Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5hv6-mh8q-q9v8

Опубликовано: 16 окт. 2020
Источник: github
Github: Прошло ревью
CVSS3: 8.5

Описание

RCE in XWiki

Impact

Any user with SCRIPT right (EDIT right before XWiki 7.4) can gain access to the application server Servlet context which contains tools allowing to instantiate arbitrary Java objects and invoke methods that may lead to arbitrary code execution.

Patches

It has been patched in both version XWiki 12.5 and XWiki 11.10.6.

Workarounds

The only workaround is to give SCRIPT right only to trusted users.

References

https://jira.xwiki.org/browse/XWIKI-17423

It's been reported by the GitHub Security Lab under https://jira.xwiki.org/browse/XWIKI-17141.

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

org.xwiki.platform:xwiki-platform-oldcore

maven
Затронутые версииВерсия исправления

< 11.10.6

11.10.6

Наименование

org.xwiki.platform:xwiki-platform-oldcore

maven
Затронутые версииВерсия исправления

>= 12.0, < 12.5

12.5

EPSS

Процентиль: 85%
0.02703
Низкий

8.5 High

CVSS3

Дефекты

CWE-74
CWE-94

Связанные уязвимости

CVSS3: 8.5
nvd
больше 5 лет назад

In XWiki before version 12.5 and 11.10.6, any user with SCRIPT right (EDIT right before XWiki 7.4) can gain access to the application server Servlet context which contains tools allowing to instantiate arbitrary Java objects and invoke methods that may lead to arbitrary code execution. This is patched in XWiki 12.5 and XWiki 11.10.6.

EPSS

Процентиль: 85%
0.02703
Низкий

8.5 High

CVSS3

Дефекты

CWE-74
CWE-94