C2IT.com Cross Site Scripting Vulnerability

From: securityat_private
Date: Mon Jan 07 2002 - 08:07:50 PST

  • Next message: bugzillaat_private: "[RHSA-2002:003-10] New mutt packages available to fix security problem"

    
     ('binary' encoding is not supported, stored as-is)
    Summary
      CitiBank's online cash site, C2IT.com, has 
    substantial vulnerabilities
      to Cross Site Scripting.  The site is similar to PayPal 
    in that it 
      lets users attach Bank and Credit Card account to 
    this online system. 
      Users can then "send" cash to any user via their 
    email address.  
    
      The site leaves nearly every form field un-filtered.  
    The site also
      displays credit card numbers, bank account 
    numbers, security codes
      and other data with no obfuscation.  This info is then 
    available to
      javascript through cross site scripting.   Citibank 
    was notified 4
      months ago about problems with their sites and 
    many times since, 
      however, no noticeable actions have been taken 
    yet.  
      
      This alert documents two sample attacks:  
      -Gaining access to user's credit card and bank 
    account numbers
      -Scripting cash transfers out of users accounts 
    and/or credit cards
    
    Details
    
      http://www.devitry.com/c2it-security.html
    
       I'm not posting the javascript examples here as 
    many email servers now reject email with even the 
    hint of javascript in them.  (Hmm, maybe that is a bad 
    thing if someone is not actually getting what may be 
    an important email?)  
    
     -dave 
      devitry.com
    



    This archive was generated by hypermail 2b30 : Mon Jan 07 2002 - 14:22:24 PST