Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rr6p-3pfg-562j

Опубликовано: 20 фев. 2025
Источник: github
Github: Прошло ревью
CVSS3: 9.8

Описание

XWiki Platform allows remote code execution as guest via SolrSearchMacros request

Impact

Any guest can perform arbitrary remote code execution through a request to SolrSearch. This impacts the confidentiality, integrity and availability of the whole XWiki installation.

To reproduce on an instance, without being logged in, go to <host>/xwiki/bin/get/Main/SolrSearch?media=rss&text=%7D%7D%7D%7B%7Basync%20async%3Dfalse%7D%7D%7B%7Bgroovy%7D%7Dprintln%28"Hello%20from"%20%2B%20"%20search%20text%3A"%20%2B%20%2823%20%2B%2019%29%29%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D%20. If there is an output, and the title of the RSS feed contains Hello from search text:42, then the instance is vulnerable.

Patches

This vulnerability has been patched in XWiki 15.10.11, 16.4.1 and 16.5.0RC1.

Workarounds

This line in Main.SolrSearchMacros can be edited to match the rawResponse macro defined here with a content type of application/xml, instead of simply outputting the content of the feed.

References

Attribution

This vulnerability has been reported by John Kwak for Trend Micro's Zero Day Initiative.

Пакеты

Наименование

org.xwiki.platform:xwiki-platform-search-solr-ui

maven
Затронутые версииВерсия исправления

>= 5.3-milestone-2, < 15.10.11

15.10.11

Наименование

org.xwiki.platform:xwiki-platform-search-solr-ui

maven
Затронутые версииВерсия исправления

>= 16.0.0-rc-1, < 16.4.1

16.4.1

EPSS

Процентиль: 100%
0.94241
Критический

9.8 Critical

CVSS3

Дефекты

CWE-94
CWE-95

Связанные уязвимости

CVSS3: 9.8
nvd
12 месяцев назад

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any guest can perform arbitrary remote code execution through a request to `SolrSearch`. This impacts the confidentiality, integrity and availability of the whole XWiki installation. To reproduce on an instance, without being logged in, go to `<host>/xwiki/bin/get/Main/SolrSearch?media=rss&text=%7D%7D%7D%7B%7Basync%20async%3Dfalse%7D%7D%7B%7Bgroovy%7D%7Dprintln%28"Hello%20from"%20%2B%20"%20search%20text%3A"%20%2B%20%2823%20%2B%2019%29%29%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D%20`. If there is an output, and the title of the RSS feed contains `Hello from search text:42`, then the instance is vulnerable. This vulnerability has been patched in XWiki 15.10.11, 16.4.1 and 16.5.0RC1. Users are advised to upgrade. Users unable to upgrade may edit `Main.SolrSearchMacros` in `SolrSearchMacros.xml` on line 955 to match the `rawResponse` macro in `macros.vm#L2824` with a content type of `app

CVSS3: 9.8
fstec
почти 2 года назад

Уязвимость компонента SolrSearchMacros платформы создания совместных веб-приложений XWiki Platform XWiki, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 100%
0.94241
Критический

9.8 Critical

CVSS3

Дефекты

CWE-94
CWE-95