Headline
GHSA-gpq5-7p34-vqx5: XWiki Platform's async and display macro allow displaying and interacting with any document in restricted mode
Impact
It’s possible to display any page you cannot access through the combination of the async and display macro.
Steps to reproduce:
- Enable comments for guests by giving guests comment rights
- As a guest, create a comment with content
{{async}}{{display reference="Menu.WebHome" /}}{{/async}}
- Open the comments viewer from the menu (appends ?viewer=comments to the URL)
-> the Menu.WebHome
is displayed while the expectation would be to have an error that the current user is not allowed to see it
Patches
The vulnerability has been patched in XWiki 15.0-rc-1, 14.10.3, 14.4.8, and 13.10.11.
Workarounds
There is no known workaround.
References
https://jira.xwiki.org/browse/XWIKI-20394 https://jira.xwiki.org/browse/XRENDERING-694
For more information
If you have any questions or comments about this advisory:
- Open an issue in Jira XWiki.org
- Email us at Security Mailing List
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2023-29526
XWiki Platform’s async and display macro allow displaying and interacting with any document in restricted mode
Critical severity GitHub Reviewed Published Apr 18, 2023 in xwiki/xwiki-platform • Updated Apr 20, 2023
Package
maven org.xwiki.platform:xwiki-platform-oldcore (Maven)
Affected versions
>= 10.11.1, < 13.10.11
>= 14.0-rc-1, < 14.4.8
>= 14.5, < 14.10.3
Patched versions
13.10.11
14.4.8
14.10.3
maven org.xwiki.platform:xwiki-platform-rendering-async-macro (Maven)
>= 10.11.1, < 13.10.11
>= 14.0-rc-1, < 14.4.8
>= 14.5, < 14.10.3
Published to the GitHub Advisory Database
Apr 20, 2023
Last updated
Apr 20, 2023
Related news
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions it's possible to display or interact with any page a user cannot access through the combination of the async and display macros. A comment with either macro will be executed when viewed providing a code injection vector in the context of the running server. This vulnerability has been patched in XWiki 15.0-rc-1, 14.10.3, 14.4.8, and 13.10.11. Users are advised to upgrade. There are no known workarounds for this issue.