CVE-2023-44827

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers to execute arbitrary code on ZenTao project management systems via crafted scripts in the Office Conversion Settings function. It affects ZenTao Community Edition v18.6 and earlier, ZenTao Biz v8.6 and earlier, and ZenTao Max v4.7 and earlier. Attackers must have valid credentials to exploit this vulnerability.

💻 Affected Systems

Products:
  • ZenTao Community Edition
  • ZenTao Biz
  • ZenTao Max
Versions: Community Edition v18.6 and earlier, Biz v8.6 and earlier, Max v4.7 and earlier
Operating Systems: All platforms running affected ZenTao versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access; Office Conversion Settings function must be accessible to the attacker's account.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands, steal sensitive data, install malware, or pivot to other systems in the network.

🟠

Likely Case

Attackers with valid credentials gain remote code execution, potentially leading to data theft, system manipulation, or deployment of ransomware.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to the ZenTao application server only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires valid credentials; public proof-of-concept demonstrates the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Community Edition v18.7+, Biz v8.7+, Max v4.8+

Vendor Advisory: https://www.zentao.net/

Restart Required: Yes

Instructions:

1. Backup your ZenTao installation and database. 2. Download the latest version from the official ZenTao website. 3. Follow the upgrade instructions in the ZenTao documentation. 4. Restart the web server and verify the upgrade.

🔧 Temporary Workarounds

Disable Office Conversion Settings

all

Remove or restrict access to the vulnerable Office Conversion Settings function

Restrict User Permissions

all

Limit which users have access to system configuration functions

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate ZenTao servers from critical systems
  • Enable detailed logging and monitoring for suspicious Office Conversion Settings activity

🔍 How to Verify

Check if Vulnerable:

Check ZenTao version in admin panel or via version file in installation directory

Check Version:

Check /path/to/zentao/VERSION file or admin panel version display

Verify Fix Applied:

Verify version is Community Edition v18.7+, Biz v8.7+, or Max v4.8+

📡 Detection & Monitoring

Log Indicators:

  • Unusual Office Conversion Settings modifications
  • Suspicious script execution in conversion logs
  • Multiple failed authentication attempts followed by successful login

Network Indicators:

  • Unexpected outbound connections from ZenTao server
  • Suspicious payloads in HTTP requests to conversion endpoints

SIEM Query:

source="zentao" AND (event="office_conversion" OR event="script_execution") AND status="success"

🔗 References

📤 Share & Export