支持本站 — 捐款将帮助我们持续运营

目标:1000 元,已筹:752

75.2%

POC详情: 203160906dd77cb2355a4de8d5e1854b0c69c78a

来源
关联漏洞
标题:XWiki Platform 安全漏洞 (CVE-2025-24893)
描述:XWiki Platform是XWiki开源的一套用于创建Web协作应用程序的Wiki平台。 XWiki Platform存在安全漏洞,该漏洞源于任何来宾用户都可以通过对SolrSearch的请求,造成远程代码执行。
描述
CVE-2025-24893
介绍
# 🔐 CVE-2025-24893 — XWiki Critical RCE

<img width="1046" height="586" alt="cve-2025" src="https://github.com/user-attachments/assets/14742e6c-0cd8-4c8a-8b1d-290e2c3fe46f" />

**Status:** 🚨 *Actively Exploited in the Wild*
**Type:** 🧨 Unauthenticated Remote Code Execution
**Product:** 🧩 XWiki Platform
**Risk:** 🔥 **Critical**

---

# 📝 1. Overview

* Any **guest (unauthenticated)** user can trigger unsafe Groovy evaluation inside the **SolrSearch** macro.
* This leads to **server-side code execution**, impacting the **entire platform**.
* Attackers exploit this by crafting malicious search requests that abuse template rendering.
* Used in real-world attacks to deploy malware such as **cryptominers**.

---

# 🧩 2. Technical Summary

## 🛣️ Vulnerable Component

```
SolrSearch macro → RSS rendering → unsafe evaluation of user-controlled text
```


## 🛡️ How to use it safely:

```
# 1. Detection only
sudo python3 CVE-2025-24893.py http://your-lab-xwiki:8080

# 2. One-liner
sudo python3 CVE-2025-24893.py http://target:8080 whoami

# 3. Interactive
sudo python3 CVE-2025-24893.py http://target:8080
```

---

## ⚙️ Root Cause

* ❌ Improper sanitization of user input
* ❌ Groovy code dynamically evaluated
* Leads to **CWE-94** + **CWE-95** (code generation / eval injection)

---

# 🧭 3. Affected & Fixed Versions

## ❌ Affected Versions

| 📦 XWiki Version Line | ⛔ Vulnerable Range        |
| --------------------- | ------------------------- |
| 5.x → 15.x            | 5.3-milestone2 → 15.10.10 |
| 16.x                  | 16.0.0-RC1 → 16.4.0       |

## ✅ Fixed Versions

| 🎯 Safe Version | Notes             |
| --------------- | ----------------- |
| 15.10.11        | LTS fixed version |
| 16.4.1          | Stable branch fix |
| 16.5.0-RC1      | DEV branch fix    |

---

# 🎯 4. Severity — CVSS Breakdown

| Metric              | Value              | Emoji |
| ------------------- | ------------------ | ----- |
| **Score**           | **9.8 (Critical)** | 🔥    |
| Attack Vector       | Network            | 🌐    |
| Attack Complexity   | Low                | 🎯    |
| Privileges Required | None               | 🚫🔑  |
| User Interaction    | None               | 🙅    |
| Confidentiality     | High               | 🔓    |
| Integrity           | High               | ✏️    |
| Availability        | High               | ❗     |

---

# 🧨 5. Exploitation (High-Level Only)

⚠️ No harmful code — just conceptual description.

### 📌 How attackers abuse it

1. Send a crafted request to the **SolrSearch** macro
2. User-controlled text is processed in an unsafe template
3. Groovy expression inside text gets executed
4. Server runs attacker-controlled instructions
5. Attacker drops malware → miners, botnet clients, scripts

### 🛑 What has been seen in the wild

* 🌐 Global scanning for vulnerable XWiki servers
* 🤖 Malware deployment (e.g., cryptominers)
* ⛓️ Multi-stage payload delivery
* 📡 Command execution via template engine

---

# 🛰️ 6. Indicators of Compromise (IOCs)

## 🔍 Suspicious Requests

* Strange parameters inside:

  * `media=rss`
  * Unusual template directives
  * Unexpected macro structures
* High volume of hits to:
  `/xwiki/bin/get/Main/SolrSearch`

## 🧯 System Behavior

| Symptom                              | Meaning                        |
| ------------------------------------ | ------------------------------ |
| 📈 CPU usage spikes                  | Mining activity                |
| 📁 New binaries in `/tmp`            | Payload staging                |
| 🧪 Unknown processes                 | Lateral movement / persistence |
| 🌐 Outbound traffic to strange hosts | Botnet or miner callouts       |

---

# 🛡️ 7. Mitigation Steps

## 🟢 1. Upgrade Immediately

Apply one of:

* **15.10.11**
* **16.4.1**
* **16.5.0-RC1**

## 🟠 2. Temporary Workarounds (Safe Descriptions)

* Restrict anonymous access
* Disable/limit SolrSearch macro if possible
* Apply vendor-provided template hardening
* Add WAF rules blocking invalid template directives

## 🔵 3. Hardening

* Run XWiki under limited OS permissions
* Limit exposure (avoid direct internet access)
* Enable audit logging
* Monitor system for IOCs above

## 🔴 4. After Patching

* Conduct forensic checks:

  * processes 👀
  * crontabs ⏱️
  * `/tmp/` binaries 🗂️
  * outbound connections 🌐

---

# 📚 8. Structured Schemas & Tables

## 📑 Vulnerability Schema

| Field               | Value                  |
| ------------------- | ---------------------- |
| ID                  | CVE-2025-24893         |
| Type                | RCE                    |
| Vector              | Network                |
| Privileges Required | None                   |
| Affected Component  | SolrSearch macro       |
| CWE                 | 94 & 95                |
| Exploitation        | Active                 |
| Impact              | Full system compromise |

---

# 🧷 9. Short Summary (Aesthetic)

⚠️ **CVE-2025-24893** is a critical RCE in XWiki’s SolrSearch macro.
🧨 Attackers can run code without authentication.
🔥 Actively exploited in real-world attacks.
🛡️ Patch immediately to 15.10.11, 16.4.1, or newer.

---

### ⚠️ Disclaimer: 

This information is for defensive and educational purposes only.
文件快照

[4.0K] /data/pocs/203160906dd77cb2355a4de8d5e1854b0c69c78a ├── [4.5K] CVE-2025-24893.py └── [5.3K] README.md 1 directory, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。