First published: Wed Nov 01 2023(Updated: )
Global variable extraction in bitrix/modules/main/tools.php in Bitrix24 22.0.300 allows unauthenticated remote attackers to (1) enumerate attachments on the server and (2) execute arbitrary JavaScript code in the victim's browser, and possibly execute arbitrary PHP code on the server if the victim has administrator privilege, via overwriting uninitialised variables.
Credit: info@starlabs.sg
Affected Software | Affected Version | How to fix |
---|---|---|
Bitrix24 Bitrix24 | =22.0.300 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-1719.
The severity of CVE-2023-1719 is critical with a severity value of 9.8.
CVE-2023-1719 allows unauthenticated remote attackers to enumerate attachments on the server, execute arbitrary JavaScript code in the victim's browser, and possibly execute arbitrary PHP code on the server.
Apply the recommended security updates or patches provided by Bitrix24.
You can find more information about CVE-2023-1719 at the following link: [CVE-2023-1719](https://starlabs.sg/advisories/23/23-1719/)