Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1oNmY1LThqajUtY3hocs4AAx6L

xwiki-platform vulnerable to Remote Code Execution in Annotations

Impact

The annotation displayer does not execute the content in a restricted context. This allows executing anything with the right of the author of any document by annotating the document.

To reproduce: add an annotation with the content {{groovy}}print "hello"{{/groovy}} and click the yellow scare to get a display of the annotation inline.

The result is "hello" but it should be an error suggesting that it's not allowed to use the groovy macro.

Patches

This has been patched in XWiki 13.10.11, 14.4.7 and 14.10.

Workarounds

There is no easy workaround except to upgrade.

References

https://jira.xwiki.org/browse/XWIKI-20360

https://jira.xwiki.org/browse/XWIKI-20384

For more information

If you have any questions or comments about this advisory:

Attribution

This vulnerability has been reported by René de Sain @renniepak.

Permalink: https://github.com/advisories/GHSA-h6f5-8jj5-cxhr
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1oNmY1LThqajUtY3hocs4AAx6L
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: almost 2 years ago
Updated: almost 2 years ago


CVSS Score: 10.0
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

EPSS Percentage: 0.00356
EPSS Percentile: 0.71781

Identifiers: GHSA-h6f5-8jj5-cxhr, CVE-2023-26475
References: Repository: https://github.com/xwiki/xwiki-platform
Blast Radius: 1.0

Affected Packages

maven:org.xwiki.platform:xwiki-platform-annotation-ui
Affected Version Ranges: >= 14.5, < 14.10, >= 14.0-rc-1, < 14.4.7, >= 2.3-milestone-1, < 13.10.11
Fixed in: 14.10, 14.4.7, 13.10.11