CVE-2023-1718
Homebrew vulnerability analysis and mitigation

Overview

Bitrix24 version 22.0.300 contains an improper file stream access vulnerability in the /desktopapp/file.ajax.php?action=uploadfile endpoint. The vulnerability, identified as CVE-2023-1718, was discovered by researchers from STAR Labs SG Pte. Ltd. and publicly disclosed on November 1, 2023. This security flaw allows unauthenticated remote attackers to cause a denial-of-service condition via a crafted 'tmpurl' parameter (STAR Labs).

Technical details

The vulnerability is classified as CWE-835 (Loop with Unreachable Exit Condition - 'Infinite Loop') with a CVSS v3.1 Base Score of 7.5 (High). The issue occurs in the file upload functionality where files can be specified by their URL in the tmp_url field. When processing these URLs, the application fails to properly validate PHP streams, particularly when handling php://stdout, resulting in an infinite loop condition as the EOF marker is never reached. This occurs because php://stdout is a write-only stream, causing !feof($fp) to always return true (STAR Labs).

Impact

When successfully exploited, the vulnerability results in a denial-of-service condition through excessive computing resource consumption. The affected webserver becomes unresponsive as the process handling the malicious request consumes maximum allowed compute time, preventing the processing of legitimate requests. The impact is particularly severe as it affects availability while requiring no authentication to exploit (STAR Labs).

Mitigation and workarounds

Detection of exploitation attempts can be implemented by monitoring traffic logs for the presence of php://stdout or file:///dev/stdout in request bodies. Organizations should examine their logs for these indicators of compromise and implement appropriate filtering mechanisms (STAR Labs).

Community reactions

The vendor, Bitrix24, initially expressed concerns about publishing the CVE, citing previous incidents where disclosure led to attacks on their clients. They attempted to negotiate an alternative resolution through a bug bounty program but ultimately agreed to a coordinated disclosure date of November 1, 2023 (STAR Labs).

Additional resources


SourceThis report was generated using AI

Related Homebrew vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-58360CRITICAL9.8
  • JavaJava
  • org.geoserver.web:gs-web-app
NoYesNov 25, 2025
CVE-2025-65085HIGH8.4
  • NixOSNixOS
  • cobalt
NoNoNov 25, 2025
CVE-2025-65084HIGH8.4
  • NixOSNixOS
  • argon
NoNoNov 25, 2025
CVE-2025-59789HIGH7.5
  • HomebrewHomebrew
  • brpc
NoYesDec 01, 2025
CVE-2025-21621MEDIUM6.1
  • JavaJava
  • geoserver
NoYesNov 25, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management