Headline
GHSA-35j5-m29r-xfq5: XWiki Rendering's footnote macro vulnerable to privilege escalation via the footnote macro
Impact
The footnote macro executed its content in a potentially different context than the one in which it was defined. In particular in combination with the include macro, this allows privilege escalation from a simple user account in XWiki to programming rights and thus remote code execution, impacting the confidentiality, integrity and availability of the whole XWiki installation.
To reproduce, perform the following steps:
- Edit your user profile with the object editor and add an object of type DocumentSheetBinding with value XWiki.ClassSheet
- Edit your user profile with the wiki editor and add the syntax
{{footnote}}{{groovy}}println("Hello " + "from groovy!"){{/groovy}}{{/footnote}}
When the text “Hello from groovy!” is displayed at the bottom of the document, the installation is vulnerable. Instead, an error should be displayed.
Patches
This vulnerability has been patched in XWiki 14.10.6 and 15.1-rc-1.
Workarounds
There is no workaround apart from upgrading to a fixed version of the footnote macro.
References
- https://jira.xwiki.org/browse/XRENDERING-688
- https://github.com/xwiki/xwiki-rendering/commit/5f558b8fac8b716d19999225f38cb8ed0814116e
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2023-37912
XWiki Rendering’s footnote macro vulnerable to privilege escalation via the footnote macro
Critical severity GitHub Reviewed Published Oct 25, 2023 in xwiki/xwiki-rendering • Updated Oct 25, 2023
Package
maven org.xwiki.platform:xwiki-core-rendering-macro-footnotes (Maven)
Affected versions
< 14.10.6
maven org.xwiki.rendering:xwiki-rendering-macro-footnotes (Maven)
< 14.10.6
>= 15.0-rc-1, < 15.1-rc-1
Impact
The footnote macro executed its content in a potentially different context than the one in which it was defined. In particular in combination with the include macro, this allows privilege escalation from a simple user account in XWiki to programming rights and thus remote code execution, impacting the confidentiality, integrity and availability of the whole XWiki installation.
To reproduce, perform the following steps:
- Edit your user profile with the object editor and add an object of type DocumentSheetBinding with value XWiki.ClassSheet
- Edit your user profile with the wiki editor and add the syntax {{footnote}}{{groovy}}println("Hello " + “from groovy!”){{/groovy}}{{/footnote}}
When the text “Hello from groovy!” is displayed at the bottom of the document, the installation is vulnerable. Instead, an error should be displayed.
Patches
This vulnerability has been patched in XWiki 14.10.6 and 15.1-rc-1.
Workarounds
There is no workaround apart from upgrading to a fixed version of the footnote macro.
References
- https://jira.xwiki.org/browse/XRENDERING-688
- xwiki/xwiki-rendering@5f558b8
References
- GHSA-35j5-m29r-xfq5
- https://nvd.nist.gov/vuln/detail/CVE-2023-37912
- xwiki/xwiki-rendering@5f558b8
- https://jira.xwiki.org/browse/XRENDERING-688
Published to the GitHub Advisory Database
Oct 25, 2023
Last updated
Oct 25, 2023
Related news
XWiki Rendering is a generic Rendering system that converts textual input in a given syntax into another syntax. Prior to version 14.10.6 of `org.xwiki.platform:xwiki-core-rendering-macro-footnotes` and `org.xwiki.platform:xwiki-rendering-macro-footnotes` and prior to version 15.1-rc-1 of `org.xwiki.platform:xwiki-rendering-macro-footnotes`, the footnote macro executed its content in a potentially different context than the one in which it was defined. In particular in combination with the include macro, this allows privilege escalation from a simple user account in XWiki to programming rights and thus remote code execution, impacting the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.6 and 15.1-rc-1. There is no workaround apart from upgrading to a fixed version of the footnote macro.