Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title Bizagi BPM Suite contains multiple vulnerabilities
Informations
Name VU#112412 First vendor Publication 2014-05-22
Vendor VU-CERT Last vendor Modification 2014-05-22
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:S/C:P/I:P/A:P)
Cvss Base Score 6.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 8 Authentication Requires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#112412

Bizagi BPM Suite contains multiple vulnerabilities

Original Release date: 22 May 2014 | Last revised: 22 May 2014

Overview

Bizagi BPM Suite contains a reflected cross-site scripting vulnerability and a SQL injection vulnerability.

Description

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') - CVE-2014-2947

According to Open-Sec consultant Mauricio Urizar, all versions of Bizagi BPM Suite contain a reflected cross-site scripting (XSS) vulnerability. The application fails to sanitize the txtUsername POST parameter to the Login.aspx page.

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') - CVE-2014-2948
Furthermore, Urizar reports that all versions of Bizagi BPM Suite are vulnerable to SQL injection attacks through the workflowenginesoa.asmx web service. By sending specially crafted SOAP requests to the web service, a remote authenticated attacker can execute arbitrary SQL statements.

The CVSS score reflects CVE-2014-2948.

Impact

By exploiting the reflected XSS vulnerability, a remote unauthenticated attacker may be able to execute arbitrary javascript in the context of the victim's browser. By exploiting the SQL injection vulnerability, a remote authenticated attacker may be able to read, modify, or delete data from the database.

Solution

Bizagi has stated that the cross-site scripting vulnerability (CVE-2014-2947) was fixed in version 10.3. To remediate the SQL injection vulnerability, a hotfix is available for 64-bit installations of the 10.3 official release. A separate hotfix is available for 64-bit installations of the 10.4 official and latest release. Bizagi has provided the following patching instructions:


    1. Ensure that you have temporarily stopped your project service (at the IIS), and that your project is using a 64-bit installation.
    2. Replace the "BizAgi.WFES.dll" file found inside the zipped folder of the fix, so that you paste this assembly into the bin folder of your Bizagi Work portal.
    (By default, the bin is located as "C:\BizAgi\Enterprise\Projects\[your_Project]\WebApplication\bin\"). This will replace an older file having the same name.
    3. Proceed to re-start your project service (at the IIS).

In addition, Bizagi advises users to consult the "Security setup recommendations" documentation in the meantime. Users who are unable to patch should consider the following workaround:

Restrict Access

As a general good security practice, only allow connections from trusted hosts and networks.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
BizagiAffected11 Apr 201422 May 2014
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

GroupScoreVector
Base8.5AV:N/AC:M/Au:S/C:C/I:C/A:C
Temporal7.3E:POC/RL:W/RC:C
Environmental1.9CDP:L/TD:L/CR:ND/IR:ND/AR:ND

References

  • http://www.bizagi.com/products/bizagi-bpm-suite/overview-bpm-suite
  • http://help.bizagi.com/bpmsuite/en/index.html?setup_security.htm

Credit

Thanks to Mauricio Urizar for reporting this vulnerability.

This document was written by Todd Lewellen.

Other Information

  • CVE IDs:CVE-2014-2947CVE-2014-2948
  • Date Public:22 May 2014
  • Date First Published:22 May 2014
  • Date Last Updated:22 May 2014
  • Document Revision:14

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/112412

CWE : Common Weakness Enumeration

% Id Name
50 % CWE-89 Improper Sanitization of Special Elements used in an SQL Command ('SQL Injection') (CWE/SANS Top 25)
50 % CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 5

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2014-05-24 00:24:31
  • Multiple Updates
2014-05-23 05:25:37
  • Multiple Updates
2014-05-22 21:21:30
  • First insertion