Vulnerability Note VU#112412
Bizagi BPM Suite contains multiple vulnerabilities
Bizagi BPM Suite contains a reflected cross-site scripting vulnerability and a SQL injection vulnerability.
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') - CVE-2014-2947
According to Open-Sec consultant Mauricio Urizar, all versions of Bizagi BPM Suite contain a reflected cross-site scripting (XSS) vulnerability. The application fails to sanitize the txtUsername POST parameter to the Login.aspx page.
Bizagi has stated that the cross-site scripting vulnerability (CVE-2014-2947) was fixed in version 10.3. To remediate the SQL injection vulnerability, a hotfix is available for 64-bit installations of the 10.3 official release. A separate hotfix is available for 64-bit installations of the 10.4 official and latest release. Bizagi has provided the following patching instructions:
1. Ensure that you have temporarily stopped your project service (at the IIS), and that your project is using a 64-bit installation.
2. Replace the "BizAgi.WFES.dll" file found inside the zipped folder of the fix, so that you paste this assembly into the bin folder of your Bizagi Work portal.
(By default, the bin is located as "C:\BizAgi\Enterprise\Projects\[your_Project]\WebApplication\bin\"). This will replace an older file having the same name.
3. Proceed to re-start your project service (at the IIS).
In addition, Bizagi advises users to consult the "Security setup recommendations" documentation in the meantime. Users who are unable to patch should consider the following workaround:
Vendor Information (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Bizagi||Affected||11 Apr 2014||22 May 2014|
CVSS Metrics (Learn More)
Thanks to Mauricio Urizar for reporting this vulnerability.
This document was written by Todd Lewellen.
- CVE IDs: CVE-2014-2947 CVE-2014-2948
- Date Public: 22 May 2014
- Date First Published: 22 May 2014
- Date Last Updated: 22 May 2014
- Document Revision: 14
If you have feedback, comments, or additional information about this vulnerability, please send us email.