CVE-2023-1720

Lack of mime type response header in Bitrix24 22.0.300 allows authenticated remote attackers to execute arbitrary JavaScript code in the victim's browser, and possibly execute arbitrary PHP code on the server if the victim has administrator privilege, via uploading a crafted HTML file through /desktop_app/file.ajax.php?action=uploadfile.
References
Link Resource
https://starlabs.sg/advisories/23/23-1720/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:bitrix24:bitrix24:22.0.300:*:*:*:*:*:*:*

History

09 Nov 2023, 21:12

Type Values Removed Values Added
CWE CWE-434
CPE cpe:2.3:a:bitrix24:bitrix24:22.0.300:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.0
References (MISC) https://starlabs.sg/advisories/23/23-1720/ - (MISC) https://starlabs.sg/advisories/23/23-1720/ - Exploit, Third Party Advisory
First Time Bitrix24 bitrix24
Bitrix24

01 Nov 2023, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-01 10:15

Updated : 2023-12-10 15:14


NVD link : CVE-2023-1720

Mitre link : CVE-2023-1720

CVE.ORG link : CVE-2023-1720


JSON object : View

Products Affected

bitrix24

  • bitrix24
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type