Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7qw5-pqhc-xm4g

Опубликовано: 10 сент. 2020
Источник: github
Github: Прошло ревью
CVSS3: 6.6

Описание

Users with SCRIPT right can execute arbitrary code in XWiki

Impact

Any user with SCRIPT right (EDIT right before XWiki 7.4) can gain access to the application server Servlet context which contains tools allowing to instantiate arbitrary Java objects and invoke methods that may lead to arbitrary code execution.

Patches

It has been patched in both version XWiki 12.2.1 and XWiki 11.10.5.

Workarounds

The only workaround is to give SCRIPT right only to trusted users.

References

https://jira.xwiki.org/browse/XWIKI-17141 https://jira.xwiki.org/browse/XWIKI-17266

It's been reported by the GitHub Security Lab under #GHSL-2020-046.

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

org.xwiki.platform:xwiki-platform-oldcore

maven
Затронутые версииВерсия исправления

< 11.10.5

11.10.5

Наименование

org.xwiki.platform:xwiki-platform-oldcore

maven
Затронутые версииВерсия исправления

>= 12.0.0, < 12.2.1

12.2.1

EPSS

Процентиль: 72%
0.00734
Низкий

6.6 Medium

CVSS3

Дефекты

CWE-74
CWE-94

Связанные уязвимости

CVSS3: 6.6
nvd
больше 5 лет назад

In XWiki before versions 11.10.5 or 12.2.1, any user with SCRIPT right (EDIT right before XWiki 7.4) can gain access to the application server Servlet context which contains tools allowing to instantiate arbitrary Java objects and invoke methods that may lead to arbitrary code execution. The only workaround is to give SCRIPT right only to trusted users.

EPSS

Процентиль: 72%
0.00734
Низкий

6.6 Medium

CVSS3

Дефекты

CWE-74
CWE-94