Home page logo

fulldisclosure logo Full Disclosure mailing list archives

Craft Silicon Banking () Home SQL Injection
From: Francesco Bianchino <f.bianchino () gmail com>
Date: Tue, 10 Feb 2009 20:54:56 +0100

Craft Silicon Banking () Home SQL Injection


Author: Francesco Bianchino

Email: f.bianchino [at] gmail.com

Title: Craft Silicon Banking () Home SQL Injection

Product: Banking () Home - Net Banking

Versions Vulnerable: 2.1 and below

Vendor: Craft Silicon (www.craftsilicon.com)



Banking () Home is an home banking application that allows customers to access
their account information using the web.
The application uses data in a database management system that uses Structured
Query Language (SQL) as a data access standard.


Vulnerability Details

The login page of Net Banking is vulnerable to SQL Injection attack,
due to a missing input validation mechanisms.
An attacker can inject SQL code into the username and password fields,
altering the login procedure.
There is a classic error based injection, really easy to exploit to
take control
of the entire server.
Authentication bypass is possible using valid username, no password is
or otherwise the user table can be arbitrary modified.






At the moment of writing this advisory there is no solution yet.
I advised Craft Silicon in November 2008 and i actually have received no answer.



Discovered by Francesco Bianchino.

Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  By Date           By Thread  

Current thread:
  • Craft Silicon Banking () Home SQL Injection Francesco Bianchino (Feb 10)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]