Authored by EgiX | Site

Tiki Wiki CMS Groupware versions 24.0 and below suffers from a PHP object injection vulnerability in grid.php.

advisories | CVE-2023-22580

Tiki Wiki CMS Groupware <= 24.0 (grid.php) PHP Object Injection

[-] Software Link:

[-] Affected Versions:

Version 24.0 and prior versions.

[-] Vulnerability Description:

The vulnerability is located in the /lib/sheet/grid.php script,
specifically into the TikiSheetSerializeHandler::_load() method, which
is using the unserialize() PHP function with user-controlled input. This
can be exploited by malicious users to inject arbitrary PHP objects into
the application scope, allowing them to perform a variety of attacks,
such as executing arbitrary PHP code. Successful exploitation of this
vulnerability requires the “Spreadsheets” feature to be enabled and an
account with permissions to create a new sheet. However, due to the CSRF
vulnerability described in KIS-2023-01, this vulnerability might also be
exploited by tricking a victim user into opening a web page like the

<form action="http://localhost/tiki/tiki-import_sheet.php?sheetId=1"
method="POST" enctype="multipart/form-data">
<input type="hidden" name="handler" value="TikiSheetSerializeHandler"
<input type="file" name="file" id="fileinput"/>
const popChain =