CVE-2023-26475 – org.xwiki.platform:xwiki-platform-annotation-ui
Package
Manager: maven
Name: org.xwiki.platform:xwiki-platform-annotation-ui
Vulnerable Version: >=2.3-milestone-1 <13.10.11 || >=14.0-rc-1 <14.4.7 || >=14.5 <14.10
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
EPSS: 0.2936 pctl0.96436
Details
xwiki-platform vulnerable to Remote Code Execution in Annotations ### Impact The annotation displayer does not execute the content in a restricted context. This allows executing anything with the right of the author of any document by annotating the document. To reproduce: add an annotation with the content `{{groovy}}print "hello"{{/groovy}}` and click the yellow scare to get a display of the annotation inline. The result is "hello" but it should be an error suggesting that it's not allowed to use the groovy macro. ### Patches This has been patched in XWiki 13.10.11, 14.4.7 and 14.10. ### Workarounds There is no easy workaround except to upgrade. ### References https://jira.xwiki.org/browse/XWIKI-20360 https://jira.xwiki.org/browse/XWIKI-20384 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org) ### Attribution This vulnerability has been reported by René de Sain @renniepak.
Metadata
Created: 2023-03-02T15:16:43Z
Modified: 2023-03-13T19:17:37Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/03/GHSA-h6f5-8jj5-cxhr/GHSA-h6f5-8jj5-cxhr.json
CWE IDs: ["CWE-269", "CWE-270"]
Alternative ID: GHSA-h6f5-8jj5-cxhr
Finding: F159
Auto approve: 1