CVE-2023-29519 – org.xwiki.platform:xwiki-platform-attachment-ui
Package
Manager: maven
Name: org.xwiki.platform:xwiki-platform-attachment-ui
Vulnerable Version: >=3.0-rc-1 <13.10.11 || >=14.0-rc-1 <14.4.8 || >=14.5 <14.10.2
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.12215 pctl0.93594
Details
org.xwiki.platform:xwiki-platform-attachment-ui vulnerable to Code Injection ### Impact A registered user can perform remote code execution leading to privilege escalation by injecting the proper code in the "property" field of an attachment selector, as a gadget of their own dashboard. Note that the vulnerability does not impact comments of a wiki. ### Patches The vulnerability has been patched in XWiki 13.10.11, 14.4.8, 14.10.2, 15.0-rc-1. ### Workarounds The problem can be worked around by applying following changes directly in XWiki.AttachmentSelector page: https://github.com/xwiki/xwiki-platform/commit/5e8725b4272cd3e5be09d3ca84273be2da6869c1. ### References * https://jira.xwiki.org/browse/XWIKI-20364 * https://github.com/xwiki/xwiki-platform/commit/5e8725b4272cd3e5be09d3ca84273be2da6869c1 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)
Metadata
Created: 2023-04-20T22:04:49Z
Modified: 2023-04-28T19:57:45Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/04/GHSA-3hjg-cghv-22ww/GHSA-3hjg-cghv-22ww.json
CWE IDs: ["CWE-74"]
Alternative ID: GHSA-3hjg-cghv-22ww
Finding: F184
Auto approve: 1