### [CVE-2023-1714](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1714) ![](https://img.shields.io/static/v1?label=Product&message=Bitrix24&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0%3C%3D%2022.0.300%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-502%20Deserialization%20of%20Untrusted%20Data&color=brighgreen) ### Description Unsafe variable extraction in bitrix/modules/main/classes/general/user_options.php in Bitrix24 22.0.300 allows remote authenticated attackers to execute arbitrary code via (1) appending arbitrary content to existing PHP files or (2) PHAR deserialization. ### POC #### Reference - https://starlabs.sg/advisories/23/23-1714/ #### Github - https://github.com/ForceFledgling/CVE-2023-1714 - https://github.com/nomi-sec/PoC-in-GitHub