# XWiki 平台:Guest 用户利用 DatabaseSearch 进行远程代码执行
## 概述
XWiki Platform 是一个通用的维基平台,在版本 2.4-milestone-1 及其后至版本 4.10.20、15.5.4 和 15.10-rc-1 之前,XWiki 数据库搜索功能允许通过搜索文本进行远程代码执行,从而影响整个 XWiki 安装的机密性、完整性和可用性。
## 影响版本
- 2.4-milestone-1 至 4.10.20
- 2.4-milestone-1 至 15.5.4
- 2.4-milestone-1 至 15.10-rc-1
## 细节
在上述版本中,数据库搜索功能允许远程代码执行,任何访问公共维基的访客或使用封闭维基的用户都可以利用此功能,因为数据库搜索默认对所有用户开放。
## 影响
该漏洞影响整个 XWiki 安装的机密性、完整性和可用性。在版本 14.10.20、15.5.4 和 15.10RC1 中已被修复。作为临时解决方案,可以手动将补丁应用于 `Main.DatabaseSearch` 页面。如果未明确使用数据库搜索,也可以删除此页面,因为它不是 XWiki 的默认搜索界面。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | None | https://github.com/k3lpi3b4nsh33/CVE-2024-31982 | POC详情 |
2 | A tool for vulnerability detection and exploitation tool for CVE-2024-31982 | https://github.com/th3gokul/CVE-2024-31982 | POC详情 |
3 | POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20 | https://github.com/bigb0x/CVE-2024-31982 | POC详情 |
4 | XWiki Platform is a generic wiki platform. Starting in version 2.4-milestone-1 and prior to versions 4.10.20, 15.5.4, and 15.10-rc-1, XWiki's database search allows remote code execution through the search text. This allows remote code execution for any visitor of a public wiki or user of a closed wiki as the database search is by default accessible for all users. This impacts the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.20, 15.5.4 and 15.10RC1. As a workaround, one may manually apply the patch to the page `Main.DatabaseSearch`. Alternatively, unless database search is explicitly used by users, this page can be deleted as this is not the default search interface of XWiki. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-31982.yaml | POC详情 |
5 | None | https://github.com/NanoWraith/CVE-2024-31982 | POC详情 |
标题: XWiki RCE (CVE-2024-31982) - vsociety -- 🔗来源链接
标签:
暂无评论