logo

CVE-2023-37277 org.xwiki.platform:xwiki-platform-rest-server

Package

Manager: maven
Name: org.xwiki.platform:xwiki-platform-rest-server
Vulnerable Version: >=1.8 <14.10.8 || >=15.0-rc-1 <15.2

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

EPSS: 0.02256 pctl0.83979

Details

XWiki Platform vulnerable to cross-site request forgery (CSRF) via the REST API ### Impact The REST API allows executing all actions via POST requests and accepts `text/plain`, `multipart/form-data` or `application/www-form-urlencoded` as content types which can be sent via regular HTML forms, thus allowing cross-site request forgery. With the interaction of a user with programming rights, this allows remote code execution through script macros and thus impacts the integrity, availability and confidentiality of the whole XWiki installation. For regular cookie-based authentication, the vulnerability is mitigated by SameSite cookie restrictions but as of March 2023, these are not enabled by default in Firefox and Safari. ### Patches The vulnerability has been patched in XWiki 14.10.8 and 15.2 by requiring a CSRF token header for certain request types that are susceptible to CSRF attacks. ### Workarounds It is possible to check for the `Origin` header in a reverse proxy to protect the REST endpoint from CSRF attacks, see [the Jira issue](https://jira.xwiki.org/browse/XWIKI-20135) for an example configuration. ### References * https://jira.xwiki.org/browse/XWIKI-20135 * https://github.com/xwiki/xwiki-platform/commit/4c175405faa0e62437df397811c7526dfc0fbae7

Metadata

Created: 2023-07-10T21:53:12Z
Modified: 2023-07-10T21:53:12Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/07/GHSA-6xxr-648m-gch6/GHSA-6xxr-648m-gch6.json
CWE IDs: ["CWE-352"]
Alternative ID: GHSA-6xxr-648m-gch6
Finding: F007
Auto approve: 1