About Remote Code Execution - XWiki Platform (CVE-2024-31982) vulnerability. XWiki is a free open-source wiki platform. Its main feature is simplified extensibility. XWiki is often used in corporate environments as a replacement for commercial Wiki solutions (such as Atlassian Confluence).
A vulnerability with CVSS Base Score 10, published on April 10, allows attackers to execute arbitrary code via queries in the XWiki database search interface. This interface is available to all users by default and complements the regular XWiki search. If it is not needed, it can be disabled by removing the Main.DatabaseSearch page. The vulnerability is fixed in XWiki versions 14.10.20, 15.5.4 and 15.10RC1.
An exploit PoC was provided by XWiki developers in their vulnerability bulletin. 🤷♂️ Functional scripts for exploiting this vulnerability have been available on GitHub since June 22.
If your organization uses XWiki, be sure to pay attention.
На русском
@avleonovcom #XWiki
A vulnerability with CVSS Base Score 10, published on April 10, allows attackers to execute arbitrary code via queries in the XWiki database search interface. This interface is available to all users by default and complements the regular XWiki search. If it is not needed, it can be disabled by removing the Main.DatabaseSearch page. The vulnerability is fixed in XWiki versions 14.10.20, 15.5.4 and 15.10RC1.
An exploit PoC was provided by XWiki developers in their vulnerability bulletin. 🤷♂️ Functional scripts for exploiting this vulnerability have been available on GitHub since June 22.
If your organization uses XWiki, be sure to pay attention.
На русском
@avleonovcom #XWiki