Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-43959 PoC — Bitrix24 信息泄露漏洞

Source
Associated Vulnerability
Title:Bitrix24 信息泄露漏洞 (CVE-2022-43959)
Description:Bitrix24是美国Bitrix公司的一套企业社交平台。该平台包括在线通讯、日历管理和CRM(客户关系管理)等功能。 1C-Bitrix Bitrix24 22.200.200版本及之前版本存在安全漏洞,该漏洞源于AD/LDAP服务器设置中凭据保护不足,允许远程管理员通过阅读/bitrix/admin/ldap_server_edit.php的源代码来发现AD/LDAP管理密码。
Description
Bitrix Vulnerability CVE-2022-43959
Readme
# CVE-2022-43959

Bitrix Vulnerability CVE-2022-43959

## Description

Insufficiently Protected Credentials in the AD/LDAP server settings in 1C-Bitrix Bitrix24 AD/LDAP connector module before version 23.100.0 allow remote administrators to discover an AD/LDAP administrative password by reading the source code of /bitrix/admin/ldap_server_edit.php.

### CVSS

| Level | Score | CVSS | Link |
| ---      | ---       | ---       | ---       |
| Medium | 4.9 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N | [link](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N&version=3.1) |

## Steps to reproduce:
1. Get access to the Bitrix24 administrative panel.
2. Go to the AD/LDAP settings item in the Administration section.
3. Enter the AD/LDAP server settings from the list of servers.
4. Go to the Server tab.
5. Make sure that the password of the user with read access rights to the AD/LDAP server tree is masked in the “Password” line.

<img src="/password-view.png">

6. Use the browser developer tools to view the source code of the bitrix/admin/ldap_server_edit.php page.
7. Make sure that the password of the user with read access rights to the AD/LDAP server tree is displayed in clear text in the source code.

<img src="/password.png">

## Reference
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43959

https://www.bitrix24.com/prices/self-hosted.php

https://www.bitrix24.com/security/

https://www.bitrix24.com/features/box/box-versions.php?module=ldap

## Authors

Sergey Avdeev, Dmitry Lymbin ([@lymbin](https://github.com/lymbin)) at Secware
File Snapshot

[4.0K] /data/pocs/8ed2a100eb5bace03826623438dbc7bfad8862d0 ├── [751K] password.png ├── [ 61K] password-view.png └── [1.6K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.