Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-31982 PoC — XWiki Platform 安全漏洞

Source
Associated Vulnerability
Title:XWiki Platform 安全漏洞 (CVE-2024-31982)
Description:XWiki Platform是XWiki基金会的一套用于创建Web协作应用程序的Wiki平台。 XWiki Platform 存在安全漏洞,该漏洞源于 XWiki 的数据库搜索允许通过搜索文本远程执行代码。这允许公共 wiki 的任何访问者或封闭 wiki 的用户远程执行代码,因为默认情况下所有用户都可以访问数据库搜索。
Description
POC for CVE-2024-31982: XWiki Platform Remote Code Execution  > 14.10.20
Readme
# CVE-2024-31982  PoC and Bulk Scanner


![Banner](screens/screen.jpg)

## Overview

POC for CVE-2024-31982: XWiki Platform Remote Code Execution  > 14.10.20. This POC is based on this [security advisory ](https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-2858-8cfx-69m9).


## How to Use

### Single Target Scan

To scan a single target endpoint:
```sh
python CVE-2024-31982.py -u target
```

### Bulk Target Scan
To mass scan bulk targets:
```sh
python cve-2024-31982.py -f targets.txt
```

## Installation

### Minimum Requirements

- Python 3.6 or higher
- `requests` library

### Installing The Script

```sh
git clone https://github.com/bigb0x/CVE-2024-31982.git; cd CVE-2024-31982
```

### Installing Required Packages

Install the required packages using pip:

```sh
pip install requests
```

## Contacts
Get in touch with me if you have any questions or recomendations [M Ali](https://x.com/MohamedNab1l).


## Disclaimer

I like to create my own tools for fun and educational purposes only. I 'm releasing this tool is for educational use only. I do not support or encourage hacking or unauthorized access to any system or network. Please use this tool responsibly and only on systems where you have clear permission to test. You are responsible for any misuse.

## References

- https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-2858-8cfx-69m9
- https://nvd.nist.gov/vuln/detail/CVE-2024-31982
File Snapshot

[4.0K] /data/pocs/a52e7b731204d913acafe2b51b3c59a37acd9551 ├── [5.7K] CVE-2024-31982.py ├── [1.4K] README.md └── [4.0K] screens └── [105K] screen.jpg 1 directory, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.