logo

CVE-2023-26056 org.xwiki.platform:xwiki-platform-rendering-macro-context

Package

Manager: maven
Name: org.xwiki.platform:xwiki-platform-rendering-macro-context
Vulnerable Version: >=3.0-milestone-1 <13.10.10 || >=14.0-rc-1 <14.4.5 || >=14.5 <14.8-rc-1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00222 pctl0.44733

Details

xwiki contains Incorrect Authorization ### Impact It's possible to execute a script with the right of another user (provided the target user does not have programming right). For example, the following: ``` {{context document="xwiki:XWiki.userwithscriptright" transformationContext="document"}}{{velocity}}Hello from Velocity!{{/velocity}}{{/context}} ``` written by a user not having script right (for example in the user's profile) should produce an error (the user is not allowed to write scripts). However, because of the vulnerability, if the author of the document "xwiki:XWiki.userwithscriptright" has script right (but not programming right) the script will be executed with as if it was written by the target user. ### Patches The problem has been patched in XWiki 14.8RC1, 14.4.5 and 13.10.10. ### Workarounds There's no workaround for this issue. ### References https://jira.xwiki.org/browse/XWIKI-19856 ### For more information If you have any questions or comments about this advisory: * Open an issue in [JIRA](https://jira.xwiki.org) * Email us at [security ML](mailto:security@xwiki.org)

Metadata

Created: 2023-03-03T22:54:19Z
Modified: 2023-03-03T22:54:19Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/03/GHSA-859x-p6jp-rc2w/GHSA-859x-p6jp-rc2w.json
CWE IDs: ["CWE-863"]
Alternative ID: GHSA-859x-p6jp-rc2w
Finding: F006
Auto approve: 1