Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mvgm-3rw2-7j4r

Опубликовано: 29 апр. 2025
Источник: github
Github: Прошло ревью
CVSS3: 9

Описание

org.xwiki.platform:xwiki-platform-security-requiredrights-default required rights analysis doesn't consider TextAreas with default content type

Impact

When editing a page, XWiki warns since version 15.9 when there is content on the page like a script macro that would gain more rights due to the editing. This analysis doesn't consider certain kinds of properties, allowing a user to put malicious scripts in there that will be executed after a user with script, admin, or programming rights edited the page. Such a malicious script could impact the confidentiality, integrity and availability of the whole XWiki installation.

To reproduce, as a user without script right, create a class with a TextArea property, create page with an object of that class and a Velocity macro in its content. Then, as an admin, try editing that page. Normally, there should be a warning but in vulnerable versions of XWiki, there is no warning.

Patches

This vulnerability has been patched in XWiki 15.10.8 and 16.2.0.

Workarounds

We're not aware of any workarounds apart from not editing pages that might have been edited by untrusted users as a user with script rights, e.g., by using separate user accounts for admin and non-admin tasks.

Пакеты

Наименование

org.xwiki.platform:xwiki-platform-security-requiredrights-default

maven
Затронутые версииВерсия исправления

>= 15.9-rc-1, < 15.10.8

15.10.8

Наименование

org.xwiki.platform:xwiki-platform-security-requiredrights-default

maven
Затронутые версииВерсия исправления

>= 16.0.0-rc-1, < 16.2.0

16.2.0

EPSS

Процентиль: 68%
0.00562
Низкий

9 Critical

CVSS3

Дефекты

CWE-116
CWE-269

Связанные уязвимости

CVSS3: 9
nvd
9 месяцев назад

XWiki is a generic wiki platform. In versions starting from 15.9-rc-1 to before 15.10.8 and from 16.0.0-rc-1 to before 16.2.0, the required rights analysis doesn't consider TextAreas with default content type. When editing a page, XWiki warns since version 15.9 when there is content on the page like a script macro that would gain more rights due to the editing. This analysis doesn't consider certain kinds of properties, allowing a user to put malicious scripts in there that will be executed after a user with script, admin, or programming rights edited the page. Such a malicious script could impact the confidentiality, integrity and availability of the whole XWiki installation. This issue has been patched in versions 15.10.8 and 16.2.0.

CVSS3: 9
fstec
почти 2 года назад

Уязвимость компонента org.xwiki.platform:xwiki-platform-security-requiredrights-default платформы создания совместных веб-приложений XWiki Platform, позволяющая нарушителю оказать влияние на конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 68%
0.00562
Низкий

9 Critical

CVSS3

Дефекты

CWE-116
CWE-269