XWiki Platform is a generic wiki platform. Starting in versions 6.3-rc-1 and 6.2.4, it's possible to inject arbitrary wiki syntax including Groovy, Python and Velocity script macros via the `newThemeName` request parameter (URL parameter), in combination with additional parameters. This has been patched in the supported versions 13.10.10, 14.9-rc-1, and 14.4.6. As a workaround, it is possible to edit `FlamingoThemesCode.WebHomeSheet` and manually perform the changes from the patch fixing the issue.
References
Link | Resource |
---|---|
https://github.com/xwiki/xwiki-platform/commit/ea2e615f50a918802fd60b09ec87aa04bc6ea8e2#diff-e2153fa59f9d92ef67b0afbf27984bd17170921a3b558fac227160003d0dfd2aR283-R284 | Patch |
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-x2qm-r4wx-8gpg | Exploit Vendor Advisory |
https://jira.xwiki.org/browse/XWIKI-19757 | Exploit Issue Tracking Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
10 Mar 2023, 05:00
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-94 | |
CPE | cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | (MISC) https://jira.xwiki.org/browse/XWIKI-19757 - Exploit, Issue Tracking, Vendor Advisory | |
References | (MISC) https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-x2qm-r4wx-8gpg - Exploit, Vendor Advisory | |
References | (MISC) https://github.com/xwiki/xwiki-platform/commit/ea2e615f50a918802fd60b09ec87aa04bc6ea8e2#diff-e2153fa59f9d92ef67b0afbf27984bd17170921a3b558fac227160003d0dfd2aR283-R284 - Patch |
02 Mar 2023, 18:22
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-03-02 18:15
Updated : 2024-02-04 23:14
NVD link : CVE-2023-26477
Mitre link : CVE-2023-26477
CVE.ORG link : CVE-2023-26477
JSON object : View
Products Affected
xwiki
- xwiki