Miggo Logo

CVE-2024-31984: XWiki Platform: Remote code execution through space title and Solr space facet

10

CVSS Score
3.1

Basic Information

EPSS Score
0.98585%
Published
4/10/2024
Updated
1/21/2025
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.xwiki.platform:xwiki-platform-search-solr-uimaven>= 7.2-rc-1, < 14.10.2014.10.20
org.xwiki.platform:xwiki-platform-search-solr-uimaven>= 15.0-rc-1, < 15.5.415.5.4
org.xwiki.platform:xwiki-platform-search-solr-uimaven>= 15.6-rc-1, < 15.10-rc-115.10-rc-1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from unescaped display of space titles in SolrSpaceFacet.xml Velocity templates. The patch adds $escapetool.xml() wrappers around $spaceDocument.plainTitle and $spaceReference.name, directly addressing code injection via title content. The getSpaceFacetData macro's unescaped output of user-controlled titles is the primary vector, while related macros in the same template likely share the vulnerability pattern. High confidence for explicitly patched locations, medium for adjacent macros where the exploit chain might propagate.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t *y *r**tin* * *o*um*nt wit* * sp**i*lly *r**t** titl*, it is possi*l* to tri***r r*mot* *o** *x**ution in t** (Solr-**s**) s**r** in XWiki. T*is *llows *ny us*r w*o **n **it t** titl* o* * sp*** (*ll us*rs *y ****ult) to *x**ut* *ny *roovy

Reasoning

T** vuln*r**ility st*ms *rom un*s**p** *ispl*y o* sp*** titl*s in SolrSp*******t.xml V*lo*ity t*mpl*t*s. T** p*t** ***s $*s**p*tool.xml() wr*pp*rs *roun* $sp****o*um*nt.pl*inTitl* *n* $sp***R***r*n**.n*m*, *ir**tly ***r*ssin* *o** inj**tion vi* titl*