logo

CVE-2023-29518 org.xwiki.platform:xwiki-platform-invitation-ui

Package

Manager: maven
Name: org.xwiki.platform:xwiki-platform-invitation-ui
Vulnerable Version: >=2.5-m-1 <13.10.11 || >=14.0-rc-1 <14.4.8 || >=14.5 <14.10.1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.02151 pctl0.83592

Details

XWiki Platform vulnerable to privilege escalation from view right using Invitation.InvitationCommon ### Impact Any user with view rights can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of `Invitation.InvitationCommon`. This page is installed by default. See https://jira.xwiki.org/browse/XWIKI-20283 for the reproduction steps. ### Patches The vulnerability has been patched in XWiki 15.0-rc-1, 14.10.1, 14.4.8, and 13.10.11. ### Workarounds The issue can be fixed by applying this [patch](https://github.com/xwiki/xwiki-platform/commit/3d055a0a5ec42fdebce4d71ee98f94553fdbfebf) on `Invitation.InvitationCommon`. ### References - https://github.com/xwiki/xwiki-platform/commit/3d055a0a5ec42fdebce4d71ee98f94553fdbfebf - https://jira.xwiki.org/browse/XWIKI-20283 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)

Metadata

Created: 2023-04-20T22:04:00Z
Modified: 2023-04-28T20:04:36Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/04/GHSA-px54-3w5j-qjg9/GHSA-px54-3w5j-qjg9.json
CWE IDs: ["CWE-74"]
Alternative ID: GHSA-px54-3w5j-qjg9
Finding: F184
Auto approve: 1