9.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
0.004 Low
EPSS
Percentile
72.2%
The Document script API returns directly a DocumentAuthors allowing to set any authors to the document, which in consequence can allow subsequent executions of scripts since this author is used for checking rights.
Example of such attack:
{{velocity}}
$doc.setContent('{{velocity}}$xcontext.context.authorReference{{/velocity}}')
$doc.authors.setContentAuthor('xwiki:XWiki.superadmin')
$doc.getRenderedContent()
{{/velocity}}
The problem has been patched in XWiki 14.10 and 14.4.7 by returning a safe script API.
There no easy workaround apart of upgrading.
If you have any questions or comments about this advisory:
CPE | Name | Operator | Version |
---|---|---|---|
org.xwiki.platform:xwiki-platform-oldcore | lt | 14.4.7 | |
org.xwiki.platform:xwiki-platform-oldcore | lt | 14.10 |