Lucene search

K
cve[email protected]CVE-2022-24897
HistoryMay 02, 2022 - 10:15 p.m.

CVE-2022-24897

2022-05-0222:15:09
CWE-22
web.nvd.nist.gov
591
cve
2022
24897
velocity
api
security vulnerability
patch
java file api
xwiki
scripting
filesystem

6 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

59.2%

APIs to evaluate content with Velocity is a package for APIs to evaluate content with Velocity. Starting with version 2.3 and prior to 12.6.7, 12.10.3, and 13.0, the velocity scripts are not properly sandboxed against using the Java File API to perform read or write operations on the filesystem. Writing an attacking script in Velocity requires the Script rights in XWiki so not all users can use it, and it also requires finding an XWiki API which returns a File. The problem has been patched in versions 12.6.7, 12.10.3, and 13.0. There is no easy workaround for fixing this vulnerability other than upgrading and being careful when giving Script rights.

Affected configurations

Vulners
NVD
Node
xwikicommonsRange2.312.6.7
OR
xwikicommonsRange<12.10.3
VendorProductVersionCPE
xwikicommons*cpe:2.3:a:xwiki:commons:*:*:*:*:*:*:*:*
xwikicommons*cpe:2.3:a:xwiki:commons:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "xwiki-commons",
    "vendor": "xwiki",
    "versions": [
      {
        "status": "affected",
        "version": ">= 2.3, < 12.6.7"
      },
      {
        "status": "affected",
        "version": "12.7-rc-1, < 12.10.3"
      }
    ]
  }
]

6 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

59.2%

Related for CVE-2022-24897