A vulnerability classified as problematic was found in Bitrix Site Manager 12.06.2015. Affected by this vulnerability is an unknown functionality of the component Contact Form. The manipulation of the argument text with the input <img src="http://1"; on onerror="$(’p').text(’Hacked’)" /> leads to basic cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2017/Feb/3 | Exploit Mailing List Third Party Advisory |
https://vuldb.com/?id.96643 | Third Party Advisory |
http://seclists.org/fulldisclosure/2017/Feb/3 | Exploit Mailing List Third Party Advisory |
https://vuldb.com/?id.96643 | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:22
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 3.5
v3 : 3.5 |
References | () http://seclists.org/fulldisclosure/2017/Feb/3 - Exploit, Mailing List, Third Party Advisory | |
References | () https://vuldb.com/?id.96643 - Third Party Advisory |
Information
Published : 2022-06-30 05:15
Updated : 2024-11-21 03:22
NVD link : CVE-2017-20122
Mitre link : CVE-2017-20122
CVE.ORG link : CVE-2017-20122
JSON object : View
Products Affected
bitrix24
- bitrix_site_manager