CVE-2024-31985: XWiki Platform CSRF in the job scheduler
It is possible to schedule/trigger/unschedule existing jobs by having an admin visit the Job Scheduler page through a predictable URL, for example by embedding such an URL in any content as an image.
To reproduce in an XWiki installation, open <xwiki-host>:/xwiki/bin/view/Scheduler/?do=trigger&which=Scheduler.NotificationEmailDailySender
as a user with admin rights. If there is no error message that indicates the CSRF token is invalid, the installation is vulnerable.
References
- github.com/advisories/GHSA-j2r6-r929-v6gf
- github.com/xwiki/xwiki-platform
- github.com/xwiki/xwiki-platform/commit/8a92cb4bef7e5f244ae81eed3e64fe9be95827cf
- github.com/xwiki/xwiki-platform/commit/efd3570f3e5e944ec0ad0899bf799bf9563aef87
- github.com/xwiki/xwiki-platform/commit/f16ca4ef1513f84ce2e685d4a05d689bd3a2ab4c
- github.com/xwiki/xwiki-platform/commit/f30d9c641750a3f034b5910c6a3a7724ae8f2269
- github.com/xwiki/xwiki-platform/security/advisories/GHSA-j2r6-r929-v6gf
- jira.xwiki.org/browse/XWIKI-20851
- nvd.nist.gov/vuln/detail/CVE-2024-31985
Detect and mitigate CVE-2024-31985 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →