Advertisement






ebankIT 6 Denial Of Service

CVE Category Price Severity
CVE-2023-30455 CWE-XXX Not specified Not specified
Author Risk Exploitation Type Date
Not specified Not specified Not specified 2023-05-03
CPE
cpe:cpe:/a:ebankit:ebankit:6
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H 0.07112 0.64566

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2023050009

Below is a copy:

ebankIT 6 Denial Of Service
CVE-2023-30455

[Description]
An issue was discovered in ebankIT before version 7.
A Denial-of-Service attack is possible through the GET parameter
EStatementsIds located on the
/Controls/Generic/EBMK/Handlers/EStatements/DownloadEStatement.ashx endpoint.
The GET parameter accepts over 100 comma-separated e-statement IDs
without throwing an error. When this many IDs are supplied, the server
takes around 60 seconds to respond and successfully generate the
expected ZIP archive (during this time period, no other pages load). A
threat actor could issue a request to this endpoint with 100+ statement
IDs every 30 seconds, potentially resulting in an overload of the
server for all users.

------------------------------------------

[VulnerabilityType Other]
Denial of Service

------------------------------------------

[Vendor of Product]
ebankIT

------------------------------------------

[Affected Product Code Base]
ebankIT - Omnichannel Digital Banking Platform - Version 6, patched in version 7

------------------------------------------

[Affected Component]
The endpoint existing at /Controls/Generic/EBMK/Handlers/EStatements/DownloadEStatement.ashx?EStatementsIds=*id*,*id*,*id*,etc

------------------------------------------

[Attack Type]
Remote

------------------------------------------

[Impact Denial of Service]
true

------------------------------------------

[Attack Vectors]
I discovered it was possible to perform a Denial-of-Service attack on
the ebankIT platform, potentially resulting in a single user rendering
the entire application inaccessible. The vulnerable endpoint exists on
/Controls/Generic/EBMK/Handlers/EStatements/DownloadEStatement.ashx
and the EStatementsIds GET parameter accepts over 100
comma-separated e-statement IDs without throwing an error. When this
many IDs are supplied, the server takes around 60 seconds to respond
and successfully generate the expected zip file (during this 60
seconds, no other pages load). A threat actor could issue a request to
this endpoint with 100+ statement ID s every 30 seconds, potentially
resulting in overloading the server for all users of the ebankIT
platform. I believe this is being caused by a thread commitment issue
where there are no dedicated threads to individual processes.

------------------------------------------

[Discoverer]
Jake Murphy

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum