CVE-2023-1717

Prototype pollution in bitrix/templates/bitrix24/components/bitrix/menu/left_vertical/script.js in Bitrix24 22.0.300 allows remote attackers to execute arbitrary JavaScript code in the victim’s browser, and possibly execute arbitrary PHP code on the server if the victim has administrator privilege, via polluting `__proto__[tag]` and `__proto__[text]`.
References
Link Resource
https://starlabs.sg/advisories/23/23-1717/ Exploit Third Party Advisory
https://starlabs.sg/advisories/23/23-1717/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:bitrix24:bitrix24:22.0.300:*:*:*:*:*:*:*

History

21 Nov 2024, 07:39

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-01 10:15

Updated : 2024-11-21 07:39


NVD link : CVE-2023-1717

Mitre link : CVE-2023-1717

CVE.ORG link : CVE-2023-1717


JSON object : View

Products Affected

bitrix24

  • bitrix24
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-1321

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')