#VU6145 Stored cross-site scripting in Bitrix Site Manager


Published: 2017-03-21

Vulnerability identifier: #VU6145

Vulnerability risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: N/A

CWE-ID: CWE-79

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Bitrix Site Manager
Web applications / CMS

Vendor: Bitrix

Description

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in "/bitrix/admin/adv_banner_edit.php" script when processing "NOT_SHOW_PAGE" and "SHOW_PAGE" HTTP POST parameters. A remote attacker with access to "Advertising and banners" module can create or edit a banner and permanently store HTML and JavaScript code in database. The code will be executed in another user's browser in context of vulnerable website the the affected contract is viewed.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.

Mitigation
Update "Advertising and banners" module to the latest version 17.0.0.

Vulnerable software versions

Bitrix Site Manager: 16.0 - 16.5


External links
http://www.1c-bitrix.ru/products/cms/versions.php?module=advertising


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability