Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWgzNTMtaGM0My05NXZj
Script injection without script or programming rights through Gadget titles
Impact
A user without Script or Programming right is able to execute script requiring privileges by editing gadget titles in the dashboard.
Patches
The issue has been patched in XWiki 12.6.7, 12.10.3 and 13.0RC1.
Workarounds
There's no easy workaround for this issue, it is recommended to upgrade XWiki.
References
https://jira.xwiki.org/browse/XWIKI-17794
For more information
If you have any questions or comments about this advisory:
- Open an issue in JIRA
- Email us at XWiki security mailing-list
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWgzNTMtaGM0My05NXZj
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 3 years ago
Updated: about 1 year ago
CVSS Score: 8.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-h353-hc43-95vc, CVE-2021-32621
References:
- https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-h353-hc43-95vc
- https://jira.xwiki.org/browse/XWIKI-17794
- https://nvd.nist.gov/vuln/detail/CVE-2021-32621
- https://github.com/xwiki/xwiki-platform/commit/bb7068bd911f91e5511f3cfb03276c7ac81100bc
- https://jay-from-future.github.io/cve/2021/06/17/xwiki-rce-cve.html
- https://github.com/advisories/GHSA-h353-hc43-95vc
Blast Radius: 1.0
Affected Packages
maven:org.xwiki.commons:xwiki-commons-core
Dependent packages: 0Dependent repositories: 0
Downloads:
Affected Version Ranges: >= 12.10.0, < 12.10.3, < 12.6.7
Fixed in: 12.10.3, 12.6.7
All affected versions: 3.2.1, 3.3.1, 3.5.1, 4.0.1, 4.1.1, 4.1.2, 4.1.3, 4.1.4, 4.3.1, 4.4.1, 4.5.1, 4.5.2, 4.5.3, 5.0.1, 5.0.2, 5.0.3, 5.2.1, 5.2.2, 5.2.3, 5.2.4, 5.4.1, 5.4.2, 5.4.3, 5.4.4, 5.4.5, 5.4.6, 5.4.7, 6.0.1, 6.2.1, 6.2.2, 6.2.3, 6.2.4, 6.2.5, 6.2.6, 6.2.7, 6.4.1, 6.4.2, 6.4.3, 6.4.4, 6.4.5, 6.4.6, 6.4.7, 6.4.8, 7.0.1, 7.1.1, 7.1.2, 7.1.3, 7.1.4, 7.4.1, 7.4.2, 7.4.3, 7.4.4, 7.4.5, 7.4.6, 8.2.1, 8.2.2, 8.4.1, 8.4.2, 8.4.3, 8.4.4, 8.4.5, 8.4.6, 9.1.1, 9.1.2, 9.3.1, 9.5.1, 9.8.1, 9.10.1, 9.11.1, 9.11.2, 9.11.3, 9.11.4, 9.11.5, 9.11.6, 9.11.7, 9.11.8, 9.11.9, 10.6.1, 10.7.1, 10.8.1, 10.8.2, 10.8.3, 10.11.1, 10.11.2, 10.11.3, 10.11.4, 10.11.5, 10.11.6, 10.11.7, 10.11.8, 10.11.9, 10.11.10, 10.11.11, 11.0.1, 11.0.2, 11.0.3, 11.3.1, 11.3.2, 11.3.3, 11.3.4, 11.3.5, 11.3.6, 11.3.7, 11.6.1, 11.8.1, 11.10.1, 11.10.2, 11.10.3, 11.10.4, 11.10.5, 11.10.6, 11.10.7, 11.10.8, 11.10.10, 11.10.11, 11.10.12, 11.10.13, 12.2.1, 12.5.1, 12.6.1, 12.6.2, 12.6.3, 12.6.4, 12.6.5, 12.6.6, 12.10.1, 12.10.2
All unaffected versions: 12.6.7, 12.6.8, 12.7.1, 12.10.3, 12.10.4, 12.10.5, 12.10.6, 12.10.7, 12.10.8, 12.10.9, 12.10.10, 12.10.11, 13.4.1, 13.4.2, 13.4.3, 13.4.4, 13.4.5, 13.4.6, 13.4.7, 13.10.1, 13.10.2, 13.10.3, 13.10.4, 13.10.5, 13.10.6, 13.10.7, 13.10.8, 13.10.9, 13.10.10, 13.10.11, 14.2.1, 14.3.1, 14.4.1, 14.4.2, 14.4.3, 14.4.4, 14.4.5, 14.4.6, 14.4.7, 14.4.8, 14.10.1, 14.10.2, 14.10.3, 14.10.4, 14.10.5, 14.10.6, 14.10.7, 14.10.8, 14.10.9, 14.10.10, 14.10.11, 14.10.12, 14.10.13, 14.10.14, 14.10.15, 14.10.16, 14.10.17, 14.10.18, 14.10.19, 14.10.20, 14.10.21, 15.5.1, 15.5.2, 15.5.3, 15.5.4, 15.5.5, 15.10.1, 15.10.2, 15.10.3, 15.10.4, 15.10.5, 15.10.6, 15.10.7, 15.10.8, 15.10.9, 15.10.10, 15.10.11, 15.10.12, 15.10.13, 16.0.0, 16.1.0, 16.2.0, 16.3.0, 16.3.1, 16.4.0, 16.4.1, 16.4.2, 16.4.3, 16.4.4, 16.4.5, 16.5.0, 16.6.0, 16.7.0, 16.7.1, 16.8.0, 16.9.0