9.9 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
0.002 Low
EPSS
Percentile
56.7%
It’s possible to execute any wiki content with the right of the TipsPanel author by creating a tip UI extension.
To reproduce:
tip={{async async="true" cached="false" context="doc.reference"}}{{groovy}}println("Hello " + "from groovy!"){{/groovy}}{{/async}}
The groovy macro is executed, after the fix you get an error instead.
This has been patched in XWiki 15.1-rc-1 and 14.10.5.
There are no known workarounds for it.
If you have any questions or comments about this advisory:
github.com/advisories/GHSA-h7cw-44vp-jq7h
github.com/xwiki/xwiki-platform/commit/98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263#diff-4e3467d2ef3871a68b2f910e67cf84531751b32e0126321be83c0f1ed5d90b29L176-R178
github.com/xwiki/xwiki-platform/security/advisories/GHSA-h7cw-44vp-jq7h
jira.xwiki.org/browse/XWIKI-20281
nvd.nist.gov/vuln/detail/CVE-2023-35166