Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-31981
HistoryApr 10, 2024 - 7:22 p.m.

CVE-2024-31981 XWiki Platform: Privilege escalation (PR) from user registration through PDFClass

2024-04-1019:22:57
CWE-862
GitHub_M
www.cve.org
4
xwiki platform
privilege escalation
pdf export templates
remote code execution
patched
xwiki.pdfclass
administrator
style attribute
upgrading

CVSS3

9.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

9.9

Confidence

High

EPSS

0

Percentile

15.5%

XWiki Platform is a generic wiki platform. Starting in version 3.0.1 and prior to versions 4.10.20, 15.5.4, and 15.10-rc-1, remote code execution is possible via PDF export templates. This vulnerability has been patched in XWiki 14.10.20, 15.5.4 and 15.10-rc-1. If PDF templates are not typically used on the instance, an administrator can create the document XWiki.PDFClass and block its edition, after making sure that it does not contain a style attribute. Otherwise, there are no known workarounds aside from upgrading.

CNA Affected

[
  {
    "vendor": "xwiki",
    "product": "xwiki-platform",
    "versions": [
      {
        "version": ">= 3.0.1, < 14.10.20",
        "status": "affected"
      },
      {
        "version": ">= 15.0-rc-1, < 15.5.4",
        "status": "affected"
      },
      {
        "version": ">= 15.6-rc-1, < 15.10-rc-1",
        "status": "affected"
      }
    ]
  }
]

CVSS3

9.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

9.9

Confidence

High

EPSS

0

Percentile

15.5%

Related for CVELIST:CVE-2024-31981