lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <009801d27c0c$d6ab0670$0100a8c0@pc>
Date: Tue, 31 Jan 2017 23:55:21 +0200
From: "MustLive" <mustlive@...security.com.ua>
To: <submissions@...ketstormsecurity.org>,
	<fulldisclosure@...lists.org>
Subject: [FD] Cross-Site Scripting vulnerability in Bitrix Site Manager

Hello list!

There is Cross-Site Scripting vulnerability in Bitrix Site Manager.

-------------------------
Affected products:
-------------------------

Vulnerable was the last version of Bitrix Site Manager at 12.06.2015, when I 
found this vulnerability on web site of Russian terrorists. At that time I 
wrote at Facebook about hack by Ukrainian Cyber Forces of that site 
http://on.fb.me/1H05ccm and published results of our work with it.

You can read about work of Ukrainian Cyber Forces 
(http://lists.webappsec.org/pipermail/websecurity_lists.webappsec.org/2017-January/010833.html).

----------
Details:
----------

Cross-Site Scripting (WASC-08):

This is persistent XSS in field "text" in contact form (captcha protected):

<img src="http://1" on onerror="$(’p').text(’Hacked’)" />

At 31.12.2016 I disclosed it at my site (http://websecurity.com.ua/7826/).

Best wishes & regards,
MustLive
Administrator of Websecurity web site
http://websecurity.com.ua 


_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ