Critical Foswiki Vulnerablities: A Logic Error Turned Remote Code Execution 

11. July 2023

Our Pentest Professionals at usd HeroLab love open source software as much as anyone. However, it should be secure as well. This is why Christian Pöschl, Senior Consultant IT Security at usd HeroLab, took a closer look at the open source software "Foswiki" in the context of our mission more security. He identified several vulnerabilities that allowed attackers to inject and execute malicious code remotely (remote code execution).

All vulnerabilities were reported to the developers according to our Responsible Disclosure Policy and were quickly fixed by the release of the TopicInteractionPlugin version 9.20.

Our Pentest Professionals wrote this blog to raise awareness of these attack vectors and to help other IT security professionals and system administrators to identify and fix these vulnerabilities.

A detailed description can be found in our LabNews: https://herolab.usd.de/en/critical-foswiki-vulnerablities-a-logic-error-turned-remote-code-execution/

More details about the identified vulnerabilities can be found here: https://herolab.usd.de/en/security-advisories/

Also interesting:

DORA Deep Dive: Threat-Led Penetration Testing (TLPT)

DORA Deep Dive: Threat-Led Penetration Testing (TLPT)

Since the publication of the original blog post in May 2024, the final version of the RTS for TLPT has been released. The blog post has been updated accordingly and now covers the current requirements. The Digital Operational Resilience Act (DORA) came into force on...

Red Teaming: 5 Questions Every IT Leader Wants Answered

Red Teaming: 5 Questions Every IT Leader Wants Answered

Many companies invest in firewalls, endpoint protection, and awareness training, assuming that this puts them in a strong position. But the reality is different: attackers do not think in terms of tools, but in terms of targets. They combine technical vulnerabilities...

Categories

Categories