logo

CVE-2023-29521 org.xwiki.platform:xwiki-platform-vfs-ui

Package

Manager: maven
Name: org.xwiki.platform:xwiki-platform-vfs-ui
Vulnerable Version: >=7.4-milestone-2 <13.10.11 || >=14.0-rc-1 <14.4.8 || >=14.5 <14.10.2

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.01192 pctl0.78062

Details

XWiki Platform vulnerable to code injection from account/view through VFS Tree macro ### Impact Any user with view rights can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of `Macro.VFSTreeMacro`. This page is not installed by default. See https://jira.xwiki.org/browse/XWIKI-20260 for the reproduction steps. ### Patches The vulnerability has been patched in XWiki 15.0-rc-1, 14.10.2, 14.4.8, 13.10.11. ### Workarounds The issue can be fixed by applying this [patch](https://github.com/xwiki/xwiki-platform/commit/fad02328f5ec7ab7fe5b932ffb5bc5c1ba7a5b12) on `Macro.VFSTreeMacro`. ### References - https://jira.xwiki.org/browse/XWIKI-20260 - https://github.com/xwiki/xwiki-platform/commit/fad02328f5ec7ab7fe5b932ffb5bc5c1ba7a5b12 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)

Metadata

Created: 2023-04-20T22:06:19Z
Modified: 2023-04-28T19:53:41Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/04/GHSA-p67q-h88v-5jgr/GHSA-p67q-h88v-5jgr.json
CWE IDs: ["CWE-74"]
Alternative ID: GHSA-p67q-h88v-5jgr
Finding: F184
Auto approve: 1