First published: Wed Nov 01 2023(Updated: )
A logic error when using mb_strpos() to check for potential XSS payload in Bitrix24 22.0.300 allows attackers to bypass XSS sanitisation via placing HTML tags at the begining of the payload.
Credit: info@starlabs.sg
Affected Software | Affected Version | How to fix |
---|---|---|
Citrix Receiver | =22.0.300 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-1715 is a vulnerability that allows attackers to bypass XSS sanitization in Bitrix24 22.0.300 by placing HTML tags at the beginning of the payload.
CVE-2023-1715 has a severity level of critical.
CVE-2023-1715 affects Bitrix24 version 22.0.300.
To fix CVE-2023-1715, it is recommended to update Bitrix24 to a version that includes the security patch for this vulnerability.
More information about CVE-2023-1715 can be found at [https://starlabs.sg/advisories/23/23-1715/](https://starlabs.sg/advisories/23/23-1715/).