CVE-2024-41947

Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) (CWE-80)

Published: Jul 31, 2024 / Updated: 3mo ago

010
CVSS 5.4EPSS 0.05%Medium
CVE info copied to clipboard

Summary

XWiki Platform, a generic wiki platform offering runtime services for applications, contains a vulnerability that allows the execution of JavaScript snippets on the side of another user with more rights. This is achieved by creating a conflict when the user with higher privileges is currently editing a page. The vulnerability can be reproduced when a user with admin rights edits a document without saving immediately. Then, another user with only edit rights on that specific document can change the entire content to a malicious script. When the admin user saves the document, a conflict popup appears, and if they select "Fix each conflict individually," the malicious script is executed.

Impact

This vulnerability compromises the confidentiality, integrity, and availability of the entire XWiki installation. The attack vector is network-based, requires low privileges and user interaction, but has a low attack complexity. The impact on confidentiality, integrity, and availability is high, and the scope is changed. With a CVSS v3.1 base score of 9.0, this vulnerability is considered critical. Potential attacks could lead to unauthorized access to sensitive information, manipulation of wiki content, and disruption of the XWiki service.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

This vulnerability has been patched. The fix is available in XWiki versions 15.10.8 and 16.3.0RC1 or later.

Mitigation

To mitigate this vulnerability, it is strongly recommended to update XWiki Platform to version 15.10.8 or 16.3.0RC1 or later. If immediate patching is not possible, consider implementing additional access controls, monitoring for suspicious editing conflicts, and restricting network access to the XWiki platform to trusted users only.

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Timeline

CVE Assignment

NVD published the first details for CVE-2024-41947

Jul 31, 2024 at 4:15 PM
CVSS

A CVSS base score of 9 has been assigned.

Jul 31, 2024 at 4:20 PM / nvd
First Article

Feedly found the first article mentioning CVE-2024-41947. See article

Jul 31, 2024 at 4:24 PM / National Vulnerability Database
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Jul 31, 2024 at 4:24 PM
EPSS

EPSS Score was set to: 0.05% (Percentile: 16.2%)

Aug 1, 2024 at 9:46 AM
CVSS

A CVSS base score of 5.4 has been assigned.

Sep 6, 2024 at 8:50 PM / nvd
Static CVE Timeline Graph

Affected Systems

Xwiki/xwiki
+null more

Patches

Github Advisory
+null more

Attack Patterns

CAPEC-18: XSS Targeting Non-Script Elements
+null more

Vendor Advisory

[GHSA-692v-783f-mg8x] XWiki Platform vulnerable to Cross-Site Scripting (XSS) through conflict resolution
To reproduce on a XWiki instance, a user with admin rights needs to edit a document without saving right away. To reproduce on a XWiki instance, a user with admin rights needs to edit a document without saving right away.

News

US-CERT Vulnerability Summary for the Week of July 29, 2024
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available. Vulnerabilities are based on the Common Vulnerabilities and Exposures (CVE) vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores: High : vulnerabilities with a CVSS base score of 7.0–10.0 Medium : vulnerabilities with a CVSS base score of 4.0–6.9 Low : vulnerabilities with a CVSS base score of 0.0–3.9 Entries may include additional information provided by organizations and efforts sponsored by CISA. This information may include identifying information, values, definitions, and related links.
Vulnerability Summary for the Week of July 29, 2024
High Vulnerabilities Primary Vendor -- Product Description Published CVSS Score Source & Patch Info Apache Software Foundation--Apache SeaTunnel Web Web Authentication vulnerability in Apache SeaTunnel. Since the jwt key is hardcoded in the application, an attacker can forge any token to log in any user. Attacker can get secret key in /seatunnel-server/seatunnel-app/src/main/resources/application.yml and then create a token. This issue affects Apache SeaTunnel: 1.0.0. Users are recommended to upgrade to version 1.0.1, which fixes the issue. 2024-07-30 9.1 CVE-2023-48396 security@apache.org security@apache.org n/a--n/a An issue was discovered in Italtel i-MCS NFV 12.1.0-20211215. There is Incorrect Access Control. 2024-07-29 9.1 CVE-2024-28805 cve@mitre.org n/a--n/a Prototype pollution in allpro form-manager 0.7.4 allows attackers to run arbitrary code and cause other impacts via the functions setDefaults, mergeBranch, and Object.setObjectValue. 2024-07-30 9.8 CVE-2024-36572 cve@mitre.org cve@mitre.org n/a--n/a SQL Injection vulnerability in Lost and Found Information System 1.0 allows a remote attacker to escalate privileges via the id parameter to php-lfis/admin/categories/manage_category.php.
Update Wed Jul 31 22:29:12 UTC 2024
Update Wed Jul 31 22:29:12 UTC 2024
NA - CVE-2024-41947 - XWiki Platform is a generic wiki platform...
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. By creating a conflict when another user with more rights is currently editing a page, it is...
CVE-2024-41947
Critical Severity Description XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. By creating a conflict when another user with more rights is currently editing a page, it is possible to execute JavaScript snippets on the side of the other user, which compromises the confidentiality, integrity and availability of the whole XWiki installation. This has been patched in XWiki 15.10.8 and 16.3.0RC1. Read more at https://www.tenable.com/cve/CVE-2024-41947
See 7 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:Low
User Interaction:Required
Scope:Changed
Confidentiality:Low
Integrity:Low
Availability Impact:None

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI