Lucene search

K
osvGoogleOSV:GHSA-859X-P6JP-RC2W
HistoryMar 03, 2023 - 10:54 p.m.

xwiki contains Incorrect Authorization

2023-03-0322:54:19
Google
osv.dev
5
xwiki
authorization
vulnerability
patched
security advisory

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

7.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

35.2%

Impact

It’s possible to execute a script with the right of another user (provided the target user does not have programming right).

For example, the following:

{{context document="xwiki:XWiki.userwithscriptright" transformationContext="document"}}{{velocity}}Hello from Velocity!{{/velocity}}{{/context}}

written by a user not having script right (for example in the user’s profile) should produce an error (the user is not allowed to write scripts). However, because of the vulnerability, if the author of the document “xwiki:XWiki.userwithscriptright” has script right (but not programming right) the script will be executed with as if it was written by the target user.

Patches

The problem has been patched in XWiki 14.8RC1, 14.4.5 and 13.10.10.

Workarounds

There’s no workaround for this issue.

References

https://jira.xwiki.org/browse/XWIKI-19856

For more information

If you have any questions or comments about this advisory:

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

7.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

35.2%

Related for OSV:GHSA-859X-P6JP-RC2W