Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS03OTU0LTZtOXEtZ3B2Zs4AA1Yx

XWiki Platform privilege escalation (PR)/RCE from account through Invitation subject/message

Impact

Any user who can view Invitation.WebHome can execute arbitrary script macros including Groovy and Python macros that allow remote code execution including unrestricted read and write access to all wiki contents. This can be reproduced with the following steps:

  1. Open the invitation application (Invitation.WebHome).
  2. Set the subject to {{cache}}{{groovy}}new File("/tmp/exploit.txt").withWriter { out -> out.println("Attacked from invitation!"); }{{/groovy}}{{/cache}}
  3. Click "Preview"

Patches

The vulnerability has been patched on XWiki 14.4.8, 15.2-rc-1, and 14.10.6.

Workarounds

The vulnerability can be patched manually by applying the patch on Invitation.InvitationCommon and Invitation.InvitationConfig.

References

For more information

If you have any questions or comments about this advisory:

Permalink: https://github.com/advisories/GHSA-7954-6m9q-gpvf
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS03OTU0LTZtOXEtZ3B2Zs4AA1Yx
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: 9 months ago
Updated: 6 months ago


CVSS Score: 9.9
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L

Identifiers: GHSA-7954-6m9q-gpvf, CVE-2023-37914
References: Repository: https://github.com/xwiki/xwiki-platform
Blast Radius: 1.0

Affected Packages

maven:org.xwiki.platform:xwiki-platform-invitation-ui
Affected Version Ranges: >= 15.0-rc-1, < 15.2-rc-1, >= 14.5, < 14.10.6, >= 2.5-m-1, < 14.4.8
Fixed in: 15.2-rc-1, 14.10.6, 14.4.8