CVE-2020-13758
Homebrew vulnerability analysis and mitigation

Overview

The vulnerability (CVE-2020-13758) affects the Web Application Firewall (WAF) in Bitrix24 through version 20.0.950. The vulnerability allows cross-site scripting (XSS) attacks by placing %00 (null byte) before the payload, effectively bypassing the WAF's protection mechanisms (Deteact Blog).

Technical details

The vulnerability exists in the post-filtration module located in modules/security/classes/general.postfilter.php/postfilter.php. The WAF's protection mechanism attempts to find user input in script tag bodies, but it removes null bytes from input parameter values during processing. This creates a mismatch between the actual script content and the filtered parameter values, allowing attackers to bypass the XSS protection by inserting a null byte (%00) before the malicious payload (Deteact Blog).

Impact

The vulnerability allows attackers to execute arbitrary JavaScript code in the context of the victim's browser by bypassing the WAF's XSS protection mechanisms. This could lead to theft of sensitive information, session hijacking, or other client-side attacks (Deteact Blog).

Mitigation and workarounds

The vulnerability can be mitigated by removing the str_replace call from the addVariable function or by applying the same modification to the $body variable in the isDangerBody function. Additionally, organizations should not solely rely on WAF protection and should implement secure development practices and regular penetration testing (Deteact Blog).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management