We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-1714

Bitrix24 Remote Command Execution (RCE) via Unsafe Variable Extraction



Description

Unsafe variable extraction in bitrix/modules/main/classes/general/user_options.php in Bitrix24 22.0.300 allows remote authenticated attackers to execute arbitrary code via (1) appending arbitrary content to existing PHP files or (2) PHAR deserialization.

Reserved 2023-03-30 | Published 2023-11-01 | Updated 2024-09-05 | Assigner STAR_Labs


HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-502 Deserialization of Untrusted Data

Product status

Default status
unaffected

Any version
affected

Credits

Lam Jun Rong & Li Jiantao of STAR Labs SG Pte. Ltd. (@starlabs_sg) finder

References

starlabs.sg/advisories/23/23-1714/ third-party-advisory

cve.org (CVE-2023-1714)

nvd.nist.gov (CVE-2023-1714)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-1714

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.