fkie_cve-2024-31983
Vulnerability from fkie_nvd
Published
2024-04-10 20:15
Modified
2025-01-21 16:22
Summary
XWiki Platform is a generic wiki platform. In multilingual wikis, translations can be edited by any user who has edit right, circumventing the rights that are normally required for authoring translations (script right for user-scope translations, wiki admin for translations on the wiki). Starting in version 4.3-milestone-2 and prior to versions 4.10.20, 15.5.4, and 15.10-rc-1, this can be exploited for remote code execution if the translation value is not properly escaped where it is used. This has been patched in XWiki 14.10.20, 15.5.4 and 15.10RC1. As a workaround, one may restrict edit rights on documents that contain translations.
Impacted products
Vendor Product Version
xwiki xwiki *
xwiki xwiki *
xwiki xwiki *
xwiki xwiki 4.3
xwiki xwiki 4.3
xwiki xwiki 4.3



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "75B593EA-BB03-487B-822F-4E2C46F76D99",
                     versionEndExcluding: "14.10.20",
                     versionStartIncluding: "4.3.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C15AC764-BCCE-4AF3-98F5-28EC637500A4",
                     versionEndExcluding: "15.5.4",
                     versionStartIncluding: "15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B214D1C2-C7E5-44D2-95BD-4FFE947436C2",
                     versionEndExcluding: "15.10",
                     versionStartIncluding: "15.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xwiki:xwiki:4.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "E4A0B6CE-A44D-43B0-91C7-839D93608077",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xwiki:xwiki:4.3:milestone2:*:*:*:*:*:*",
                     matchCriteriaId: "F3AAC6FA-548D-4A38-A8FA-67E6D79641D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xwiki:xwiki:4.3:rc1:*:*:*:*:*:*",
                     matchCriteriaId: "1C62BF98-ADD8-49DA-BFAD-55C9C957FDBC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "XWiki Platform is a generic wiki platform. In multilingual wikis, translations can be edited by any user who has edit right, circumventing the rights that are normally required for authoring translations (script right for user-scope translations, wiki admin for translations on the wiki). Starting in version 4.3-milestone-2 and prior to versions 4.10.20, 15.5.4, and 15.10-rc-1, this can be exploited for remote code execution if the translation value is not properly escaped where it is used. This has been patched in XWiki 14.10.20, 15.5.4 and 15.10RC1. As a workaround, one may restrict edit rights on documents that contain translations.",
      },
      {
         lang: "es",
         value: "XWiki Platform es una plataforma wiki genérica. En los wikis multilingües, las traducciones pueden ser editadas por cualquier usuario que tenga derechos de edición, eludiendo los derechos que normalmente se requieren para la autoría de traducciones (derecho de script para traducciones de alcance de usuario, administrador de wiki para traducciones en el wiki). A partir de la versión 4.3-milestone-2 y anteriores a las versiones 4.10.20, 15.5.4 y 15.10-rc-1, esto se puede aprovechar para la ejecución remota de código si el valor de traducción no se escapa correctamente cuando se utiliza. Esto ha sido parcheado en XWiki 14.10.20, 15.5.4 y 15.10RC1. Como workaround, se pueden restringir los derechos de edición de documentos que contienen traducciones.",
      },
   ],
   id: "CVE-2024-31983",
   lastModified: "2025-01-21T16:22:36.987",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.9,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.1,
            impactScore: 6,
            source: "security-advisories@github.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-04-10T20:15:08.650",
   references: [
      {
         source: "security-advisories@github.com",
         tags: [
            "Patch",
         ],
         url: "https://github.com/xwiki/xwiki-platform/commit/2a9ce88f33663c53c9c63b2ea573f4720ea2efb9",
      },
      {
         source: "security-advisories@github.com",
         tags: [
            "Patch",
         ],
         url: "https://github.com/xwiki/xwiki-platform/commit/73aef9648bbff04b697837f1b906932f0d5caacb",
      },
      {
         source: "security-advisories@github.com",
         tags: [
            "Patch",
         ],
         url: "https://github.com/xwiki/xwiki-platform/commit/c4c8d61c30de72298d805ccc82df2a307f131c54",
      },
      {
         source: "security-advisories@github.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-xxp2-9c9g-7wmj",
      },
      {
         source: "security-advisories@github.com",
         tags: [
            "Exploit",
            "Vendor Advisory",
         ],
         url: "https://jira.xwiki.org/browse/XWIKI-21411",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://github.com/xwiki/xwiki-platform/commit/2a9ce88f33663c53c9c63b2ea573f4720ea2efb9",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://github.com/xwiki/xwiki-platform/commit/73aef9648bbff04b697837f1b906932f0d5caacb",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://github.com/xwiki/xwiki-platform/commit/c4c8d61c30de72298d805ccc82df2a307f131c54",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-xxp2-9c9g-7wmj",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Vendor Advisory",
         ],
         url: "https://jira.xwiki.org/browse/XWIKI-21411",
      },
   ],
   sourceIdentifier: "security-advisories@github.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-862",
            },
         ],
         source: "security-advisories@github.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-862",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.