützt. Diese neuartige Technologie ist
zum europäischen Patent angemeldet. StarMoney 8.0 kommuniziert über direkte, sichere Schnittstellen mit Ihrer
Bank oder Sparkasse und sorgt somit für einen sicheren und verschlüsselten Datentransfer. StarMoney 8.0 ist mit
dem TÜV-Prüfsiegel „Geprüfte Software“ ausgezeichnet.
(Copy of the Vendor Homepage: https://www.starmoney.de)
Abstract:
=========
Vulnerability-Lab Team discovered multiple vulnerabilities on the StarMoney Online Banking software of the star-finance group.
Report-Timeline:
================
2011-05-09: Vendor Notification
2011-00-00: Vendor Response/Feedback
2011-00-00: Vendor Fix/Patch
2011-06-17: Public or Non-Public Disclosure
Status:
========
Published
Affected Products:
==================
Star Finance Group
Product: StarMoney v8.0 - 5.0 -7.0
Exploitation-Technique:
=======================
Remote
Severity:
=========
High
Details:
========
1.1
Multiple persistent input validation vulnerabilities are detected on the famous Starmoney Banking software v8.0.
Attackers can implement/include malicious persistent script codes (JavaScript|JS) on the index-listing of the main module.
The bug is located on the Kontoname input field. Successfully exploitation can result in software
content manipulation, db manipulation, password or pin logging/phishing, session hijacking & download/execute of malicious content.
Vulnerable Module(s):
[+] Kontoname, Institut & Name
Affected Function:
[+] Listing - Main|Index
Pictures:
../ive1.png (version 7)
../ive2.png (version 7)
../ive3.png (version 7)
../ive4.png (version 7)
../ive5.png (version 7)
../ive6.png (version 7)
../ive1.png (version 8)
../ive2.png (version 8)
../ive3.png (version 8)
../ive4.png (version 8)
1.2
After the implementation of not authorized content like input boxes or frames the index can not load
the content via request(remote) & the result is a stable crash of the sfmuidetailadmin.dll!
The crash is later stable included and happens on every update request by the software user.
Vulnerable Module(s):
[+] Update (sfmuidetailadmin.dll)
Analyses:
../Critical_StarMoney.exe_54555bdf0f86d7cfde4ad67f8ed7a1749198d_23e60e88
../Critical_StarMoney.exe_9836256bcd536b8362ef1fde38b7fac57f2c8_3b3ea11d
Pictures:
../dos1.png (version 7)
../dos1.png (version 8)
../dos2.png (version 8)
../dos3.png (version 8)
Proof of Concept:
=================
The vulnerabilities can be exploited by local or remote -attackers with inter action. For demonstration or reproduce ...
1.1
Key-Pass:
bug23
PoC:
../Rem0ve_vulnerability-lab_com.sdy
1.2
--- Exception Logs ---
Problemsignatur
Problemereignisame: APPCRASH
Anwendungsname: StarMoney.exe
Anwendungsversion: 1.0.0.0
Anwendungszeitstempel: 4aba391b
Fehlermodulname: sfmuidetailadmin.dll
Fehlermodulversion: 1.0.0.0
Fehlermodulzeitstempel: 4aa9fd75
Ausnahmecode: c0000005
Ausnahmeoffset: 00003525
Betriebsystemversion: 6.0.6002.2.2.0.768.3
Gebietsschema-ID: 1031
Zusatzinformation 1: 265d
Zusatzinformation 2: 642e14ce0031c0d4f0cf78b289cf97ea
Zusatzinformation 3: 133d
Zusatzinformation 4: bf822a619d35ef8fce65763007ac4b9d
Bucket-ID: 1542794648
Problemsignatur
Problemereignisame: AppHangB1
Anwendungsname: StarMoney.exe
Anwendungsversion: 1.0.0.0
Anwendungszeitstempel: 4aba391b
Absturzsignatur: 477c
Absturztyp: 6144
Betriebsystemversion: 6.0.6002.2.2.0.768.3
Gebietsschema-ID: 1031
Zusätzliche Absturzsignatur 1: aa92ca98f30e0fa638013a20a53e7cc1
Zusätzliche Absturzsignatur 2: 0efd
Zusätzliche Absturzsignatur 3: c5c7f141d8f7436972884a581ebe878b
Zusätzliche Absturzsignatur 4: 477c
Zusätzliche Absturzsignatur 5: aa92ca98f30e0fa638013a20a53e7cc1
Zusätzliche Absturzsignatur 6: 0efd
Zusätzliche Absturzsignatur 7: c5c7f141d8f7436972884a581ebe878b
Bucket-ID: 742154907
Risk:
=====
The security risk of the persistent vulnerabilities are estimated as high.
The security risk of the denial of service vulnerability is estimated as medium(-) because it occurs on updates.
Credits:
========
Vulnerability Research Laboratory - Benjamin Kunz Mejri (Rem0ve)
Disclaimer:
===========
The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties,
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business
profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some
states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation
may not apply. Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability-
Lab. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of
other media, are reserved by Vulnerability-Lab or its suppliers.
Copyright © 2011|Vulnerability-Lab
--
Website: www.vulnerability-lab.com ; vuln-lab.com or vuln-db.com
Contact: admin@vulnerability-lab.com or support@vulnerability-lab.com
Phone: 01776757259