Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Global variable extraction in bitrix/modules/main/tools.php in Bitrix24 22.0.300 allows unauthenticated remote attackers to (1) enumerate attachments on the server and (2) execute arbitrary JavaScript code in the victim’s browser, and possibly execute arbitrary PHP code on the server if the victim has administrator privilege, via overwriting uninitialised variables. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-1719.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2023-1720 | 9.6 CRITICAL | Bitrix24 Stored Cross-Site Scripting (XSS) via File Upload |
| CVE-2023-1717 | 9.6 CRITICAL | Bitrix24 Cross-Site Scripting (XSS) via Client-side Prototype Pollution |
| CVE-2023-1716 | 9.0 CRITICAL | Bitrix24 Stored Cross-Site Scripting (XSS) via Improper Input Neutralization on Invoice Ed |
| CVE-2023-1715 | 9.0 CRITICAL | Bitrix24 Stored Cross-Site Scripting (XSS) via Improper Input Neutralization on Invoice Ed |
| CVE-2023-1714 | 8.8 HIGH | Bitrix24 Remote Command Execution (RCE) via Unsafe Variable Extraction |
| CVE-2023-1713 | 8.8 HIGH | Bitrix24 Remote Command Execution (RCE) via Insecure Temporary File Creation |
| CVE-2023-1718 | 7.5 HIGH | Bitrix24 Denial-of-Service (DoS) via Improper File Stream Access |
No comments yet