An issue was discovered in ebankIT before 7. Document Object Model based XSS exists within the /Security/Transactions/Transactions.aspx endpoint. Users can supply their own JavaScript within the ctl100$ctl00MainContent$TransactionMainContent$accControl$hdnAccountsArray POST parameter that will be passed to an eval() function and executed upon pressing the continue button.
References
Link | Resource |
---|---|
https://blog.ebankit.com/blog-press | Product |
https://packetstormsecurity.com/files/172063/ebankIT-6-Cross-Site-Scripting.html | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2023-04-28 19:15
Updated : 2024-02-28 20:13
NVD link : CVE-2023-30454
Mitre link : CVE-2023-30454
CVE.ORG link : CVE-2023-30454
JSON object : View
Products Affected
ebankit
- ebankit
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')