logo

CVE-2023-29515 org.xwiki.platform:xwiki-platform-appwithinminutes

Package

Manager: maven
Name: org.xwiki.platform:xwiki-platform-appwithinminutes
Vulnerable Version: >=4.0-milestone-2 <4.2-milestone-1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.01341 pctl0.79256

Details

XWiki App Within Minutes app grants space admin rights that allows cross-site scripting ### Impact Any user who can create a space can become admin of that space through App Within Minutes. The admin right implies the script right and thus allows JavaScript injection. The vulnerability can be exploited by creating an app in App Within Minutes. If the button should be disabled because the user doesn't have global edit right, the app can also be created by directly opening `/xwiki/bin/view/AppWithinMinutes/CreateApplication?wizard=true` on the XWiki installation. ### Patches This has been patched in XWiki 13.10.11, 14.4.8, 14.10.1 and 15.0 RC1 by not granting the space admin right if the user doesn't have script right on the space where the app is created. Error message are displayed to warn the user that the app will be broken in this case. Users who became space admin through this vulnerability won't loose the space admin right due to the fix, so it is advised to check if all users who created AWM apps should keep their space admin rights. ### Workarounds The patch can be applied by patching the affected wiki documents, the most important one being `AppWithinMinutes.LiveTableEditSheet`. Further, the attack can be prevented by denying view access to `AppWithinMinutes.LiveTableEditSheet`. This only impacts creation and editing of App Within Minutes apps. ### References * https://jira.xwiki.org/browse/XWIKI-20190 * https://github.com/xwiki/xwiki-platform/commit/e73b890623efa604adc484ad82f37e31596fe1a6 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)

Metadata

Created: 2023-04-20T21:58:10Z
Modified: 2023-04-28T20:05:14Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/04/GHSA-44h9-xxvx-pg6x/GHSA-44h9-xxvx-pg6x.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-44h9-xxvx-pg6x
Finding: F425
Auto approve: 1