XWiki Platform, Information Disclosure, CVE-2024-XXXX (Medium)

How the CVE Works

The vulnerability in XWiki Platform (CVE-2024-XXXX) allows unauthorized users to list protected pages via the REST API endpoint /rest/wikis/

/pages</code>, even when they lack view permissions. This occurs in versions before 15.10.14, 16.4.6, and 16.10.0-rc-1. When a wiki is configured with "Prevent unregistered user to view pages", the endpoint still exposes page metadata, potentially leaking sensitive information. The flaw was patched in later versions by implementing proper access control checks.

<h2 style="color: blue;">DailyCVE Form</h2>

Platform: XWiki
Version: <15.10.14, <16.4.6, <16.10.0
Vulnerability: Information Disclosure
Severity: Medium
Date: 2024-XX-XX
<h2 style="color: blue;">What Undercode Say:</h2>

<h2 style="color: blue;">Exploitation:</h2>

<h2 style="color: blue;">1. Identify vulnerable XWiki instances:</h2>

[bash]
curl -s "http://target/wiki/rest/wikis/xwiki/pages" | grep ""

2. Check for exposed pages:

wget --quiet -O - "http://target/wiki/rest/wikis/xwiki/pages" | jq '.pageSummaries[].'

Mitigation:

1. Upgrade to patched versions:

For XWiki 15.x:
sudo apt upgrade xwiki -y --version 15.10.14
For XWiki 16.x:
sudo apt upgrade xwiki -y --version 16.4.6

2. Restrict API access:

location /rest/ {
deny all;
allow 192.168.1.0/24;
}

3. Manual workaround (if upgrade not possible):

  • Disable REST API or enforce authentication.
  • Modify `xwiki.cfg` to restrict guest access.

Detection Script (Python):

import requests
target = "http://example.com/wiki/rest/wikis/xwiki/pages"
response = requests.get(target)
if "pageSummaries" in response.text:
print("[!] Vulnerable to CVE-2024-XXXX")

Log Analysis (Post-Attack):

grep "GET /rest/wikis/" /var/log/xwiki/access.log | awk '{print $1}' | sort | uniq -c

Additional Security Measures:

  • Enable XWiki Rights Management for granular permissions.
  • Use Web Application Firewall (WAF) rules to block unauthorized REST requests.
  • Monitor NVD for future XWiki advisories.

(End of Report)

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top