CVE-2024-31984

Scores

EPSS

0.601medium60.1%
0%20%40%60%80%100%

Percentile: 60.1%

CVSS

8.8high3.x
0246810

CVSS Score: 8.8/10

All CVSS Scores

CVSS 3.x
8.8

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Description

XWiki Platform is a generic wiki platform. Starting in version 7.2-rc-1 and prior to versions 4.10.20, 15.5.4, and 15.10-rc-1, by creating a document with a specially crafted title, it is possible to trigger remote code execution in the (Solr-based) search in XWiki. This allows any user who can edit the title of a space (all users by default) to execute any Groovy code in the XWiki installation which compromises the confidentiality, integrity and availability of the whole XWiki installation. This has been patched in XWiki 14.10.20, 15.5.4 and 15.10 RC1. As a workaround, manually apply the patch to the Main.SolrSpaceFacet page.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

anchore_overridesnvd

CWEs

CWE-95

Related Vulnerabilities

Vulnerable Software (2)

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:org.xwiki.platform:xwiki-platform-search-solr-ui:*:*:*:*:*:maven:*:*",          "versionEndExcluding": "14.10.2...

Source: anchore_overrides

Type: Configuration

Vendor: *

Product: xwiki

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*",      "versionEndExcluding": "14.10.20",      "versionStartIncluding": "7.3",      "vulnerable": true    },    {...

Source: nvd

End of list