CVE-2023-26056 – org.xwiki.platform:xwiki-platform-rendering-macro-context
Package
Manager: maven
Name: org.xwiki.platform:xwiki-platform-rendering-macro-context
Vulnerable Version: >=3.0-milestone-1 <13.10.10 || >=14.0-rc-1 <14.4.5 || >=14.5 <14.8-rc-1
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00222 pctl0.44733
Details
xwiki contains Incorrect Authorization ### Impact It's possible to execute a script with the right of another user (provided the target user does not have programming right). For example, the following: ``` {{context document="xwiki:XWiki.userwithscriptright" transformationContext="document"}}{{velocity}}Hello from Velocity!{{/velocity}}{{/context}} ``` written by a user not having script right (for example in the user's profile) should produce an error (the user is not allowed to write scripts). However, because of the vulnerability, if the author of the document "xwiki:XWiki.userwithscriptright" has script right (but not programming right) the script will be executed with as if it was written by the target user. ### Patches The problem has been patched in XWiki 14.8RC1, 14.4.5 and 13.10.10. ### Workarounds There's no workaround for this issue. ### References https://jira.xwiki.org/browse/XWIKI-19856 ### For more information If you have any questions or comments about this advisory: * Open an issue in [JIRA](https://jira.xwiki.org) * Email us at [security ML](mailto:security@xwiki.org)
Metadata
Created: 2023-03-03T22:54:19Z
Modified: 2023-03-03T22:54:19Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/03/GHSA-859x-p6jp-rc2w/GHSA-859x-p6jp-rc2w.json
CWE IDs: ["CWE-863"]
Alternative ID: GHSA-859x-p6jp-rc2w
Finding: F006
Auto approve: 1