Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1jdng1LW04dmctdnhnY81BlA
Arbitrary filesystem write access from velocity.
Impact
The velocity scripts is not properly sandboxed against using the Java File API to perform read or write operations on the filesystem. Now writing an attacking script in velocity requires the Script rights in XWiki so not all users can use it, and it also requires finding an XWiki API which returns a File.
Patches
The problem has been patched on versions 12.6.7, 12.10.3 and 13.0RC1.
Workarounds
There's no easy workaround for fixing this vulnerability other than upgrading and being careful when giving Script rights.
References
https://jira.xwiki.org/browse/XWIKI-5168
For more information
If you have any questions or comments about this advisory:
- Open an issue in Jira XWiki
- Email us at XWiki Security mailing-list
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1jdng1LW04dmctdnhnY81BlA
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 2 years ago
Updated: over 1 year ago
CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-cvx5-m8vg-vxgc, CVE-2022-24897
References:
- https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-cvx5-m8vg-vxgc
- https://jira.xwiki.org/browse/XWIKI-5168
- https://github.com/xwiki/xwiki-commons/commit/215951cfb0f808d0bf5b1097c9e7d1e503449ab8
- https://nvd.nist.gov/vuln/detail/CVE-2022-24897
- https://github.com/xwiki/xwiki-commons/pull/127
- https://github.com/advisories/GHSA-cvx5-m8vg-vxgc
Blast Radius: 13.6
Affected Packages
maven:org.xwiki.commons:xwiki-commons-velocity
Dependent packages: 3Dependent repositories: 65
Downloads:
Affected Version Ranges: >= 12.7.0, < 12.10.3, >= 2.3.0, < 12.6.7
Fixed in: 12.10.3, 12.6.7
All affected versions:
All unaffected versions: 12.10.11, 13.4.6, 13.4.7, 13.10.2, 13.10.3, 13.10.4, 13.10.5, 13.10.6, 13.10.7, 13.10.8, 13.10.9, 13.10.10, 13.10.11, 14.2.1, 14.3.1, 14.4.1, 14.4.2, 14.4.3, 14.4.4, 14.4.5, 14.4.6, 14.4.7, 14.4.8, 14.10.1, 14.10.2, 14.10.3, 14.10.4, 14.10.5, 14.10.6, 14.10.7, 14.10.8, 14.10.9, 14.10.10, 14.10.11, 14.10.12, 14.10.13, 14.10.14, 14.10.15, 14.10.16, 14.10.17, 14.10.18, 14.10.19, 14.10.20, 14.10.21, 15.5.1, 15.5.2, 15.5.3, 15.5.4, 15.5.5, 15.10.1, 15.10.2, 15.10.3, 15.10.4, 15.10.5, 15.10.6, 15.10.7, 15.10.8, 16.0.0, 16.1.0, 16.2.0, 16.3.0, 16.3.1