XWiki Platform vulnerable to code injection from account through XWiki.SchedulerJobSheet
Critical severity
GitHub Reviewed
Published
Apr 18, 2023
in
xwiki/xwiki-platform
•
Updated Nov 4, 2023
Package
Affected versions
>= 2.0.1, < 14.10.3
Patched versions
14.10.3
Description
Published by the National Vulnerability Database
Apr 19, 2023
Published to the GitHub Advisory Database
Apr 20, 2023
Reviewed
Apr 20, 2023
Last updated
Nov 4, 2023
Impact
It's possible to execute anything with the right of the Scheduler Application sheet page.
To reproduce:
{{/code}} {{async async="true" cached="false" context="doc.reference"}}{{groovy}}println("Hello " + "from groovy!"){{/groovy} {{/async}}
Patches
This has been patched in XWiki 14.10.3 and 15.0 RC1.
Workarounds
While the fix in the scheduler itself is easy, it relies on the code macro
source
parameter, which was introduced in 14.10.2 so you have to upgrade to benefit from it.References
https://jira.xwiki.org/browse/XWIKI-20295
https://jira.xwiki.org/browse/XWIKI-20462
For more information
If you have any questions or comments about this advisory:
References