ghsa-g4h6-qp44-wqvx
Vulnerability from github
Impact
It's possible to exploit a bug in XWikiRights resolution of groups to obtain privilege escalation.
More specifically, editing a right with the object editor leads to adding a supplementary empty value to groups which is then resolved as a reference to XWiki.WebHome page. Adding an XWikiGroup xobject to that page then transforms it to a group, any user put in that group would then obtain the privileges related to the edited right.
Note that this security issue is normally mitigated by the fact that XWiki.WebHome (and XWiki space in general) should be protected by default for edit rights.
Patches
The problem has been patched in XWiki 13.10.4 and 14.2RC1 to not consider anymore empty values in XWikiRights.
Workarounds
It's possible to workaround the problem by setting appropriate rights on XWiki.WebHome page to prevent users to edit it.
References
- https://jira.xwiki.org/browse/XWIKI-18386
- https://jira.xwiki.org/browse/XWIKI-15776
For more information
If you have any questions or comments about this advisory: * Open an issue in Jira XWiki.org * Email us at Security Mailing List
{ "affected": [ { "package": { "ecosystem": "Maven", "name": "org.xwiki.platform:xwiki-platform-oldcore" }, "ranges": [ { "events": [ { "introduced": "11.3.7" }, { "fixed": "13.10.4" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.xwiki.platform:xwiki-platform-oldcore" }, "ranges": [ { "events": [ { "introduced": "14.0-rc-1" }, { "fixed": "14.2-rc-1" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2022-31166" ], "database_specific": { "cwe_ids": [ "CWE-269" ], "github_reviewed": true, "github_reviewed_at": "2022-09-20T21:19:52Z", "nvd_published_at": "2022-09-07T14:15:00Z", "severity": "HIGH" }, "details": "### Impact\n\nIt\u0027s possible to exploit a bug in XWikiRights resolution of groups to obtain privilege escalation. \n\nMore specifically, editing a right with the object editor leads to adding a supplementary empty value to groups which is then resolved as a reference to XWiki.WebHome page. Adding an XWikiGroup xobject to that page then transforms it to a group, any user put in that group would then obtain the privileges related to the edited right.\n\nNote that this security issue is normally mitigated by the fact that XWiki.WebHome (and XWiki space in general) should be protected by default for edit rights. \n\n### Patches\n\nThe problem has been patched in XWiki 13.10.4 and 14.2RC1 to not consider anymore empty values in XWikiRights. \n\n### Workarounds\n\nIt\u0027s possible to workaround the problem by setting appropriate rights on XWiki.WebHome page to prevent users to edit it. \n\n### References\n\n* https://jira.xwiki.org/browse/XWIKI-18386\n* https://jira.xwiki.org/browse/XWIKI-15776\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Open an issue in [Jira XWiki.org](https://jira.xwiki.org)\n* Email us at [Security Mailing List](mailto:security@xwiki.org)\n", "id": "GHSA-g4h6-qp44-wqvx", "modified": "2022-09-20T21:19:52Z", "published": "2022-09-20T21:19:52Z", "references": [ { "type": "WEB", "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-g4h6-qp44-wqvx" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31166" }, { "type": "WEB", "url": "https://github.com/xwiki/xwiki-platform/pull/1800" }, { "type": "PACKAGE", "url": "https://github.com/xwiki/xwiki-platform" }, { "type": "WEB", "url": "https://jira.xwiki.org/browse/XWIKI-15776" }, { "type": "WEB", "url": "https://jira.xwiki.org/browse/XWIKI-18386" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "type": "CVSS_V3" } ], "summary": "XWiki.WebHome vulnerable to Improper Privilege Management in XWiki resolving groups" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.