Headline
GHSA-j584-j2vj-3f93: XWiki Platform allows remote code execution from user account
Impact
When an admin disables a user account, the user’s profile is executed with the admin’s rights. This allows a user to place malicious code in the user profile before getting an admin to disable the user account.
To reproduce, as a user without script nor programming rights, edit the about section of your user profile and add {{groovy}}services.logging.getLogger("attacker").error("Hello from Groovy!"){{/groovy}}
.
As an admin, go to the user profile and click the “Disable this account” button.
Then, reload the page. If the logs show attacker - Hello from Groovy!
then the instance is vulnerable.
Patches
This has been patched in XWiki 14.10.21, 15.5.5, 15.10.6 and 16.0.0.
Workarounds
We’re not aware of any workaround except upgrading.
References
- https://jira.xwiki.org/browse/XWIKI-21611
- https://github.com/xwiki/xwiki-platform/commit/f89c8f47fad6e5cc7e68c69a7e0acde07f5eed5a
Skip to content
Navigation Menu
Actions
Automate any workflow
Packages
Host and manage packages
Security
Find and fix vulnerabilities
Codespaces
Instant dev environments
GitHub Copilot
Write better code with AI
Code review
Manage code changes
Issues
Plan and track work
Discussions
Collaborate outside of code
GitHub Sponsors
Fund open source developers
* The ReadME Project
GitHub community articles
Enterprise platform
AI-powered developer platform
- Pricing
Provide feedback
Saved searches****Use saved searches to filter your results more quickly
Sign up
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2024-37899
XWiki Platform allows remote code execution from user account
Package
maven org.xwiki.platform:xwiki-platform-oldcore (Maven)
Affected versions
>= 13.4.7, < 13.5
>= 13.10.3, < 14.10.21
>= 15.0-rc-1, < 15.5.5
>= 15.6-rc-1, < 15.10.6
>= 16.0.0-rc-1, < 16.0.0
Patched versions
14.10.21
14.10.21
15.5.5
15.10.6
16.0.0
Description
Published to the GitHub Advisory Database
Jun 20, 2024