Remote Code Execution (RCE) Affecting org.xwiki.platform:xwiki-platform-search-ui package, versions [9.2-rc-1,14.10.21) [15.0-rc-1, 15.5.5) [15.6-rc-1, 15.10.2)


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    0.1% (43rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JAVA-ORGXWIKIPLATFORM-7577215
  • published 1 Aug 2024
  • disclosed 31 Jul 2024
  • credit Unknown

How to fix?

Upgrade org.xwiki.platform:xwiki-platform-search-ui to version 14.10.21, 15.5.5, 15.10.2 or higher.

Overview

org.xwiki.platform:xwiki-platform-search-ui is a Platform Search UI which allows searching on the full wiki using wildcards, searching by space, getting search result RSS feeds and more. By default provides a Database-backed search but allows pluging other engines (such as Lucene, Solr and more)

Affected versions of this package are vulnerable to Remote Code Execution (RCE) through the SearchSuggestConfigSheet process, by manipulating the XWiki.SearchSuggestConfig and XWiki.SearchSuggestSourceClass objects to execute malicious Velocity code.

CVSS Scores

version 4.0
version 3.1
Expand this section

Snyk

Recommended
9.2 critical
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Attack Requirements (AT)
    Present
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Confidentiality (VC)
    High
  • Integrity (VI)
    High
  • Availability (VA)
    High
  • Confidentiality (SC)
    None
  • Integrity (SI)
    None
  • Availability (SA)
    None