Conversation
leonardo-doyensec
left a comment
There was a problem hiding this comment.
Hello @a3vX.
Thank you for your contribution. You can find an issue to address down below. Moreover i have noticed that when the plugin is running it produces really verbose logs. Are you able to limit this?
Feel free to reach out
~ Leonardo (Doyensec)
templated/templateddetector/plugins/cve/2025/XWiki_CVE_2025_24893.textproto
Show resolved
Hide resolved
|
Dear @leonardo-doyensec, Thanks for your message. I added a new commit following your comment. I've checked the new plugin version against the following versions.
About the log verbosity, I also see some INFO log entries, one for each HTTP request sent and response received. However, I don't see how I could change this behavior in the plugin textproto file. From what I understand, the For reference, here are my logs when running the plugin on XWiki 11.6 vulnerable instance: Feel free to ask if any other change is needed. ~a3vX |
|
Dear @tooryx and @leonardo-doyensec , Do you need anything else from my end to review this pull request? Thanks by advance! --a3vX |
|
Hi @a3vX, Nothing is needed on your side for now. Thank you, |
|
LGTM Reviewer: Leonardo, Doyensec |
-- ce72d5a by a3vX <a3vX@users.noreply.github.com>: Add: new plugin XWiki_CVE_2025_24893 -- cb01fc5 by a3vX <a3vX@users.noreply.github.com>: Edit plugin XWiki_CVE_2025_24893: fingerprinting action -- 60ca5d3 by tooryx <1128705+tooryx@users.noreply.github.com>: Remove trailing spaces -- 23a1c92 by tooryx <1128705+tooryx@users.noreply.github.com>: Replace tabs with spaces COPYBARA_INTEGRATE_REVIEW=#689 from a3vX:XWiki_CVE_2025_24893 23a1c92 PiperOrigin-RevId: 831761966 Change-Id: Ic1b9bb32ce46790e329533fd27168182bc5ec5f8
|
Change merged. You should receive information about the reward in a few days. Thank you, |
Dear Tsunami Team,
Please find the PR related to #666.
Testbeds are available here: google/security-testbeds#159
The plugin has been tested for the following versions:
As shown in the table above, the payload works for XWiki > 11.6 (published in 2019), which is the version introducing the
{{async}}macro used in the payload.Additionally, the plugin's payload will only detect this RCE if the remote operating system is Linux.
For reference, the following generic payload can be used to minimize false negatives: