We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-1714

Bitrix24 Remote Command Execution (RCE) via Unsafe Variable Extraction



AssignerSTAR_Labs
Reserved2023-03-30
Published2023-11-01
Updated2024-09-05

Description

Unsafe variable extraction in bitrix/modules/main/classes/general/user_options.php in Bitrix24 22.0.300 allows remote authenticated attackers to execute arbitrary code via (1) appending arbitrary content to existing PHP files or (2) PHAR deserialization.



HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-502 Deserialization of Untrusted Data

Product status

Default status
0x40029441e0

Any version
affected

Credits

Lam Jun Rong & Li Jiantao of STAR Labs SG Pte. Ltd. (@starlabs_sg) 0x4002944240

References

https://starlabs.sg/advisories/23/23-1714/ third-party-advisory

cve.org CVE-2023-1714

nvd.nist.gov CVE-2023-1714

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-1714
Subscribe to our newsletter to learn more about our work.