Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rmxw-c48h-2vf5

Опубликовано: 07 нояб. 2023
Источник: github
Github: Прошло ревью
CVSS3: 9.1

Описание

XWiki Platform privilege escalation from script right to programming right through title displayer

Impact

In XWiki Platform, it's possible for a user to write a script in which any velocity content is executed with the right of any other document content author.

To reproduce:

As a user with script but not programming right, create a document with the following content:

{{velocity}} #set($main = $xwiki.getDocument('AppWithinMinutes.DynamicMessageTool')) $main.setTitle('$doc.getDocument().getContentAuthor()') $main.getPlainTitle() {{/velocity}}

Since this API require programming right and the user does not have it, the expected result is $doc.document.authors.contentAuthor (not executed script), unfortunately with the security vulnerability we get XWiki.superadmin which shows that the title was executed with the right of the unmodified document.

Patches

This has been patched in XWiki 14.10.7 and 15.2-RC-1.

Workarounds

There are no known workarounds for it.

References

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

org.xwiki.platform:xwiki-platform-display-api

maven
Затронутые версииВерсия исправления

>= 3.2-milestone-3, < 14.10.7

14.10.7

Наименование

org.xwiki.platform:xwiki-platform-display-api

maven
Затронутые версииВерсия исправления

>= 15.0, < 15.2-rc-1

15.2-rc-1

EPSS

Процентиль: 80%
0.01419
Низкий

9.1 Critical

CVSS3

Дефекты

CWE-863

Связанные уязвимости

CVSS3: 9.1
nvd
около 2 лет назад

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions it's possible for a user to write a script in which any velocity content is executed with the right of any other document content author. Since this API require programming right and the user does not have it, the expected result is `$doc.document.authors.contentAuthor` (not executed script), unfortunately with the security vulnerability it is possible for the attacker to get `XWiki.superadmin` which shows that the title was executed with the right of the unmodified document. This has been patched in XWiki versions 14.10.7 and 15.2RC1. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 8.8
fstec
больше 2 лет назад

Уязвимость программного интерфейса платформы создания совместных веб-приложений XWiki Platform XWiki , связанная с ошибками авторизации, позволяющая нарушителю получить права пользователя XWiki.superadmin

EPSS

Процентиль: 80%
0.01419
Низкий

9.1 Critical

CVSS3

Дефекты

CWE-863