RULE(RULE ID:337870)

Rule General Information
Release Date: 2024-03-26
Rule Name: Typecho Deserialization Vulnerability (CVE-2023-24114)
Severity:
CVE ID:
Rule Protection Details
Description: typecho 1.1/17.10.30 was discovered to contain a remote code execution (RCE) vulnerability via install.php. The vulnerability is caused by the install.php file that exits without processing after the error is caught, resulting in a bypass, and the value of the __typecho_config parameter is deserialized when the subsequent operation of install.php is executed, resulting in a medium and remote Code execution (RCE) vulnerability. This rule has the possibility of false positives and needs to be analyzed in combination with the value of the __typecho_config parameter of the specific hit traffic.
Impact: An attacker can carefully construct malicious serialized data and pass it to the application, and execute the malicious code constructed by the attacker when the application deserializes the object.
Affected OS: Windows, Linux, Others
Reference: https://github.com/typecho/typecho/issues/1523
https://cxsecurity.com/cveshow/CVE-2023-24114/
https://nvd.nist.gov/vuln/detail/CVE-2023-24114
Solutions
Refer to the announcement or patch by the vendor: https://github.com/typecho/typecho/issues/1523