We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-55876

XWiki's scheduler in subwiki allows scheduling operations for any main wiki user



Description

XWiki Platform is a generic wiki platform. Starting in version 1.2-milestone-2 and prior to versions 15.10.9 and 16.3.0, any user with an account on the main wiki could run scheduling operations on subwikis. To reproduce, as a user on the main wiki without any special right, view the document `Scheduler.WebHome` in a subwiki. Then, click on any operation (*e.g.,* Trigger) on any job. If the operation is successful, then the instance is vulnerable. This has been patched in XWiki 15.10.9 and 16.3.0. As a workaround, those who have subwikis where the Job Scheduler is enabled can edit the objects on `Scheduler.WebPreferences` to match the patch.

Reserved 2024-12-11 | Published 2024-12-12 | Updated 2024-12-13 | Assigner GitHub_M


MEDIUM: 5.4CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L

Problem types

CWE-862: Missing Authorization

Product status

>= 1.2-milestone-2, < 15.10.9
affected

>= 16.0.0-rc-1, < 16.3.0
affected

References

github.com/...atform/security/advisories/GHSA-cwq6-mjmx-47p6

github.com/...ommit/54bcc5a7a2e440cc591b91eece9c13dc0c487331

jira.xwiki.org/browse/XWIKI-21663

cve.org (CVE-2024-55876)

nvd.nist.gov (CVE-2024-55876)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-55876

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.