CVE-2024-34887

4.9 MEDIUM

📋 TL;DR

This vulnerability allows remote administrators in Bitrix24 to exfiltrate AD/LDAP administrator account passwords to arbitrary external servers via HTTP POST requests. It affects Bitrix24 installations with AD/LDAP integration configured. The issue stems from insufficient credential protection in server settings.

💻 Affected Systems

Products:
  • 1C-Bitrix Bitrix24
Versions: 23.300.100
Operating Systems: All platforms running Bitrix24
Default Config Vulnerable: ✅ No
Notes: Only affects systems with AD/LDAP server integration configured. Default installations without AD/LDAP are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain AD/LDAP domain administrator credentials, enabling full domain compromise, lateral movement, and data exfiltration.

🟠

Likely Case

Credential theft leading to unauthorized access to directory services and potential privilege escalation within the network.

🟢

If Mitigated

Limited to credential exposure without immediate exploitation if strong network segmentation and monitoring are in place.

🌐 Internet-Facing: MEDIUM - Requires administrator access but can send credentials to external servers via HTTP.
🏢 Internal Only: HIGH - Internal administrators can exploit to steal domain credentials critical for network security.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrator privileges in Bitrix24. Public proof-of-concept code is available in the referenced GitHub repository.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 23.300.200 or later

Vendor Advisory: http://bitrix24.com

Restart Required: No

Instructions:

1. Log into Bitrix24 admin panel. 2. Navigate to System Settings > Updates. 3. Apply available updates to version 23.300.200 or higher. 4. Verify AD/LDAP settings are properly configured post-update.

🔧 Temporary Workarounds

Disable AD/LDAP Integration

all

Temporarily disable AD/LDAP server integration until patching is possible.

Navigate to Bitrix24 admin panel > Settings > LDAP/AD and disable integration

Restrict Administrator Access

all

Limit Bitrix24 administrator accounts to trusted personnel only.

Review and reduce administrator privileges in Bitrix24 user management

🧯 If You Can't Patch

  • Implement network segmentation to isolate Bitrix24 server from AD/LDAP infrastructure
  • Enable detailed logging and monitoring of all HTTP POST requests from Bitrix24 to external servers

🔍 How to Verify

Check if Vulnerable:

Check Bitrix24 version in admin panel and verify if AD/LDAP integration is enabled.

Check Version:

Check version in Bitrix24 admin dashboard under System Information

Verify Fix Applied:

Confirm version is 23.300.200 or higher and test AD/LDAP functionality remains operational.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP POST requests from Bitrix24 to external IP addresses
  • Multiple failed AD/LDAP authentication attempts following credential changes

Network Indicators:

  • Outbound HTTP traffic from Bitrix24 server to unfamiliar domains/IPs
  • Unencrypted credential transmission in network captures

SIEM Query:

source="bitrix24" AND (http_method="POST" AND dest_ip NOT IN [allowed_servers])

🔗 References

📤 Share & Export