XWiki Platform vulnerable to privilege escalation from view right on XWiki.Notifications.Code.LegacyNotificationAdministration
Critical severity
GitHub Reviewed
Published
Apr 18, 2023
in
xwiki/xwiki-platform
•
Updated Nov 4, 2023
Description
Published by the National Vulnerability Database
Apr 19, 2023
Published to the GitHub Advisory Database
Apr 20, 2023
Reviewed
Apr 20, 2023
Last updated
Nov 4, 2023
Impact
Steps to reproduce:
Open /xwiki/bin/view/XWiki/Notifications/Code/LegacyNotificationAdministration?since=%7B%7B%2Fhtml%7D%7D+%7B%7Basync+async%3D%22true%22+cached%3D%22false%22+context%3D%22doc.reference%22%7D%7D%7B%7Bgroovy%7D%7Dprintln%28%22Hello+%22+%2B+%22from+groovy%21%22%29%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D, where is the URL of your XWiki installation.
This demonstrates an XWiki syntax injection attack via the since-parameter, allowing privilege escalation from view to programming rights.
Patches
The vulnerability has been patched in XWiki 15.0-rc-1, 14.10.3, 14.4.8 and 14.10.3.
Workarounds
For versions >= 14.6-rc-1 the workaround is to modify the page
XWiki.Notifications.Code.LegacyNotificationAdministration
to add the missing escaping, as described on xwiki/xwiki-platform@8e7c7f9#diff-4e13f4ee4a42938bf1201b7ee71ca32edeacba22559daf0bcb89d534e0225949R70For versions < 14.6-rc-1 the workaround is to modify the file
<xwikiwebapp>/templates/distribution/eventmigration.wiki
to add the missing escaping, as described on xwiki/xwiki-platform@6d74e2eReferences
https://jira.xwiki.org/browse/XWIKI-20287
For more information
If you have any questions or comments about this advisory:
References