CVE-2022-23616 – org.xwiki.platform:xwiki-platform-administration-ui
Package
Manager: maven
Name: org.xwiki.platform:xwiki-platform-administration-ui
Vulnerable Version: >=3.1-milestone-1 <13.1rc1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.02492 pctl0.8475
Details
Remote code execution in xwiki-platform ### Impact It's possible for an unprivileged user to perform a remote code execution by injecting a groovy script in her own profile and by calling the Reset password feature since the feature is performing a save of the user profile with programming rights in the impacted versions of XWiki. ### Patches The problem has been patched in XWiki 13.1RC1 with a complete refactoring of the Reset password feature. ### Workarounds There's different possible workarounds, all consisting in modifying the XWiki/ResetPassword page. - the Reset password feature can be entirely disabled by deleting the XWiki/ResetPassword page - the script in XWiki/ResetPassword can also be modified or removed: an administrator can replace it with a simple email contact to ask an administrator to reset the password. ### References https://jira.xwiki.org/browse/XWIKI-16661 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira](https://jira.xwiki.org) * Email us at [Security mailing-list](mailto:security@xwiki.org)
Metadata
Created: 2022-02-09T21:32:10Z
Modified: 2022-02-09T21:32:10Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-mgjw-2wrp-r535/GHSA-mgjw-2wrp-r535.json
CWE IDs: ["CWE-74"]
Alternative ID: GHSA-mgjw-2wrp-r535
Finding: F184
Auto approve: 1