Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-55877— XWiki allows remote code execution from account through macro descriptions and XWiki.XWikiSyntaxMacrosList

CVSS 10.0 · Critical EPSS 33.39% · P97
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-55877

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
XWiki allows remote code execution from account through macro descriptions and XWiki.XWikiSyntaxMacrosList
Source: NVD (National Vulnerability Database)
Vulnerability Description
XWiki Platform is a generic wiki platform. Starting in version 9.7-rc-1 and prior to versions 15.10.11, 16.4.1, and 16.5.0, any user with an account can perform arbitrary remote code execution by adding instances of `XWiki.WikiMacroClass` to any page. This compromises the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been fixed in XWiki 15.10.11, 16.4.1 and 16.5.0. It is possible to manually apply the patch to the page `XWiki.XWikiSyntaxMacrosList` as a workaround.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
静态存储代码中指令转义处理不恰当(静态代码注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
XWiki Platform 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
XWiki Platform是XWiki开源的一套用于创建Web协作应用程序的Wiki平台。 XWiki Platform存在安全漏洞,该漏洞源于任何拥有帐户的用户都可以通过向任何页面添加XWiki.WikiMacroClass实例来执行任意远程代码执行。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
xwikixwiki-platform >= 9.7-rc-1, < 15.10.11 -

II. Public POCs for CVE-2024-55877

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-55877

登录查看更多情报信息。

Same Patch Batch · xwiki · 2024-12-12 · 5 CVEs total

CVE-2024-5566210.0 CRITICALXWiki allows remote code execution through the extension sheet
CVE-2024-558799.1 CRITICALXWiki allows RCE from script right in configurable sections
CVE-2024-55663XWiki Platform has an SQL injection in getdocuments.vm with sort parameter
CVE-2024-55876XWiki's scheduler in subwiki allows scheduling operations for any main wiki user

IV. Related Vulnerabilities

V. Comments for CVE-2024-55877

No comments yet


Leave a comment