CVE-2023-1720

Lack of mime type response header in Bitrix24 22.0.300 allows authenticated remote attackers to execute arbitrary JavaScript code in the victim's browser, and possibly execute arbitrary PHP code on the server if the victim has administrator privilege, via uploading a crafted HTML file through /desktop_app/file.ajax.php?action=uploadfile.
References
Link Resource
https://starlabs.sg/advisories/23/23-1720/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:bitrix24:bitrix24:22.0.300:*:*:*:*:*:*:*

History

09 Nov 2023, 21:12

Type Values Removed Values Added
First Time Bitrix24
Bitrix24 bitrix24
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.0
CWE CWE-434
CPE cpe:2.3:a:bitrix24:bitrix24:22.0.300:*:*:*:*:*:*:*
References (MISC) https://starlabs.sg/advisories/23/23-1720/ - (MISC) https://starlabs.sg/advisories/23/23-1720/ - Exploit, Third Party Advisory

01 Nov 2023, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-01 10:15

Updated : 2023-11-09 21:12


NVD link : CVE-2023-1720

Mitre link : CVE-2023-1720


JSON object : View

Products Affected

bitrix24

  • bitrix24
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type