CVE-2023-1720

Lack of mime type response header in Bitrix24 22.0.300 allows authenticated remote attackers to execute arbitrary JavaScript code in the victim's browser, and possibly execute arbitrary PHP code on the server if the victim has administrator privilege, via uploading a crafted HTML file through /desktop_app/file.ajax.php?action=uploadfile.
References
Link Resource
https://starlabs.sg/advisories/23/23-1720/ Exploit Third Party Advisory
https://starlabs.sg/advisories/23/23-1720/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:bitrix24:bitrix24:22.0.300:*:*:*:*:*:*:*

History

21 Nov 2024, 07:39

Type Values Removed Values Added
References () https://starlabs.sg/advisories/23/23-1720/ - Exploit, Third Party Advisory () https://starlabs.sg/advisories/23/23-1720/ - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : 8.0
v2 : unknown
v3 : 9.6

09 Nov 2023, 21:12

Type Values Removed Values Added
First Time Bitrix24 bitrix24
Bitrix24
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.0
References (MISC) https://starlabs.sg/advisories/23/23-1720/ - (MISC) https://starlabs.sg/advisories/23/23-1720/ - Exploit, Third Party Advisory
CPE cpe:2.3:a:bitrix24:bitrix24:22.0.300:*:*:*:*:*:*:*
CWE CWE-434

01 Nov 2023, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-01 10:15

Updated : 2024-11-21 07:39


NVD link : CVE-2023-1720

Mitre link : CVE-2023-1720

CVE.ORG link : CVE-2023-1720


JSON object : View

Products Affected

bitrix24

  • bitrix24
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type