Lucene search

K
osvGoogleOSV:GHSA-9CQM-5WF7-WCJ7
HistoryMar 03, 2023 - 10:49 p.m.

XWiki Platform users may execute anything with superadmin right through comments and async macro

2023-03-0322:49:37
Google
osv.dev
3
xwiki
platform
vulnerability
superadmin
macro
patch
workaround
jira
security ml
comments
execute
impact

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

7.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

46.4%

Impact

Comments are supposed to be executed with the right of superadmin but in restricted mode (anything dangerous is disabled) but the async macro is not taking into account the restricted mode.

This means that any user with comment right can use the async macro to make it execute any wiki content with the right of superadmin as in:

{{async}}
{{groovy}}println “it works !”{{/groovy}}
{{/async}}

Patches

This has been patched in XWiki 14.9, 14.4.6, and 13.10.10.

Workarounds

The only known workaround consists in applying the following patch and rebuilding and redeploying org.xwiki.platform:xwiki-platform-rendering-async-macro.

References

For more information

If you have any questions or comments about this advisory:

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

7.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

46.4%

Related for OSV:GHSA-9CQM-5WF7-WCJ7