XWiki Platform vulnerable to code injection in display method used in user profiles
Critical severity
GitHub Reviewed
Published
Apr 18, 2023
in
xwiki/xwiki-platform
•
Updated Nov 4, 2023
Package
Affected versions
>= 3.3-milestone-1, < 13.10.11
>= 14.0-rc-1, < 14.4.8
>= 14.5, < 14.10.2
Patched versions
13.10.11
14.4.8
14.10.2
Description
Published by the National Vulnerability Database
Apr 19, 2023
Published to the GitHub Advisory Database
Apr 20, 2023
Reviewed
Apr 20, 2023
Last updated
Nov 4, 2023
Impact
Any user who can edit their own user profile can execute arbitrary script macros including Groovy and Python macros that allow remote code execution including unrestricted read and write access to all wiki contents. The following syntax, to be put, e.g., in the about section of the user profile, demonstrates a proof of concept:
While it would be expected that the above code is displayed just without the
~
, in fact just "1" is displayed, followed by a lot of raw HTML code. The same vulnerability can also be exploited in other contexts where thedisplay
method on a document is used to display a field with wiki syntax, for example in applications created using App Within Minutes.Patches
This has been patched in XWiki 13.10.11, 14.4.8, 14.10.2 and 15.0RC1.
Workarounds
There is no workaround apart from upgrading.
References
For more information
If you have any questions or comments about this advisory:
References