Headline
GHSA-3hjg-cghv-22ww: org.xwiki.platform:xwiki-platform-attachment-ui vulnerable to Code Injection
Impact
A registered user can perform remote code execution leading to privilege escalation by injecting the proper code in the “property” field of an attachment selector, as a gadget of their own dashboard. Note that the vulnerability does not impact comments of a wiki.
Patches
The vulnerability has been patched in XWiki 13.10.11, 14.4.8, 14.10.2, 15.0-rc-1.
Workarounds
The problem can be worked around by applying following changes directly in XWiki.AttachmentSelector page: https://github.com/xwiki/xwiki-platform/commit/5e8725b4272cd3e5be09d3ca84273be2da6869c1.
References
- https://jira.xwiki.org/browse/XWIKI-20364
- https://github.com/xwiki/xwiki-platform/commit/5e8725b4272cd3e5be09d3ca84273be2da6869c1
For more information
If you have any questions or comments about this advisory:
- Open an issue in Jira XWiki.org
- Email us at Security Mailing List
Package
maven org.xwiki.platform:xwiki-platform-attachment-ui (Maven)
Affected versions
>= 3.0-rc-1, < 13.10.11
>= 14.0-rc-1, < 14.4.8
>= 14.5, < 14.10.2
Patched versions
13.10.11
14.4.8
14.10.2
Description
Impact
A registered user can perform remote code execution leading to privilege escalation by injecting the proper code in the “property” field of an attachment selector, as a gadget of their own dashboard. Note that the vulnerability does not impact comments of a wiki.
Patches
The vulnerability has been patched in XWiki 13.10.11, 14.4.8, 14.10.2, 15.0-rc-1.
Workarounds
The problem can be worked around by applying following changes directly in XWiki.AttachmentSelector page: xwiki/xwiki-platform@5e8725b.
References
- https://jira.xwiki.org/browse/XWIKI-20364
- xwiki/xwiki-platform@5e8725b
For more information
If you have any questions or comments about this advisory:
- Open an issue in Jira XWiki.org
- Email us at Security Mailing List
References
- GHSA-3hjg-cghv-22ww
- https://nvd.nist.gov/vuln/detail/CVE-2023-29519
- xwiki/xwiki-platform@5e8725b
- https://jira.xwiki.org/browse/XWIKI-20364
tmortagne published to xwiki/xwiki-platform
Apr 18, 2023
Published to the GitHub Advisory Database
Apr 20, 2023
Reviewed
Apr 20, 2023
Last updated
Apr 20, 2023
Related news
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. A registered user can perform remote code execution leading to privilege escalation by injecting the proper code in the "property" field of an attachment selector, as a gadget of their own dashboard. Note that the vulnerability does not impact comments of a wiki. The vulnerability has been patched in XWiki 13.10.11, 14.4.8, 14.10.2, 15.0-rc-1. Users are advised to upgrade. There are no known workarounds for this vulnerability.