Описание
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with edit rights on any document (e.g., their own user profile) can execute code with programming rights, leading to remote code execution. This vulnerability has been patched in XWiki 13.10.11, 14.4.8, 14.10.1 and 15.0 RC1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Ссылки
- Patch
- ExploitPatchVendor Advisory
- ExploitIssue TrackingPatchVendor Advisory
- Patch
- ExploitPatchVendor Advisory
- ExploitIssue TrackingPatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 13.10.11 (исключая)Версия от 14.0 (включая) до 14.4.8 (исключая)Версия от 14.5 (включая) до 14.10.1 (исключая)
Одно из
cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*
cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*
cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*
EPSS
Процентиль: 88%
0.0389
Низкий
9.9 Critical
CVSS3
8.8 High
CVSS3
Дефекты
CWE-74
Связанные уязвимости
CVSS3: 9.9
github
почти 3 года назад
XWiki vulnerable to Code Injection in template provider administration
EPSS
Процентиль: 88%
0.0389
Низкий
9.9 Critical
CVSS3
8.8 High
CVSS3
Дефекты
CWE-74