Описание
In XWiki before versions 11.10.5 or 12.2.1, any user with SCRIPT right (EDIT right before XWiki 7.4) can gain access to the application server Servlet context which contains tools allowing to instantiate arbitrary Java objects and invoke methods that may lead to arbitrary code execution. The only workaround is to give SCRIPT right only to trusted users.
Ссылки
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 11.10.5 (исключая)Версия от 12.0.0 (включая) до 12.2.1 (исключая)
Одно из
cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*
cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*
EPSS
Процентиль: 72%
0.00734
Низкий
6.6 Medium
CVSS3
6 Medium
CVSS2
Дефекты
CWE-94
CWE-74
Связанные уязвимости
CVSS3: 6.6
github
больше 5 лет назад
Users with SCRIPT right can execute arbitrary code in XWiki
EPSS
Процентиль: 72%
0.00734
Низкий
6.6 Medium
CVSS3
6 Medium
CVSS2
Дефекты
CWE-94
CWE-74