Lucene search

K
githubGitHub Advisory DatabaseGHSA-JGRG-QVPP-9VWR
HistoryApr 20, 2023 - 10:25 p.m.

XWiki Platform vulnerable to code injection from account through AWM view sheet

2023-04-2022:25:02
CWE-74
GitHub Advisory Database
github.com
15
xwiki platform
code injection
account
awm view sheet
patch
workaround
security advisory

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

51.1%

Impact

Steps to reproduce:

  1. As a user without script or programming right, edit your user profile (or any other document) with the wiki editor and add the content {{groovy}}println("Hello " + "from Groovy!"){{/groovy}}
  2. Edit the document with the object editor and add an object of type AppWithinMinutes.LiveTableClass (no values need to be set, just save)
  3. View the document

Patches

The vulnerability has been patched in XWiki 15.0-rc-1 and 14.10.3.

Workarounds

There is no known workaround.

References

https://jira.xwiki.org/browse/XWIKI-20423

For more information

If you have any questions or comments about this advisory:

Affected configurations

Vulners
Node
org.xwiki.platform\Matchxwiki-platform-appwithinminutes
OR
org.xwiki.platform\Matchxwiki-platform-appwithinminutes

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

51.1%

Related for GHSA-JGRG-QVPP-9VWR