AOH :: HP Unsorted C :: BX1665.HTM

Sungard Banner CSRF/XSS



CSRF/XSS in Sungard Banner
CSRF/XSS in Sungard Banner



http://ch4n.org/banner.txt 

Application:            Banner -- Student Services
Version:                7.3
Bug:                    Cross-site Request Forgery, cross site scripting
Exploitation:           Remote, versus authenticated users
Discovery Date:         August 21, 2007
Notification Date:      August 22, 2007
Disclosure Date:        January 29, 2008

Author:         Brendan M. Hickey
Website: http://www.bhickey.net 
http://www.ch4n.org 

INTRODUCTION

"Banner is the world's most widely used collegiate administrative suite of
student, financial aid, finance, human resources, and advancement systems."
 -- Sungard.com

"Banner Student fuses administrative and academic functions that make it
easy to manage data while giving prospects, learners (both traditional and
non-traditional), and faculty secure, 24x7, online access to the
information they need. Prospects can apply for admissions. Learners can
search and register for classes by term or date, and retrieve financial
aid data. Faculty can easily manage course information, rosters, and
grading, and advise students."

-- Banner Student product information
(http://www.sungardhe.com/Products/Product.aspx?id=1024) 

University students interact with 'Banner Student Services' through a web
interface. Tasks are performed by making POST requests to fixed URLs.
A cross-site script attack facilitated by cross-site request forgery was
discovered in the "Emergency Contacts" section of the service.

BUG

A student may update her emergency contacts through a web form. Each form
field is checked for length, the longest accepting 30 characters, but not
content.
An attacker can inject arbitrary javascript code into an user's session by
luring authenticated Banner users to a website that makes a POST request
to the update contacts script.

The script necessary to update the emergency contacts is located at:
http://BANNERDOMAIN/ss/bwgkoemr.P_UpdateEmrgContacts 

Setting the address field (add1) to




The entire AOH site is optimized to look best in Firefox® 3 on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH
We do not send spam. If you have received spam bearing an artofhacking.com email address, please forward it with full headers to abuse@artofhacking.com.