Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-43401
HistoryAug 19, 2024 - 4:24 p.m.

CVE-2024-43401 In XWiki Platform, payloads stored in content is executed when a user with script/programming right edit them

2024-08-1916:24:29
CWE-269
GitHub_M
github.com
6
xwiki platform
payloads
content execution
user rights
wysiwyg editor
warning
patch

CVSS3

9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

AI Score

7.1

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. A user without script/programming right can trick a user with elevated rights to edit a content with a malicious payload using a WYSIWYG editor. The user with elevated rights is not warned beforehand that they are going to edit possibly dangerous content. The payload is executed at edit time. This vulnerability has been patched in XWiki 15.10RC1.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:xwiki:xwiki-platform:*:*:*:*:*:*:*:*"
    ],
    "vendor": "xwiki",
    "product": "xwiki-platform",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "15.10-rc-1",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

AI Score

7.1

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-43401