Lucene search

K
githubGitHub Advisory DatabaseGHSA-36FM-J33W-C25F
HistoryMay 11, 2023 - 8:36 p.m.

Privilege escalation (PR)/RCE from account through class sheet

2023-05-1120:36:59
CWE-863
GitHub Advisory Database
github.com
4
privilege escalation
rce
xwiki
documentsheetbinding
groovy
patched
security advisory

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

59.6%

Impact

It’s possible for a user to execute anything with the right of the author of the XWiki.ClassSheet document.

Steps to Reproduce:

  1. Edit your user profile with the object editor and add an object of type DocumentSheetBinding with value Default Class Sheet
  2. Edit your user profile with the wiki editor and add the syntax {{async}}{{groovy}}println("Hello " + "from groovy!"){{/groovy}}{{/async}}
  3. Click “Save & View”

Expected result:

An error is displayed as the user doesn’t have the right to execute the Groovy macro.

Actual result:

The text “Hello from groovy!” is displayed at the top of the document.

Patches

This has been patched in XWiki 15.0-rc-1 and 14.10.4.

Workarounds

There are no known workarounds for it.

References

https://jira.xwiki.org/browse/XWIKI-20566
https://github.com/xwiki/xwiki-platform/commit/de72760d4a3e1e9be64a10660a0c19e9534e2ec4

For more information

If you have any questions or comments about this advisory:

Affected configurations

Vulners
Node
org.xwiki.platform\xwikiMatchplatform
OR
org.xwiki.platform\xwikiMatchplatform

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

59.6%

Related for GHSA-36FM-J33W-C25F