Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-36469
HistoryJun 29, 2023 - 8:38 p.m.

CVE-2023-36469 Code injection through NotificationRSSService in XWiki Platform

2023-06-2920:38:52
CWE-74
GitHub_M
www.cve.org
5
xwiki platform
code injection
notificationrssservice
cve-2023-36469
security patch
script macros
remote code execution
user profile
notification settings
groovy macros
python macros
patching
velocity templates
wiki contents
jar file

CVSS3

9.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

10

Confidence

High

EPSS

0.011

Percentile

84.4%

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user who can edit their own user profile and notification settings can execute arbitrary script macros including Groovy and Python macros that allow remote code execution including unrestricted read and write access to all wiki contents. This has been patched in XWiki 14.10.6 and 15.2RC1. Users are advised to update. As a workaround the main security fix can be manually applied by patching the affected document XWiki.Notifications.Code.NotificationRSSService. This will break the link to the differences, though as this requires additional changes to Velocity templates as shown in the patch. While the default template is available in the instance and can be easily patched, the template for mentions is contained in a .jar-file and thus cannot be fixed without replacing that jar.

CNA Affected

[
  {
    "vendor": "xwiki",
    "product": "xwiki-platform",
    "versions": [
      {
        "version": ">= 9.6-rc-1, < 14.10.6",
        "status": "affected"
      },
      {
        "version": ">= 15.0-rc-1, < 15.2-rc-1",
        "status": "affected"
      }
    ]
  }
]

CVSS3

9.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

10

Confidence

High

EPSS

0.011

Percentile

84.4%

Related for CVELIST:CVE-2023-36469