CVE-2023-29521 – org.xwiki.platform:xwiki-platform-vfs-ui
Package
Manager: maven
Name: org.xwiki.platform:xwiki-platform-vfs-ui
Vulnerable Version: >=7.4-milestone-2 <13.10.11 || >=14.0-rc-1 <14.4.8 || >=14.5 <14.10.2
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.01192 pctl0.78062
Details
XWiki Platform vulnerable to code injection from account/view through VFS Tree macro ### Impact Any user with view rights can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of `Macro.VFSTreeMacro`. This page is not installed by default. See https://jira.xwiki.org/browse/XWIKI-20260 for the reproduction steps. ### Patches The vulnerability has been patched in XWiki 15.0-rc-1, 14.10.2, 14.4.8, 13.10.11. ### Workarounds The issue can be fixed by applying this [patch](https://github.com/xwiki/xwiki-platform/commit/fad02328f5ec7ab7fe5b932ffb5bc5c1ba7a5b12) on `Macro.VFSTreeMacro`. ### References - https://jira.xwiki.org/browse/XWIKI-20260 - https://github.com/xwiki/xwiki-platform/commit/fad02328f5ec7ab7fe5b932ffb5bc5c1ba7a5b12 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)
Metadata
Created: 2023-04-20T22:06:19Z
Modified: 2023-04-28T19:53:41Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/04/GHSA-p67q-h88v-5jgr/GHSA-p67q-h88v-5jgr.json
CWE IDs: ["CWE-74"]
Alternative ID: GHSA-p67q-h88v-5jgr
Finding: F184
Auto approve: 1