Vulnerability identifier: #VU6145
Vulnerability risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U/U:Clear]
CVE-ID: N/A
CWE-ID:
CWE-79
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Bitrix Site Manager
Web applications /
CMS
Vendor: Bitrix
Description
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in "/bitrix/admin/adv_banner_edit.php" script when processing "NOT_SHOW_PAGE" and "SHOW_PAGE" HTTP POST parameters. A remote attacker with access to "Advertising and banners" module can create or edit a banner and permanently store HTML and JavaScript code in database. The code will be executed in another user's browser in context of vulnerable website the the affected contract is viewed.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
Mitigation
Update "Advertising and banners" module to the latest version 17.0.0.
Vulnerable software versions
Bitrix Site Manager: 16.0 - 16.5
External links
https://www.1c-bitrix.ru/products/cms/versions.php?module=advertising
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.