CVE-2023-29521
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with view rights can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of `Macro.VFSTreeMacro`. This page is not installed by default.This vulnerability has been patched in XWiki 15.0-rc-1, 14.10.2, 14.4.8, 13.10.11. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Published
2023-04-19T00:15:08.823
Last Modified
2024-11-21T07:57:13.470
Status
Modified
Source
[email protected]
Severity
CVSSv3.1: 8.4 (HIGH)
Weaknesses
-
Type: Secondary
CWE-74
-
Type: Primary
CWE-74
Affected Vendors & Products
| Type |
Vendor |
Product |
Version/Range |
Vulnerable? |
| Application |
xwiki
|
xwiki
|
< 13.10.11 |
Yes
|
| Application |
xwiki
|
xwiki
|
< 14.4.8 |
Yes
|
| Application |
xwiki
|
xwiki
|
< 14.10.2 |
Yes
|
References
-
https://github.com/xwiki/xwiki-platform/commit/fad02328f5ec7ab7fe5b932ffb5bc5c1ba7a5b12
Patch
([email protected])
-
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-p67q-h88v-5jgr
Exploit, Patch, Vendor Advisory
([email protected])
-
https://jira.xwiki.org/browse/XWIKI-20260
Exploit, Issue Tracking, Patch, Vendor Advisory
([email protected])
-
https://github.com/xwiki/xwiki-platform/commit/fad02328f5ec7ab7fe5b932ffb5bc5c1ba7a5b12
Patch
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-p67q-h88v-5jgr
Exploit, Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://jira.xwiki.org/browse/XWIKI-20260
Exploit, Issue Tracking, Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)