关联漏洞
标题:
XWiki Platform 安全漏洞
(CVE-2024-31982)
描述:XWiki Platform是XWiki基金会的一套用于创建Web协作应用程序的Wiki平台。 XWiki Platform 存在安全漏洞,该漏洞源于 XWiki 的数据库搜索允许通过搜索文本远程执行代码。这允许公共 wiki 的任何访问者或封闭 wiki 的用户远程执行代码,因为默认情况下所有用户都可以访问数据库搜索。
描述
POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20
介绍
# CVE-2024-31982 PoC and Bulk Scanner

## Overview
POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20. This POC is based on this [security advisory ](https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-2858-8cfx-69m9).
## How to Use
### Single Target Scan
To scan a single target endpoint:
```sh
python CVE-2024-31982.py -u target
```
### Bulk Target Scan
To mass scan bulk targets:
```sh
python cve-2024-31982.py -f targets.txt
```
## Installation
### Minimum Requirements
- Python 3.6 or higher
- `requests` library
### Installing The Script
```sh
git clone https://github.com/bigb0x/CVE-2024-31982.git; cd CVE-2024-31982
```
### Installing Required Packages
Install the required packages using pip:
```sh
pip install requests
```
## Contacts
Get in touch with me if you have any questions or recomendations [M Ali](https://x.com/MohamedNab1l).
## Disclaimer
I like to create my own tools for fun and educational purposes only. I 'm releasing this tool is for educational use only. I do not support or encourage hacking or unauthorized access to any system or network. Please use this tool responsibly and only on systems where you have clear permission to test. You are responsible for any misuse.
## References
- https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-2858-8cfx-69m9
- https://nvd.nist.gov/vuln/detail/CVE-2024-31982
文件快照
[4.0K] /data/pocs/a52e7b731204d913acafe2b51b3c59a37acd9551
├── [5.7K] CVE-2024-31982.py
├── [1.4K] README.md
└── [4.0K] screens
└── [105K] screen.jpg
1 directory, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。