2024-12-08 03:06:42 +00:00

119 lines
3.6 KiB
JSON

{
"id": "CVE-2023-1719",
"sourceIdentifier": "info@starlabs.sg",
"published": "2023-11-01T10:15:09.373",
"lastModified": "2024-11-21T07:39:45.817",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Global variable extraction in bitrix/modules/main/tools.php in Bitrix24 22.0.300 allows unauthenticated remote attackers to (1) enumerate attachments on the server and (2) execute arbitrary JavaScript code in the victim's browser, and possibly execute arbitrary PHP code on the server if the victim has administrator privilege, via overwriting uninitialised variables."
},
{
"lang": "es",
"value": "La extracci\u00f3n de variables globales en bitrix/modules/main/tools.php en Bitrix24 22.0.300 permite a atacantes remotos no autenticados (1) enumerar archivos adjuntos en el servidor y (2) ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima, y posiblemente ejecutar c\u00f3digo PHP arbitrario en el servidor si la v\u00edctima tiene privilegios de administrador, sobrescribiendo variables no inicializadas."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "info@starlabs.sg",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "info@starlabs.sg",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-665"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-665"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bitrix24:bitrix24:22.0.300:*:*:*:*:*:*:*",
"matchCriteriaId": "D47D6185-F86F-4402-85C1-C0A0EAE09B0D"
}
]
}
]
}
],
"references": [
{
"url": "https://starlabs.sg/advisories/23/23-1719/",
"source": "info@starlabs.sg",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://starlabs.sg/advisories/23/23-1719/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}