Reflected Cross-Site Scripting found in the “loginmessage” parameter.
Issue date: 27-10-2020Affects versions: 14.2, 13.4, 12.6
Security Issue ID
SECURITY-173
Affected Product Version(s)
14.2.2, 13.4.3, 12.6.10 (and previous patch releases)
Severity
high
Description
Bloomreach Experience Manager contained multiple Cross-Site Request Forgery (CSRF) vulnerabilities as the CSRF protection could have been bypassed by changing the HTTP method. HTTP can handle multiple request methods. In the web application it was assumed that forms would be submitted by the POST method and there the origin header would be checked to protect against CSRF. However, forms requests were also accepted using the GET method with query string parameters in the URL. In this case, the origin header was not checked. This allowed a malicious user to create a page with, for example, images with a source set to the form URL with predefined parameters. A logged in user could be tricked to visit this malicious page, leading to unintended actions in the web application, such as creating a new user.
Instructions
Customers are recommended to upgrade to the latest maintenance or minor releases as indicated above. This can be done by simply incrementing the version number of the parent POM for the implementation project.
Credit for discovering this issue
Thomas van Ruitenbeek