Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-3hjg-cghv-22ww: org.xwiki.platform:xwiki-platform-attachment-ui vulnerable to Code Injection

Impact

A registered user can perform remote code execution leading to privilege escalation by injecting the proper code in the “property” field of an attachment selector, as a gadget of their own dashboard. Note that the vulnerability does not impact comments of a wiki.

Patches

The vulnerability has been patched in XWiki 13.10.11, 14.4.8, 14.10.2, 15.0-rc-1.

Workarounds

The problem can be worked around by applying following changes directly in XWiki.AttachmentSelector page: https://github.com/xwiki/xwiki-platform/commit/5e8725b4272cd3e5be09d3ca84273be2da6869c1.

References

  • https://jira.xwiki.org/browse/XWIKI-20364
  • https://github.com/xwiki/xwiki-platform/commit/5e8725b4272cd3e5be09d3ca84273be2da6869c1

For more information

If you have any questions or comments about this advisory:

ghsa
#vulnerability#git#java#rce#jira#maven

Package

maven org.xwiki.platform:xwiki-platform-attachment-ui (Maven)

Affected versions

>= 3.0-rc-1, < 13.10.11

>= 14.0-rc-1, < 14.4.8

>= 14.5, < 14.10.2

Patched versions

13.10.11

14.4.8

14.10.2

Description

Impact

A registered user can perform remote code execution leading to privilege escalation by injecting the proper code in the “property” field of an attachment selector, as a gadget of their own dashboard. Note that the vulnerability does not impact comments of a wiki.

Patches

The vulnerability has been patched in XWiki 13.10.11, 14.4.8, 14.10.2, 15.0-rc-1.

Workarounds

The problem can be worked around by applying following changes directly in XWiki.AttachmentSelector page: xwiki/xwiki-platform@5e8725b.

References

  • https://jira.xwiki.org/browse/XWIKI-20364
  • xwiki/xwiki-platform@5e8725b

For more information

If you have any questions or comments about this advisory:

  • Open an issue in Jira XWiki.org
  • Email us at Security Mailing List

References

  • GHSA-3hjg-cghv-22ww
  • https://nvd.nist.gov/vuln/detail/CVE-2023-29519
  • xwiki/xwiki-platform@5e8725b
  • https://jira.xwiki.org/browse/XWIKI-20364

tmortagne published to xwiki/xwiki-platform

Apr 18, 2023

Published to the GitHub Advisory Database

Apr 20, 2023

Reviewed

Apr 20, 2023

Last updated

Apr 20, 2023

Related news

CVE-2023-29519: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in org.xwiki.platform:xwiki-platform-attachment-ui

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. A registered user can perform remote code execution leading to privilege escalation by injecting the proper code in the "property" field of an attachment selector, as a gadget of their own dashboard. Note that the vulnerability does not impact comments of a wiki. The vulnerability has been patched in XWiki 13.10.11, 14.4.8, 14.10.2, 15.0-rc-1. Users are advised to upgrade. There are no known workarounds for this vulnerability.