Remote Code Execution Vulnerability in XWiki Platform
CVE-2024-31982

10CRITICAL

Key Information:

Vendor
Xwiki
Vendor
CVE Published:
10 April 2024

Badges

👾 Exploit Exists🟡 Public PoC📰 News Worthy

Summary

The CVE-2024-31982 vulnerability is a remote code execution vulnerability in the XWiki Platform that allows for remote code execution through the database search feature. This can be accessed by any visitor of a public wiki or closed wiki, impacting the confidentiality, integrity, and availability of the entire XWiki installation. The vulnerability has been patched in versions 14.10.20, 15.5.4, and 15.10RC1 of XWiki. It is recommended to apply the patch manually or delete the page "Main.DatabaseSearch" if database search is not explicitly used by users.

Affected Version(s)

xwiki-platform >= 2.4-milestone-1, < 14.10.20 < 2.4-milestone-1, 14.10.20

xwiki-platform >= 15.0-rc-1, < 15.5.4 < 15.0-rc-1, 15.5.4

xwiki-platform >= 15.6-rc-1, < 15.10-rc-1 < 15.6-rc-1, 15.10-rc-1

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

CVE-2024-31982:XWiki 通过 DatabaseSearch 以访客身份远程执行代码

影响 XWiki 的数据库搜索允许通过搜索文本执行远程代码。由于数据库搜索默认可供所有用户访问,因此任何公共 wiki 访问者或封闭 wiki 用户都可以执行远程代码。这会影响整个 XWiki...

7 months ago

References

CVSS V3.1

Score:
10
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • 📰

    First article discovered by CN-SEC

  • Vulnerability published

  • Vulnerability Reserved

.