CVE-2024-34882
Homebrew vulnerability analysis and mitigation

Overview

Insufficiently protected credentials in SMTP server settings in 1C-Bitrix Bitrix24 23.300.100 allows remote administrators to send SMTP account passwords to an arbitrary server via HTTP POST request. The vulnerability was assigned CVE-2024-34882 and has been given a CVSS v3.1 base score of 4.9 (Medium) by NIST and 6.8 (Medium) by CISA-ADP (NVD).

Technical details

The vulnerability is classified as CWE-522 (Insufficiently Protected Credentials). The issue allows remote administrators to exploit the SMTP settings functionality to obtain SMTP passwords in clear text. The exploitation involves accessing the Administration section's SMTP settings, selecting a server, clicking 'Change', and using developer tools to locate the password field in the source code (BitrixVulns).

Impact

The vulnerability enables remote administrators to access and potentially expose SMTP account passwords, which could lead to unauthorized access to email services and potential misuse of email infrastructure. The severity is rated as medium due to the requirement of administrative privileges for exploitation (NVD).

Mitigation and workarounds

Currently, there is no official fix available for this vulnerability. The recommended mitigation strategy is to implement least privilege credentials and differentiate access rights based on the role model (BitrixVulns).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management