Lucene search

K
cveGitHub_MCVE-2023-26055
HistoryMar 02, 2023 - 7:15 p.m.

CVE-2023-26055

2023-03-0219:15:10
CWE-150
GitHub_M
web.nvd.nist.gov
35
xwiki commons
code injection
user profile
short text properties
security patch
cve-2023-26055
nvd

CVSS3

9.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

9.3

Confidence

High

EPSS

0.001

Percentile

51.5%

XWiki Commons are technical libraries common to several other top level XWiki projects. Starting in version 3.1-milestone-1, any user can edit their own profile and inject code, which is going to be executed with programming right. The same vulnerability can also be exploited in all other places where short text properties are displayed, e.g., in apps created using Apps Within Minutes that use a short text field. The problem has been patched on versions 13.10.9, 14.4.4, 14.7RC1.

Affected configurations

Nvd
Vulners
Node
xwikicommonsRange3.213.10.9
OR
xwikicommonsRange14.414.4.4
OR
xwikicommonsRange14.514.7
OR
xwikicommonsMatch3.1milestone1
OR
xwikicommonsMatch3.1milestone2
OR
xwikicommonsMatch3.1.1
OR
xwikicommonsMatch14.4rc1
VendorProductVersionCPE
xwikicommons*cpe:2.3:a:xwiki:commons:*:*:*:*:*:*:*:*
xwikicommons3.1cpe:2.3:a:xwiki:commons:3.1:milestone1:*:*:*:*:*:*
xwikicommons3.1cpe:2.3:a:xwiki:commons:3.1:milestone2:*:*:*:*:*:*
xwikicommons3.1.1cpe:2.3:a:xwiki:commons:3.1.1:*:*:*:*:*:*:*
xwikicommons14.4cpe:2.3:a:xwiki:commons:14.4:rc1:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "xwiki",
    "product": "xwiki-commons",
    "versions": [
      {
        "version": ">= 3.1-milestone-1, < 13.10.9",
        "status": "affected"
      },
      {
        "version": ">= 14.0-rc-1, < 14.4.4",
        "status": "affected"
      },
      {
        "version": ">= 14.5, < 14.7-rc-1",
        "status": "affected"
      }
    ]
  }
]

CVSS3

9.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

9.3

Confidence

High

EPSS

0.001

Percentile

51.5%

Related for CVE-2023-26055