CVE-2024-31984

XWiki Platform is a generic wiki platform. Starting in version 7.2-rc-1 and prior to versions 4.10.20, 15.5.4, and 15.10-rc-1, by creating a document with a specially crafted title, it is possible to trigger remote code execution in the (Solr-based) search in XWiki. This allows any user who can edit the title of a space (all users by default) to execute any Groovy code in the XWiki installation which compromises the confidentiality, integrity and availability of the whole XWiki installation. This has been patched in XWiki 14.10.20, 15.5.4 and 15.10 RC1. As a workaround, manually apply the patch to the `Main.SolrSpaceFacet` page.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*
cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*
cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*
cpe:2.3:a:xwiki:xwiki:7.2:-:*:*:*:*:*:*
cpe:2.3:a:xwiki:xwiki:7.2:rc1:*:*:*:*:*:*

History

21 Jan 2025, 16:20

Type Values Removed Values Added
References () https://github.com/xwiki/xwiki-platform/commit/43c9d551e3c11e9d8f176b556dd33bbe31fc66e0 - () https://github.com/xwiki/xwiki-platform/commit/43c9d551e3c11e9d8f176b556dd33bbe31fc66e0 - Patch
References () https://github.com/xwiki/xwiki-platform/commit/5ef9d294d37be92ee22b2549e38663b29dce8767 - () https://github.com/xwiki/xwiki-platform/commit/5ef9d294d37be92ee22b2549e38663b29dce8767 - Patch
References () https://github.com/xwiki/xwiki-platform/commit/74e301c481e69eeea674dac7fed6af3614cf08c5 - () https://github.com/xwiki/xwiki-platform/commit/74e301c481e69eeea674dac7fed6af3614cf08c5 - Patch
References () https://github.com/xwiki/xwiki-platform/commit/94fc12db87c2431eb1335ecb9c2954b1905bde62 - () https://github.com/xwiki/xwiki-platform/commit/94fc12db87c2431eb1335ecb9c2954b1905bde62 - Patch
References () https://github.com/xwiki/xwiki-platform/commit/acba74c149a041345b24dcca52c586f872ba97fb - () https://github.com/xwiki/xwiki-platform/commit/acba74c149a041345b24dcca52c586f872ba97fb - Patch
References () https://github.com/xwiki/xwiki-platform/commit/ef55105d6eeec5635fd693f0070c5aaaf3bdd940 - () https://github.com/xwiki/xwiki-platform/commit/ef55105d6eeec5635fd693f0070c5aaaf3bdd940 - Patch
References () https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-xm4h-3jxr-m3c6 - () https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-xm4h-3jxr-m3c6 - Exploit, Vendor Advisory
References () https://jira.xwiki.org/browse/XWIKI-21471 - () https://jira.xwiki.org/browse/XWIKI-21471 - Exploit, Vendor Advisory
First Time Xwiki
Xwiki xwiki
CPE cpe:2.3:a:xwiki:xwiki:7.2:rc1:*:*:*:*:*:*
cpe:2.3:a:xwiki:xwiki:7.2:-:*:*:*:*:*:*
cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*
CWE CWE-94

Information

Published : 2024-04-10 20:15

Updated : 2025-01-21 16:20


NVD link : CVE-2024-31984

Mitre link : CVE-2024-31984

CVE.ORG link : CVE-2024-31984


JSON object : View

Products Affected

xwiki

  • xwiki
CWE
CWE-95

Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')

CWE-94

Improper Control of Generation of Code ('Code Injection')