CVE-2024-38369 – org.xwiki.platform:xwiki-platform-rendering-macro-include
Package
Manager: maven
Name: org.xwiki.platform:xwiki-platform-rendering-macro-include
Vulnerable Version: >=0 <15.0-rc-1
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
EPSS: 0.00767 pctl0.72559
Details
XWiki programming rights may be inherited by inclusion ### Impact The content of a document included using `{{include reference="targetdocument"/}}` is executed with the right of the includer and not with the right of its author. This means that any user able to modify the target document can impersonate the author of the content which used the `include` macro. ### Patches This has been patched in XWiki 15.0 RC1 by making the default behavior safe. ### Workarounds Make sure to protect any included document to make sure only allowed users can modify it. A workaround have been provided in 14.10.2 to allow forcing to execute the included content with the target content author instead of the default behavior. See https://extensions.xwiki.org/xwiki/bin/view/Extension/Include%20Macro#HAuthor for more details. ### References https://jira.xwiki.org/browse/XWIKI-5027 https://jira.xwiki.org/browse/XWIKI-20471 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)
Metadata
Created: 2024-06-24T18:00:16Z
Modified: 2024-06-24T21:27:57Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/06/GHSA-qcj3-wpgm-qpxh/GHSA-qcj3-wpgm-qpxh.json
CWE IDs: ["CWE-863"]
Alternative ID: GHSA-qcj3-wpgm-qpxh
Finding: F006
Auto approve: 1