#VU27476 Input validation error in Bitrix Site Manager
Published: May 1, 2020 / Updated: May 13, 2020
Bitrix Site Manager
Bitrix
Description
The vulnerability allows a remote attacker to bypass web application firewall.
The vulnerability exists due to insufficient validation of user-supplied input when processing NULL byte character within the Proactive Protection module version 19.0.0 and below in Bitrix Site Manager. A remote attacker can pass specially crafted input to the application that contains a NULL byte (%00) and bypass Web Application Firewall rules.
Vulnerable code:
require($_SERVER["DOCUMENT_ROOT"]."/bitrix/header.php"); $s = $_GET["test"]; ?>Not loaded
PoC Request:
http://[host]/?test=tetsBYPASS%00")});alert(1);$(document).ready(function (){%2f%2f
Remediation
Install update from vendor's website.
Update Proactive Protection module to version 20.0.0.