Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2858-8cfx-69m9

Опубликовано: 10 апр. 2024
Источник: github
Github: Прошло ревью
CVSS4: 10
CVSS3: 10

Описание

XWiki Platform: Remote code execution as guest via DatabaseSearch

Impact

XWiki's database search allows remote code execution through the search text. This allows remote code execution for any visitor of a public wiki or user of a closed wiki as the database search is by default accessible for all users. This impacts the confidentiality, integrity and availability of the whole XWiki installation.

To reproduce on an instance, without being logged in, go to <hostname>/xwiki/bin/get/Main/DatabaseSearch?outputSyntax=plain&text=%7D%7D%7D%7B%7Basync%20async%3Dfalse%7D%7D%7B%7Bgroovy%7D%7Dprintln%28%22Hello%20from%22%20%2B%20%22%20search%20text%3A%22%20%2B%20%2823%20%2B%2019%29%29%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D%20. If the title of the RSS channel contains Hello from search text:42, the instance is vulnerable.

Patches

This vulnerability has been patched in XWiki 14.10.20, 15.5.4 and 15.10RC1.

Workarounds

It is possible to manually apply this patch to the page Main.DatabaseSearch. Alternatively, unless database search is explicitly used by users, this page can be deleted as this is not the default search interface of XWiki.

References

Пакеты

Наименование

org.xwiki.platform:xwiki-platform-search-ui

maven
Затронутые версииВерсия исправления

>= 2.4-milestone-1, < 14.10.20

14.10.20

Наименование

org.xwiki.platform:xwiki-platform-search-ui

maven
Затронутые версииВерсия исправления

>= 15.0-rc-1, < 15.5.4

15.5.4

Наименование

org.xwiki.platform:xwiki-platform-search-ui

maven
Затронутые версииВерсия исправления

>= 15.6-rc-1, < 15.10-rc-1

15.10-rc-1

EPSS

Процентиль: 100%
0.94247
Критический

10 Critical

CVSS4

10 Critical

CVSS3

Дефекты

CWE-94
CWE-95

Связанные уязвимости

CVSS3: 10
nvd
больше 1 года назад

XWiki Platform is a generic wiki platform. Starting in version 2.4-milestone-1 and prior to versions 4.10.20, 15.5.4, and 15.10-rc-1, XWiki's database search allows remote code execution through the search text. This allows remote code execution for any visitor of a public wiki or user of a closed wiki as the database search is by default accessible for all users. This impacts the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.20, 15.5.4 and 15.10RC1. As a workaround, one may manually apply the patch to the page `Main.DatabaseSearch`. Alternatively, unless database search is explicitly used by users, this page can be deleted as this is not the default search interface of XWiki.

CVSS3: 10
fstec
почти 2 года назад

Уязвимость функции DatabaseSearch платформы создания совместных веб-приложений XWiki Platform XWiki, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 100%
0.94247
Критический

10 Critical

CVSS4

10 Critical

CVSS3

Дефекты

CWE-94
CWE-95