First published: Wed Jul 31 2024(Updated: )
### Impact Any user with edit right on any page can perform arbitrary remote code execution by adding instances of `XWiki.SearchSuggestConfig` and `XWiki.SearchSuggestSourceClass` to their user profile or any other page. This compromises the confidentiality, integrity and availability of the whole XWiki installation. To reproduce on an instance, as a user without script nor programming rights, add an object of type `XWiki.SearchSuggestConfig` to your profile page, and an object of type `XWiki.SearchSuggestSourceClass` as well. On this last object, set both `name` and `icon` properties to `$services.logging.getLogger("attacker").error("I got programming: $services.security.authorization.hasAccess('programming')")` and `limit` and `engine` to `{{/html}}{{async}}{{velocity}}$services.logging.getLogger("attacker").error("I got programming: $services.security.authorization.hasAccess('programming')"){{/velocity}}{{/async}}`. Save and display the page. If the logs contain any message `ERROR attacker - I got programming: true` then the instance is vulnerable. ### Patches This vulnerability has been patched in XWiki 14.10.21, 15.5.5 and 15.10.2. ### Workarounds We're not aware of any workaround except upgrading. ### References - https://jira.xwiki.org/browse/XWIKI-21473 - https://github.com/xwiki/xwiki-platform/commit/742cd4591642be4cdcaf68325f17540e0934e64e
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.xwiki.platform:xwiki-platform-search-ui | >=15.6-rc-1<15.10.2 | 15.10.2 |
maven/org.xwiki.platform:xwiki-platform-search-ui | >=15.0-rc-1<15.5.5 | 15.5.5 |
maven/org.xwiki.platform:xwiki-platform-search-ui | >=9.2-rc-1<14.10.21 | 14.10.21 |
Xwiki | >=9.2<14.10.21 | |
Xwiki | >=15.0<15.5.5 | |
Xwiki | >=15.6<15.10.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-37901 has a critical severity due to the potential for arbitrary remote code execution.
To mitigate CVE-2024-37901, update the affected XWiki packages to versions 15.10.2, 15.5.5, or 14.10.21.
CVE-2024-37901 affects XWiki versions between 9.2 and 15.10.2 of the xwiki-platform-search-ui.
CVE-2024-37901 can enable attackers to perform arbitrary remote code execution and compromise system integrity.
Any user with edit rights on XWiki pages is at risk of exploitation from CVE-2024-37901.