CVE-2023-33291

7.4 HIGH

📋 TL;DR

This vulnerability in ebankIT 6 allows unauthenticated attackers to generate OTP (One-Time Password) messages to arbitrary email addresses or phone numbers via public endpoints. It affects ebankIT 6 installations with exposed public endpoints, but cannot target registered users' contact information.

💻 Affected Systems

Products:
  • ebankIT Digital Banking Platform
Versions: Version 6
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects public endpoints; internal systems or properly secured deployments may not be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could flood unregistered email addresses/phone numbers with OTP messages, causing denial-of-service through spam, potentially leading to service disruption or reputational damage.

🟠

Likely Case

Spam attacks targeting random email/phone numbers, wasting system resources and potentially triggering rate limiting or alert fatigue.

🟢

If Mitigated

Minimal impact if endpoints are properly secured with authentication or request validation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only HTTP requests to public endpoints; no authentication or special tools needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.ebankit.com/digital-banking-platform

Restart Required: No

Instructions:

Check vendor advisory for updates; implement input validation and authentication on affected endpoints.

🔧 Temporary Workarounds

Restrict Public Endpoint Access

all

Block or restrict access to /public/token/Email/generate and /public/token/SMS/generate endpoints using firewall rules or web application controls.

Implement Rate Limiting

all

Apply rate limiting to OTP generation endpoints to prevent abuse and spam attacks.

🧯 If You Can't Patch

  • Implement network segmentation to isolate ebankIT systems from untrusted networks.
  • Deploy web application firewall (WAF) rules to block malicious requests to OTP endpoints.

🔍 How to Verify

Check if Vulnerable:

Send HTTP POST requests to /public/token/Email/generate and /public/token/SMS/generate with arbitrary email/phone parameters; check if OTP generation succeeds without validation.

Check Version:

Check ebankIT administration interface or documentation for version information.

Verify Fix Applied:

Test endpoints again; requests should fail or require proper authentication/validation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual volume of requests to OTP generation endpoints
  • Requests with non-registered email/phone parameters

Network Indicators:

  • High traffic to /public/token/* endpoints from untrusted sources

SIEM Query:

source_ip NOT IN trusted_networks AND uri_path CONTAINS '/public/token/' AND count > threshold

🔗 References

📤 Share & Export