Critical Foswiki Vulnerablities: A Logic Error Turned Remote Code Execution 

11. Juli 2023

Our Pentest Professionals at usd HeroLab love open source software as much as anyone. However, it should be secure as well. This is why Christian Pöschl, Senior Consultant IT Security at usd HeroLab, took a closer look at the open source software "Foswiki" in the context of our mission more security. He identified several vulnerabilities that allowed attackers to inject and execute malicious code remotely (remote code execution).

All vulnerabilities were reported to the developers according to our Responsible Disclosure Policy and were quickly fixed by the release of the TopicInteractionPlugin version 9.20.

Our Pentest Professionals wrote this blog to raise awareness of these attack vectors and to help other IT security professionals and system administrators to identify and fix these vulnerabilities.

A detailed description can be found in our LabNews: https://herolab.usd.de/en/critical-foswiki-vulnerablities-a-logic-error-turned-remote-code-execution/

More details about the identified vulnerabilities can be found here: https://herolab.usd.de/en/security-advisories/

Also interesting:

7 Questions about the Cyber Resilience Act (CRA) 

7 Questions about the Cyber Resilience Act (CRA) 

1. What is the Cyber Resilience Act?   With the Cyber Resilience Act (CRA for short), the EU is introducing a regulation for the first time that aims to improve the cybersecurity and resilience of products with digital elements. Unlike an EU directive, the...

Security Advisory on Element Android

Security Advisory on Element Android

The pentest professionals at usd HeroLab examined the Element application for Android during their pentests. They identified a vulnerability in the PIN protection. Under certain circumstances, the user is not logged out if he enters the wrong PIN more than the...

Categories

Categories