Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-37914
HistoryAug 17, 2023 - 5:21 p.m.

CVE-2023-37914 Privilege escalation (PR)/RCE from account through Invitation subject/message

2023-08-1717:21:23
CWE-94
GitHub_M
www.cve.org
xwiki platform
arbitrary script macros
remote code execution
patched vulnerability
upgrade
manual patching.

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L

10 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

75.8%

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user who can view Invitation.WebHome can execute arbitrary script macros including Groovy and Python macros that allow remote code execution including unrestricted read and write access to all wiki contents. This vulnerability has been patched on XWiki 14.4.8, 15.2-rc-1, and 14.10.6. Users are advised to upgrade. Users unable to upgrade may manually apply the patch on Invitation.InvitationCommon and Invitation.InvitationConfig, but there are otherwise no known workarounds for this vulnerability.

CNA Affected

[
  {
    "vendor": "xwiki",
    "product": "xwiki-platform",
    "versions": [
      {
        "version": ">= 2.5-m1, < 14.4.8",
        "status": "affected"
      },
      {
        "version": ">= 14.5.0, < 14.10.6",
        "status": "affected"
      },
      {
        "version": ">= 15.0, < 15.2-rc-1",
        "status": "affected"
      }
    ]
  }
]

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L

10 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

75.8%

Related for CVELIST:CVE-2023-37914