Headline
GHSA-rf8j-q39g-7xfm: XWiki Platform vulnerable to privilege escalation (PR) from account through like LiveTableResults
Impact
Any logged in user can add dangerous content in their first name field and see it executed with programming rights. Leading to rights escalation.
Patches
The vulnerability has been fixed on XWiki 14.4.8, 14.10.6, and 15.1.
Workarounds
The vulnerability can be fixed by applying this patch.
On versions before 13.4-rc-1, the fix needs to be applied on XWiki.Like.Code.LiveTableResultPage.
References
- The reported issue https://jira.xwiki.org/browse/XWIKI-20611, fixed by https://jira.xwiki.org/browse/XWIKI-19900
- The patch https://github.com/xwiki/xwiki-platform/commit/6ce2d04a5779e07f6d3ed3f37d4761049b4fc3ac#diff-ef7f8b911bb8e584fda22aac5876a329add35ca0d1d32e0fdb62a439b78cfa49
For more information
If you have any questions or comments about this advisory:
- Open an issue in Jira XWiki.org
- Email us at Security Mailing List
Skip to content
Sign up
CVE-2023-35152
Actions
Automate any workflow
Packages
Host and manage packages
Security
Find and fix vulnerabilities
Codespaces
Instant dev environments
Copilot
Write better code with AI
Code review
Manage code changes
Issues
Plan and track work
Discussions
Collaborate outside of code
Explore
* All features
* Documentation
* GitHub Skills
* Blog
For
- Enterprise
- Teams
- Startups
- Education
By Solution
- CI/CD & Automation
- DevOps
- DevSecOps
Case Studies
- Customer Stories
- Resources
GitHub Sponsors
Fund open source developers
* The ReadME Project
GitHub community articles
Repositories
* Topics
* Trending
* Collections
Pricing
Search All GitHub
No suggested jump to results
Search All GitHub
Search All GitHub
Search All GitHub
Sign in
Sign up
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2023-35152
XWiki Platform vulnerable to privilege escalation (PR) from account through like LiveTableResults
Critical severity GitHub Reviewed Published Jun 20, 2023 in xwiki/xwiki-platform
Vulnerability details Dependabot alerts 0
Package
maven org.xwiki.platform:xwiki-platform-like-ui (Maven)
Affected versions
>= 12.9-rc-1, < 14.4.8
>= 14.5, < 14.10.6
>= 15.0-rc-1, < 15.1
Patched versions
14.4.8
14.10.6
15.1
Description
Impact
Any logged in user can add dangerous content in their first name field and see it executed with programming rights. Leading to rights escalation.
Patches
The vulnerability has been fixed on XWiki 14.4.8, 14.10.6, and 15.1.
Workarounds
The vulnerability can be fixed by applying this patch.
On versions before 13.4-rc-1, the fix needs to be applied on XWiki.Like.Code.LiveTableResultPage.
References
- The reported issue https://jira.xwiki.org/browse/XWIKI-20611, fixed by https://jira.xwiki.org/browse/XWIKI-19900
- The patch xwiki/xwiki-platform@6ce2d04#diff-ef7f8b911bb8e584fda22aac5876a329add35ca0d1d32e0fdb62a439b78cfa49
For more information
If you have any questions or comments about this advisory:
- Open an issue in Jira XWiki.org
- Email us at Security Mailing List
References
- GHSA-rf8j-q39g-7xfm
- xwiki/xwiki-platform@0993a7a#diff-0b51114cb27f7a5c599cf40c59d658eae6ddc5c0836532c3b35e163f40a4854fR39
- xwiki/xwiki-platform@6ce2d04#diff-ef7f8b911bb8e584fda22aac5876a329add35ca0d1d32e0fdb62a439b78cfa49
- https://jira.xwiki.org/browse/XWIKI-19900
- https://jira.xwiki.org/browse/XWIKI-20611
manuelleduc published to xwiki/xwiki-platform
Jun 20, 2023
Published to the GitHub Advisory Database
Jun 20, 2023
Reviewed
Jun 20, 2023
Severity
Critical
9.9
/ 10
CVSS base metrics
Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Weaknesses
CWE-95
CVE ID
CVE-2023-35152
GHSA ID
GHSA-rf8j-q39g-7xfm
Source code
xwiki/xwiki-platform
Checking history
See something to contribute? Suggest improvements for this vulnerability.
Related news
XWiki Platform is a generic wiki platform. Starting in version 12.9-rc-1 and prior to versions 14.4.8, 14.10.6, and 15.1, any logged in user can add dangerous content in their first name field and see it executed with programming rights. Leading to rights escalation. The vulnerability has been fixed on XWiki 14.4.8, 14.10.6, and 15.1. As a workaround, one may apply the patch manually.