2024-04-10 22:03:27 +00:00
{
"id" : "CVE-2024-31986" ,
"sourceIdentifier" : "security-advisories@github.com" ,
"published" : "2024-04-10T21:15:06.917" ,
2025-01-21 17:04:09 +00:00
"lastModified" : "2025-01-21T15:43:52.013" ,
"vulnStatus" : "Analyzed" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2024-04-10 22:03:27 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "XWiki Platform is a generic wiki platform. Starting in version 3.1 and prior to versions 4.10.19, 15.5.4, and 15.10-rc-1, by creating a document with a special crafted documented reference and an `XWiki.SchedulerJobClass` XObject, it is possible to execute arbitrary code on the server whenever an admin visits the scheduler page or the scheduler page is referenced, e.g., via an image in a comment on a page in the wiki. The vulnerability has been fixed in XWiki 14.10.19, 15.5.5, and 15.9. As a workaround, apply the patch manually by modifying the `Scheduler.WebHome` page."
2024-04-14 02:03:27 +00:00
} ,
{
"lang" : "es" ,
"value" : "XWiki Platform es una plataforma wiki gen\u00e9rica. A partir de la versi\u00f3n 3.1 y anteriores a las versiones 4.10.19, 15.5.4 y 15.10-rc-1, al crear un documento con una referencia documentada especialmente manipulada y un XObject `XWiki.SchedulerJobClass`, es posible ejecutar c\u00f3digo arbitrario en el servidor cada vez que un administrador visita la p\u00e1gina del programador o se hace referencia a la p\u00e1gina del programador, por ejemplo, a trav\u00e9s de una imagen en un comentario en una p\u00e1gina de la wiki. La vulnerabilidad se solucion\u00f3 en XWiki 14.10.19, 15.5.5 y 15.9. Como workaround, aplique el parche manualmente modificando la p\u00e1gina `Scheduler.WebHome`."
2024-04-10 22:03:27 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "security-advisories@github.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 9.0 ,
"baseSeverity" : "CRITICAL" ,
2024-04-10 22:03:27 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "REQUIRED" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2024-04-10 22:03:27 +00:00
} ,
"exploitabilityScore" : 2.3 ,
"impactScore" : 6.0
2025-01-21 17:04:09 +00:00
} ,
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" ,
"baseScore" : 8.8 ,
"baseSeverity" : "HIGH" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "REQUIRED" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 5.9
2024-04-10 22:03:27 +00:00
}
]
} ,
"weaknesses" : [
{
"source" : "security-advisories@github.com" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
2024-12-08 03:06:42 +00:00
"value" : "CWE-95"
2024-04-10 22:03:27 +00:00
} ,
{
"lang" : "en" ,
2024-12-08 03:06:42 +00:00
"value" : "CWE-352"
2024-04-10 22:03:27 +00:00
}
]
2025-01-21 17:04:09 +00:00
} ,
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-352"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "3.1.1" ,
"versionEndExcluding" : "14.10.19" ,
"matchCriteriaId" : "416D6CB0-EB32-45AC-B541-C081EC033EAF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.0" ,
"versionEndExcluding" : "15.5.4" ,
"matchCriteriaId" : "C15AC764-BCCE-4AF3-98F5-28EC637500A4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "15.6" ,
"versionEndExcluding" : "15.9" ,
"matchCriteriaId" : "3E8A87CB-01A7-4C55-99FF-93FAAC70532B"
}
]
}
]
2024-04-10 22:03:27 +00:00
}
] ,
"references" : [
{
"url" : "https://github.com/xwiki/xwiki-platform/commit/8a92cb4bef7e5f244ae81eed3e64fe9be95827cf" ,
2025-01-21 17:04:09 +00:00
"source" : "security-advisories@github.com" ,
"tags" : [
"Patch"
]
2024-04-10 22:03:27 +00:00
} ,
{
"url" : "https://github.com/xwiki/xwiki-platform/commit/efd3570f3e5e944ec0ad0899bf799bf9563aef87" ,
2025-01-21 17:04:09 +00:00
"source" : "security-advisories@github.com" ,
"tags" : [
"Patch"
]
2024-04-10 22:03:27 +00:00
} ,
{
"url" : "https://github.com/xwiki/xwiki-platform/commit/f30d9c641750a3f034b5910c6a3a7724ae8f2269" ,
2025-01-21 17:04:09 +00:00
"source" : "security-advisories@github.com" ,
"tags" : [
"Patch"
]
2024-04-10 22:03:27 +00:00
} ,
{
"url" : "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-37m4-hqxv-w26g" ,
2025-01-21 17:04:09 +00:00
"source" : "security-advisories@github.com" ,
"tags" : [
"Vendor Advisory"
]
2024-04-10 22:03:27 +00:00
} ,
{
"url" : "https://jira.xwiki.org/browse/XWIKI-21416" ,
2025-01-21 17:04:09 +00:00
"source" : "security-advisories@github.com" ,
"tags" : [
"Exploit" ,
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://github.com/xwiki/xwiki-platform/commit/8a92cb4bef7e5f244ae81eed3e64fe9be95827cf" ,
2025-01-21 17:04:09 +00:00
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://github.com/xwiki/xwiki-platform/commit/efd3570f3e5e944ec0ad0899bf799bf9563aef87" ,
2025-01-21 17:04:09 +00:00
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://github.com/xwiki/xwiki-platform/commit/f30d9c641750a3f034b5910c6a3a7724ae8f2269" ,
2025-01-21 17:04:09 +00:00
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-37m4-hqxv-w26g" ,
2025-01-21 17:04:09 +00:00
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://jira.xwiki.org/browse/XWIKI-21416" ,
2025-01-21 17:04:09 +00:00
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Vendor Advisory"
]
2024-04-10 22:03:27 +00:00
}
]
}