Lucene search

K
githubGitHub Advisory DatabaseGHSA-H6F5-8JJ5-CXHR
HistoryMar 02, 2023 - 3:16 p.m.

xwiki-platform vulnerable to Remote Code Execution in Annotations

2023-03-0215:16:43
CWE-269
CWE-270
GitHub Advisory Database
github.com
12
xwiki-platform
annotations
remote code execution
patched
upgrade
security advisory
renΓ© de sain

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

50.4%

Impact

The annotation displayer does not execute the content in a restricted context. This allows executing anything with the right of the author of any document by annotating the document.

To reproduce: add an annotation with the content {{groovy}}print "hello"{{/groovy}} and click the yellow scare to get a display of the annotation inline.

The result is β€œhello” but it should be an error suggesting that it’s not allowed to use the groovy macro.

Patches

This has been patched in XWiki 13.10.11, 14.4.7 and 14.10.

Workarounds

There is no easy workaround except to upgrade.

References

https://jira.xwiki.org/browse/XWIKI-20360

https://jira.xwiki.org/browse/XWIKI-20384

For more information

If you have any questions or comments about this advisory:

Attribution

This vulnerability has been reported by RenΓ© de Sain @renniepak.

Affected configurations

Vulners
Node
org.xwiki.platform\xwikiMatchplatform
OR
org.xwiki.platform\xwikiMatchplatform
OR
org.xwiki.platform\xwikiMatchplatform
OR
org.xwiki.platform\xwikiMatchplatform

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

50.4%

Related for GHSA-H6F5-8JJ5-CXHR