Tried, Tested and Proven

Vulnerability title: Remote Code Execution In Fitnesse Wiki

CVE: CVE-2014-1216
Vendor: Fitnesse
Product: Wiki
Affected version: v20131110 and earlier
Fixed version: N/A
Reported by: Jerzy Kramarz


The Fitnesse wiki does not validate the syntax of edited pages to validate whether the pages are introducing any extra parameters that could be executed in the context of the application. This vulnerability could be exploited by remote attackers to introduce external commands into the workflow of the application that would execute them.

After creating a new page in the wiki (or editing already existing page) sending a request similar to below would trigger the vulnerability:

Host: :
Proxy-Connection: keep-alive
Content-Length: 374
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Origin: http://:
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/30.0.1599.101 Safari/537.36
Content-Type: application/x-www-form-urlencoded
DNT: 1
Referer: http://:/?edit
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Cookie: textwrapon=false; wysiwyg=textarea


After editing the page with content specified above, the vulnerability could be triggered by visiting ‘http://: /?test’


Complete loss of confidentiality and integrity of the affected system.


Exploit code is not required.

Vendor status:

23/11/2013 Advisory created
25/11/2013 Vendor contacted
03/01/2014 Vendor contact reattempted
14/01/2014 CVE obtained
17/02/2014 Vendor contact reattempted
25/02/2014 Published

Copyright © Portcullis Computer Security Limited 2014, All rights reserved worldwide. Permission is hereby granted for the electronic redistribution of this information. It is not to be edited or altered in any way without the express written consent of Portcullis Computer Security Limited.


The information herein contained may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user’s risk. In no event shall the author/distributor (Portcullis Computer Security Limited) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.