GHSA-VPX4-7RFP-H545
Vulnerability from github – Published: 2023-03-03 22:46 – Updated: 2023-03-03 22:46Impact
Any user with edit right can execute arbitrary database select and access data stored in the database.
To reproduce: * In admin, rights, remove scripting rights for {{XWikiAllGroup}}. * Create a new user without any special privileges. * Create a page "Private.WebHome" with {{TOKEN_42}} as content. Go to "page administration" and explicitly set all rights for "Admin" to remove them for all other users. * Logout and login as the unprivileged user. Ensure that the previously created page cannot be viewed. * Create a new page "ExploitClass.WebHome" and then open it in the class editor (first, make the user an advanced user). * Add a field named {{ContentList}} of type {{Database List}} * Enter in field "Hibernate Query" the following content: {noformat}select doc.content, doc.fullName from XWikiDocument as doc where doc.fullName = 'Private.WebHome'{noformat} * Save the class. * Open [http://localhost:8080/xwiki/bin/view/ExploitClass/?xpage=suggest&classname=ExploitClass.WebHome&fieldname=ContentList&firCol=doc.fullName&secCol=-]
Patches
The problem has been patched on XWiki 13.10.11, 14.4.7, and 14.10.
Workarounds
There is no workaround for this vulnerability other than upgrading.
References
https://jira.xwiki.org/browse/XWIKI-19523
For more information
If you have any questions or comments about this advisory: * Open an issue in Jira XWiki.org * Email us at Security Mailing List
{
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "org.xwiki.platform:xwiki-platform-web"
},
"ranges": [
{
"events": [
{
"introduced": "1.3-rc-1"
},
{
"fixed": "13.10.11"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.xwiki.platform:xwiki-platform-web"
},
"ranges": [
{
"events": [
{
"introduced": "14.0"
},
{
"fixed": "14.4.7"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.xwiki.platform:xwiki-platform-web"
},
"ranges": [
{
"events": [
{
"introduced": "14.5"
},
{
"fixed": "14.10"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2023-26473"
],
"database_specific": {
"cwe_ids": [
"CWE-284"
],
"github_reviewed": true,
"github_reviewed_at": "2023-03-03T22:46:43Z",
"nvd_published_at": "2023-03-02T19:15:00Z",
"severity": "MODERATE"
},
"details": "### Impact\n\nAny user with edit right can execute arbitrary database select and access data stored in the database.\n\nTo reproduce:\n * In admin, rights, remove scripting rights for {{XWikiAllGroup}}.\n * Create a new user without any special privileges.\n * Create a page \"Private.WebHome\" with {{TOKEN_42}} as content. Go to \"page administration\" and explicitly set all rights for \"Admin\" to remove them for all other users.\n * Logout and login as the unprivileged user. Ensure that the previously created page cannot be viewed.\n * Create a new page \"ExploitClass.WebHome\" and then open it in the class editor (first, make the user an advanced user).\n * Add a field named {{ContentList}} of type {{Database List}}\n * Enter in field \"Hibernate Query\" the following content: {noformat}select doc.content, doc.fullName from XWikiDocument as doc where doc.fullName = \u0027Private.WebHome\u0027{noformat}\n * Save the class.\n * Open [http://localhost:8080/xwiki/bin/view/ExploitClass/?xpage=suggest\u0026classname=ExploitClass.WebHome\u0026fieldname=ContentList\u0026firCol=doc.fullName\u0026secCol=-]\n\n### Patches\n\nThe problem has been patched on XWiki 13.10.11, 14.4.7, and 14.10.\n\n### Workarounds\n\nThere is no workaround for this vulnerability other than upgrading.\n\n### References\n\nhttps://jira.xwiki.org/browse/XWIKI-19523\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)\n* Email us at [Security Mailing List](mailto:security@xwiki.org)\n",
"id": "GHSA-vpx4-7rfp-h545",
"modified": "2023-03-03T22:46:43Z",
"published": "2023-03-03T22:46:43Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-vpx4-7rfp-h545"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26473"
},
{
"type": "PACKAGE",
"url": "https://github.com/xwiki/xwiki-platform"
},
{
"type": "WEB",
"url": "https://jira.xwiki.org/browse/XWIKI-19523"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
],
"summary": "Unprivileged XWiki Platform users can make arbitrary select queries using DatabaseListProperty and suggest.vm"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.