Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-h63h-5c77-77p5

Опубликовано: 31 июл. 2024
Источник: github
Github: Прошло ревью
CVSS4: 9.4
CVSS3: 9.9

Описание

XWiki Platform vulnerable to remote code execution from account via SearchSuggestConfigSheet

Impact

Any user with edit right on any page can perform arbitrary remote code execution by adding instances of XWiki.SearchSuggestConfig and XWiki.SearchSuggestSourceClass to their user profile or any other page. This compromises the confidentiality, integrity and availability of the whole XWiki installation.

To reproduce on an instance, as a user without script nor programming rights, add an object of type XWiki.SearchSuggestConfig to your profile page, and an object of type XWiki.SearchSuggestSourceClass as well. On this last object, set both name and icon properties to $services.logging.getLogger("attacker").error("I got programming: $services.security.authorization.hasAccess('programming')") and limit and engine to {{/html}}{{async}}{{velocity}}$services.logging.getLogger("attacker").error("I got programming: $services.security.authorization.hasAccess('programming')"){{/velocity}}{{/async}}. Save and display the page. If the logs contain any message ERROR attacker - I got programming: true then the instance is vulnerable.

Patches

This vulnerability has been patched in XWiki 14.10.21, 15.5.5 and 15.10.2.

Workarounds

We're not aware of any workaround except upgrading.

References

Пакеты

Наименование

org.xwiki.platform:xwiki-platform-search-ui

maven
Затронутые версииВерсия исправления

>= 9.2-rc-1, < 14.10.21

14.10.21

Наименование

org.xwiki.platform:xwiki-platform-search-ui

maven
Затронутые версииВерсия исправления

>= 15.0-rc-1, < 15.5.5

15.5.5

Наименование

org.xwiki.platform:xwiki-platform-search-ui

maven
Затронутые версииВерсия исправления

>= 15.6-rc-1, < 15.10.2

15.10.2

EPSS

Процентиль: 93%
0.09745
Низкий

9.4 Critical

CVSS4

9.9 Critical

CVSS3

Дефекты

CWE-862
CWE-94
CWE-95

Связанные уязвимости

CVSS3: 9.9
nvd
больше 1 года назад

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with edit right on any page can perform arbitrary remote code execution by adding instances of `XWiki.SearchSuggestConfig` and `XWiki.SearchSuggestSourceClass` to their user profile or any other page. This compromises the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.21, 15.5.5 and 15.10.2.

EPSS

Процентиль: 93%
0.09745
Низкий

9.4 Critical

CVSS4

9.9 Critical

CVSS3

Дефекты

CWE-862
CWE-94
CWE-95