CVE-2017-20122

A vulnerability classified as problematic was found in Bitrix Site Manager 12.06.2015. Affected by this vulnerability is an unknown functionality of the component Contact Form. The manipulation of the argument text with the input <img src="http://1"; on onerror="$(’p').text(’Hacked’)" /> leads to basic cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
http://seclists.org/fulldisclosure/2017/Feb/3 Exploit Mailing List Third Party Advisory
https://vuldb.com/?id.96643 Third Party Advisory
http://seclists.org/fulldisclosure/2017/Feb/3 Exploit Mailing List Third Party Advisory
https://vuldb.com/?id.96643 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:bitrix24:bitrix_site_manager:12.06.2015:*:*:*:*:*:*:*

History

21 Nov 2024, 03:22

Type Values Removed Values Added
CVSS v2 : 3.5
v3 : 5.4
v2 : 3.5
v3 : 3.5
References () http://seclists.org/fulldisclosure/2017/Feb/3 - Exploit, Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2017/Feb/3 - Exploit, Mailing List, Third Party Advisory
References () https://vuldb.com/?id.96643 - Third Party Advisory () https://vuldb.com/?id.96643 - Third Party Advisory

Information

Published : 2022-06-30 05:15

Updated : 2024-11-21 03:22


NVD link : CVE-2017-20122

Mitre link : CVE-2017-20122

CVE.ORG link : CVE-2017-20122


JSON object : View

Products Affected

bitrix24

  • bitrix_site_manager
CWE
CWE-80

Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)

CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')