CVE-2024-43400

Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection') (CWE-96)

Published: Aug 19, 2024 / Updated: 3mo ago

010
CVSS 5.4EPSS 0.05%Medium
CVE info copied to clipboard

Summary

A vulnerability in XWiki Platform allows a user without Script or Programming rights to craft a URL pointing to a page with arbitrary JavaScript. This requires social engineering to trick a user into following the URL. The vulnerability involves creating a document with a specific name containing JavaScript code, editing the class, adding a string property, and then getting an admin to open a specially crafted URL.

Impact

If successfully exploited, this vulnerability could lead to the execution of arbitrary JavaScript code in the context of a victim's browser. This could result in data theft, manipulation of wiki content, or disruption of the wiki platform's functionality. The attack vector is network-based, with low attack complexity, requiring low privileges and user interaction. The CVSS v3.1 base score is 9.0, indicating a critical severity level. The vulnerability affects confidentiality, integrity, and availability with high impact.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

Patches are available. This vulnerability has been fixed in XWiki versions 14.10.21, 15.5.5, 15.10.6, and 16.0.0. Organizations using XWiki should update to one of these patched versions or later.

Mitigation

1. Update XWiki Platform to one of the patched versions: 14.10.21, 15.5.5, 15.10.6, or 16.0.0. 2. Implement user awareness training to educate users about the risks of clicking on suspicious URLs, especially those related to the wiki platform. 3. Consider implementing additional security controls such as Content Security Policy (CSP) to restrict the execution of arbitrary scripts. 4. Regularly review and restrict user permissions, ensuring the principle of least privilege is followed. 5. Monitor for suspicious activities or unusual URL patterns that might indicate exploitation attempts.

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Timeline

First Article

Feedly found the first article mentioning CVE-2024-43400. See article

Aug 19, 2024 at 5:24 PM / National Vulnerability Database
CVSS Estimate

Feedly estimated the CVSS score as MEDIUM

Aug 19, 2024 at 5:24 PM
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Aug 19, 2024 at 6:11 PM
CVSS

A CVSS base score of 5.4 has been assigned.

Oct 28, 2024 at 9:19 PM / nvd
Static CVE Timeline Graph

Affected Systems

Xwiki/xwiki
+null more

Patches

Github Advisory
+null more

Attack Patterns

CAPEC-35: Leverage Executable Code in Non-Executable Files
+null more

Vendor Advisory

[GHSA-wcg9-pgqv-xm5v] XWiki Platform allows XSS through XClass name in string properties
Reproduction steps As a user without script or programming right, create a (non-terminal) document named " + alert(1) + " (the quotes need to be part of the name). Is it possible for a user without Script or Programming rights to craft a URL pointing to a page with arbitrary JavaScript.

News

CVE-2024-43400
Medium Severity Description XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. It is possible for a user without Script or Programming rights to craft a URL pointing to a page with arbitrary JavaScript. This requires social engineer to trick a user to follow the URL. This has been patched in XWiki 14.10.21, 15.5.5, 15.10.6 and 16.0.0. Read more at https://www.tenable.com/cve/CVE-2024-43400
Two Critical Vulnerabilities Identified in XWiki platform
Classification: Critical, Solution: Official Fix, Exploit Maturity: Proof-of-Concept, CVSSv3.1: 9.1, CVEs: CVE-2024-43400, CVE-2024-43401, Summary: Two different critical vulnerabilities have been identified in the XWiki platform. The vulnerabilities require an attacker to trick a privileged user to perform actions in order to exploit the vulnerabilities. Both vulnerabilities have been patched. For CVE-2024-43401 version 15.10RC1 and later includes a fix and for CVE-2024-43400 versions 14.10.21, 15.5.5, 15.10.6 and 16.0.0 include a fix.
[GHSA-wcg9-pgqv-xm5v] XWiki Platform allows XSS through XClass name in string properties
Reproduction steps As a user without script or programming right, create a (non-terminal) document named " + alert(1) + " (the quotes need to be part of the name). Is it possible for a user without Script or Programming rights to craft a URL pointing to a page with arbitrary JavaScript.
NA - CVE-2024-43400 - XWiki Platform is a generic wiki platform...
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. It is possible for a user without Script or Programming rights to craft a URL pointing to a...
CVE-2024-43400 | xwiki-platform up to 14.10.20/15.5.4/15.10.5 URL neutralization of directives (GHSA-wcg9-pgqv-xm5v)
A vulnerability has been found in xwiki-platform up to 14.10.20/15.5.4/15.10.5 and classified as critical . This vulnerability affects unknown code of the component URL Handler . The manipulation leads to improper neutralization of directives in statically saved code ('static code injection'). This vulnerability was named CVE-2024-43400 . The attack can be initiated remotely. There is no exploit available. It is recommended to upgrade the affected component.
See 5 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:Low
User Interaction:Required
Scope:Changed
Confidentiality:Low
Integrity:Low
Availability Impact:None

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI