Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j2pq-22jj-4pm5

Опубликовано: 12 дек. 2024
Источник: github
Github: Прошло ревью
CVSS3: 9.9

Описание

XWiki allows remote code execution through the extension sheet

Impact

On instances where Extension Repository Application is installed, any user can execute any code requiring programming rights on the server. In order to reproduce on an instance, as a normal user without script nor programming rights, go to your profile and add an object of type ExtensionCode.ExtensionClass. Set the description to {{async}}{{groovy}}println("Hello from Description"){{/groovy}}{{/async}} and press Save and View. If the description displays as Hello from Description without any error, then the instance is vulnerable.

Patches

This vulnerability has been fixed in XWiki 15.10.9 and 16.3.0.

Workarounds

Since Extension Repository Application is not mandatory, it can be safely disabled on instances that do not use it. It is also possible to manually apply this patch to the page ExtensionCode.ExtensionSheet, as well as this patch to the page ExtensionCode.ExtensionAuthorsDisplayer.

References

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

org.xwiki.platform:xwiki-platform-repository-server-ui

maven
Затронутые версииВерсия исправления

>= 3.3-milestone-1, < 15.10.9

15.10.9

Наименование

org.xwiki.platform:xwiki-platform-repository-server-ui

maven
Затронутые версииВерсия исправления

>= 16.0.0-rc-1, < 16.3.0

16.3.0

EPSS

Процентиль: 94%
0.12359
Средний

9.9 Critical

CVSS3

Дефекты

CWE-863
CWE-94
CWE-96

Связанные уязвимости

CVSS3: 9.9
nvd
около 1 года назад

XWiki Platform is a generic wiki platform. Starting in version 3.3-milestone-1 and prior to versions 15.10.9 and 16.3.0, on instances where `Extension Repository Application` is installed, any user can execute any code requiring `programming` rights on the server. This vulnerability has been fixed in XWiki 15.10.9 and 16.3.0. Since `Extension Repository Application` is not mandatory, it can be safely disabled on instances that do not use it as a workaround. It is also possible to manually apply the patches from commit 8659f17d500522bf33595e402391592a35a162e8 to the page `ExtensionCode.ExtensionSheet` and to the page `ExtensionCode.ExtensionAuthorsDisplayer`.

EPSS

Процентиль: 94%
0.12359
Средний

9.9 Critical

CVSS3

Дефекты

CWE-863
CWE-94
CWE-96