CVE-2023-1719 Vulnerability Details

  /     /     /  

CVE-2023-1719 Metadata Quick Info

CVE Published: 01/11/2023 | CVE Updated: 05/09/2024 | CVE Year: 2023
Source: STAR_Labs | Vendor: Bitrix24 | Product: Bitrix24
Status : PUBLISHED

CVE-2023-1719 Description

Global variable extraction in bitrix/modules/main/tools.php in Bitrix24 22.0.300 allows unauthenticated remote attackers to (1) enumerate attachments on the server and (2) execute arbitrary JavaScript code in the victim\'s browser, and possibly execute arbitrary PHP code on the server if the victim has administrator privilege, via overwriting uninitialised variables.

Metrics

CVSS Version: 3.1 | Base Score: 7.5 HIGH
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

l➤ Exploitability Metrics:
    Attack Vector (AV)* NETWORK
    Attack Complexity (AC)* LOW
    Privileges Required (PR)* NONE
    User Interaction (UI)* NONE
    Scope (S)* UNCHANGED

l➤ Impact Metrics:
    Confidentiality Impact (C)* HIGH
    Integrity Impact (I)* NONE
    Availability Impact (A)* NONE

Weakness Enumeration (CWE)

CWE-ID: CWE-665
CWE Name: CWE-665 Improper Initialization
Source: Bitrix24

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID: CAPEC-591
CAPEC Description: CAPEC-591 Reflected XSS


Source: NVD (National Vulnerability Database).