Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-h2rm-29ch-wfmh

Опубликовано: 17 окт. 2023
Источник: github
Github: Прошло ревью
CVSS3: 10

Описание

XWiki Identity Oauth Privilege escalation (PR)/remote code execution from login screen through unescaped URL parameter

Impact

When login via the OAuth method, the identityOAuth parameters, sent in a GET request is vulnerable to XSS and XWiki syntax injection. This allows remote code execution via the groovy macro and thus affects the confidentiality, integrity and availability of the whole XWiki installation.

The vulnerability is in this part of the code.

Patches

The issue has been fixed in Identity OAuth version 1.6 by https://github.com/xwikisas/identity-oauth/commit/d805d3154b17c6bf455ddf5deb0a3461a3833bc6 . The fix is in the content of the IdentityOAuth/LoginUIExtension file

Workarounds

There are no known workarounds besides upgrading.

References

Are there any links users can visit to find out more?

Пакеты

Наименование

com.xwiki.identity-oauth:identity-oauth-ui

maven
Затронутые версииВерсия исправления

>= 1.0, < 1.6

1.6

EPSS

Процентиль: 88%
0.04053
Низкий

10 Critical

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 10
nvd
больше 2 лет назад

com.xwiki.identity-oauth:identity-oauth-ui is a package to aid in building identity and service providers based on OAuth authorizations. When a user logs in via the OAuth method, the identityOAuth parameters sent in the GET request is vulnerable to cross site scripting (XSS) and XWiki syntax injection. This allows remote code execution via the groovy macro and thus affects the confidentiality, integrity and availability of the whole XWiki installation. The issue has been fixed in Identity OAuth version 1.6. There are no known workarounds for this vulnerability and users are advised to upgrade.

CVSS3: 9.6
fstec
больше 2 лет назад

Уязвимость пакета com.xwiki.identity-oauth:identity-oauth-ui платформы создания совместных веб-приложений XWiki Platform XWiki, позволяющая нарушителю провести атаку межсайтового скриптинга (XSS)

EPSS

Процентиль: 88%
0.04053
Низкий

10 Critical

CVSS3

Дефекты

CWE-79