#VU6146 Directory traversal in Bitrix Site Manager


Published: 2017-03-21

Vulnerability identifier: #VU6146

Vulnerability risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: N/A

CWE-ID: CWE-22

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Bitrix Site Manager
Web applications / CMS

Vendor: Bitrix

Description
The vulnerability allows a remote attacker to overwrite arbitrary files on vulnerable system.

The vulnerability exists in "makeFileArrayFromArray()" function in "/bitrix/modules/advertising/classes/general/advertising.php" when processing file uploads. A remote authenticated attacker with access to "Advertising and banners" module can upload arbitrary file on the target system with specially crafted filename, containing directory traversal sequences (e.g. ../) and overwrite certain files on vulnerable system outside the web root directory.


Mitigation
Update "Advertising and banners" module to the latest version 17.0.0.

Vulnerable software versions

Bitrix Site Manager: 16.0 - 16.5


External links
http://www.1c-bitrix.ru/products/cms/versions.php?module=advertising


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability