cve-2023-45134
Vulnerability from cvelistv5
Published
2023-10-25 19:08
Modified
2024-09-10 14:50
Severity ?
EPSS score ?
Summary
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. `org.xwiki.platform:xwiki-platform-web` starting in version 3.1-milestone-1 and prior to 13.4-rc-1, `org.xwiki.platform:xwiki-platform-web-templates` prior to versions 14.10.2 and 15.5-rc-1, and `org.xwiki.platform:xwiki-web-standard` starting in version 2.4-milestone-2 and prior to version 3.1-milestone-1 are vulnerable to cross-site scripting. An attacker can create a template provider on any document that is part of the wiki (could be the attacker's user profile) that contains malicious code. This code is executed when this template provider is selected during document creation which can be triggered by sending the user to a URL. For the attacker, the only requirement is to have an account as by default the own user profile is editable. This allows an attacker to execute arbitrary actions with the rights of the user opening the malicious link. Depending on the rights of the user, this may allow remote code execution and full read and write access to the whole XWiki installation. This has been patched in `org.xwiki.platform:xwiki-platform-web` 13.4-rc-1, `org.xwiki.platform:xwiki-platform-web-templates` 14.10.2 and 15.5-rc-1, and `org.xwiki.platform:xwiki-web-standard` 3.1-milestone-1 by adding the appropriate escaping. The vulnerable template file createinline.vm is part of XWiki's WAR and can be patched by manually applying the changes from the fix.
References
▼ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/xwiki/xwiki-platform/commit/ba56fda175156dd35035f2b8c86cbd8ef1f90c2e | Patch | |
security-advisories@github.com | https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gr82-8fj2-ggc3 | Patch, Vendor Advisory | |
security-advisories@github.com | https://jira.xwiki.org/browse/XWIKI-20962 | Exploit, Issue Tracking, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/xwiki/xwiki-platform/commit/ba56fda175156dd35035f2b8c86cbd8ef1f90c2e | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gr82-8fj2-ggc3 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jira.xwiki.org/browse/XWIKI-20962 | Exploit, Issue Tracking, Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | xwiki | xwiki-platform |
Version: >= 3.1-milestone-1, < 13.4-rc-1 Version: >= 2.4-milestone-2, < 3.1-milestone-1 Version: >= 14.0-rc-1, < 14.10.12 Version: >= 15.0-rc-1, < 15.5-rc-1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:14:19.733Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gr82-8fj2-ggc3", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gr82-8fj2-ggc3" }, { "name": "https://github.com/xwiki/xwiki-platform/commit/ba56fda175156dd35035f2b8c86cbd8ef1f90c2e", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/xwiki/xwiki-platform/commit/ba56fda175156dd35035f2b8c86cbd8ef1f90c2e" }, { "name": "https://jira.xwiki.org/browse/XWIKI-20962", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.xwiki.org/browse/XWIKI-20962" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:xwiki:xwiki-platform:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "xwiki-platform", "vendor": "xwiki", "versions": [ { "lessThan": "13.4-rc-1", "status": "affected", "version": "3.1-milestone-1", "versionType": "custom" }, { "lessThan": "3.1-milestone-1", "status": "affected", "version": "2.4-milestone-2", "versionType": "custom" }, { "lessThan": "14.10.12", "status": "affected", "version": "14.0-rc-1", "versionType": "custom" }, { "lessThan": "15.5-rc-1", "status": "affected", "version": "15.0-rc-1,", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-45134", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T14:46:37.428004Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-10T14:50:34.210Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "xwiki-platform", "vendor": "xwiki", "versions": [ { "status": "affected", "version": "\u003e= 3.1-milestone-1, \u003c 13.4-rc-1" }, { "status": "affected", "version": "\u003e= 2.4-milestone-2, \u003c 3.1-milestone-1" }, { "status": "affected", "version": "\u003e= 14.0-rc-1, \u003c 14.10.12" }, { "status": "affected", "version": "\u003e= 15.0-rc-1, \u003c 15.5-rc-1" } ] } ], "descriptions": [ { "lang": "en", "value": "XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. `org.xwiki.platform:xwiki-platform-web` starting in version 3.1-milestone-1 and prior to 13.4-rc-1, `org.xwiki.platform:xwiki-platform-web-templates` prior to versions 14.10.2 and 15.5-rc-1, and `org.xwiki.platform:xwiki-web-standard` starting in version 2.4-milestone-2 and prior to version 3.1-milestone-1 are vulnerable to cross-site scripting. An attacker can create a template provider on any document that is part of the wiki (could be the attacker\u0027s user profile) that contains malicious code. This code is executed when this template provider is selected during document creation which can be triggered by sending the user to a URL. For the attacker, the only requirement is to have an account as by default the own user profile is editable. This allows an attacker to execute arbitrary actions with the rights of the user opening the malicious link. Depending on the rights of the user, this may allow remote code execution and full read and write access to the whole XWiki installation. This has been patched in `org.xwiki.platform:xwiki-platform-web` 13.4-rc-1, `org.xwiki.platform:xwiki-platform-web-templates` 14.10.2 and 15.5-rc-1, and `org.xwiki.platform:xwiki-web-standard` 3.1-milestone-1 by adding the appropriate escaping. The vulnerable template file createinline.vm is part of XWiki\u0027s WAR and can be patched by manually applying the changes from the fix." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-25T19:08:32.909Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gr82-8fj2-ggc3", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gr82-8fj2-ggc3" }, { "name": "https://github.com/xwiki/xwiki-platform/commit/ba56fda175156dd35035f2b8c86cbd8ef1f90c2e", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/xwiki/xwiki-platform/commit/ba56fda175156dd35035f2b8c86cbd8ef1f90c2e" }, { "name": "https://jira.xwiki.org/browse/XWIKI-20962", "tags": [ "x_refsource_MISC" ], "url": "https://jira.xwiki.org/browse/XWIKI-20962" } ], "source": { "advisory": "GHSA-gr82-8fj2-ggc3", "discovery": "UNKNOWN" }, "title": "XWiki Platform XSS vulnerability from account in the create page form via template provider" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-45134", "datePublished": "2023-10-25T19:08:32.909Z", "dateReserved": "2023-10-04T16:02:46.328Z", "dateUpdated": "2024-09-10T14:50:34.210Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-45134\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2023-10-25T20:15:11.860\",\"lastModified\":\"2024-11-21T08:26:24.757\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. `org.xwiki.platform:xwiki-platform-web` starting in version 3.1-milestone-1 and prior to 13.4-rc-1, `org.xwiki.platform:xwiki-platform-web-templates` prior to versions 14.10.2 and 15.5-rc-1, and `org.xwiki.platform:xwiki-web-standard` starting in version 2.4-milestone-2 and prior to version 3.1-milestone-1 are vulnerable to cross-site scripting. An attacker can create a template provider on any document that is part of the wiki (could be the attacker\u0027s user profile) that contains malicious code. This code is executed when this template provider is selected during document creation which can be triggered by sending the user to a URL. For the attacker, the only requirement is to have an account as by default the own user profile is editable. This allows an attacker to execute arbitrary actions with the rights of the user opening the malicious link. Depending on the rights of the user, this may allow remote code execution and full read and write access to the whole XWiki installation. This has been patched in `org.xwiki.platform:xwiki-platform-web` 13.4-rc-1, `org.xwiki.platform:xwiki-platform-web-templates` 14.10.2 and 15.5-rc-1, and `org.xwiki.platform:xwiki-web-standard` 3.1-milestone-1 by adding the appropriate escaping. The vulnerable template file createinline.vm is part of XWiki\u0027s WAR and can be patched by manually applying the changes from the fix.\"},{\"lang\":\"es\",\"value\":\"XWiki Platform es una plataforma wiki gen\u00e9rica que ofrece servicios de ejecuci\u00f3n para aplicaciones creadas sobre ella. `org.xwiki.platform:xwiki-platform-web` a partir de la versi\u00f3n 3.1-milestone-1 y anteriores a 13.4-rc-1, `org.xwiki.platform:xwiki-platform-web-templates` anteriores a las versiones 14.10. 2 y 15.5-rc-1, y `org.xwiki.platform:xwiki-web-standard` a partir de la versi\u00f3n 2.4-milestone-2 y anteriores a la versi\u00f3n 3.1-milestone-1 son vulnerables a Cross-Site Scripting (XSS). Un atacante puede crear un proveedor de plantilla en cualquier documento que forme parte de la wiki (podr\u00eda ser el perfil de usuario del atacante) que contenga c\u00f3digo malicioso. Este c\u00f3digo se ejecuta cuando se selecciona este proveedor de plantilla durante la creaci\u00f3n del documento, lo que se puede activar enviando al usuario a una URL. Para el atacante, el \u00fanico requisito es tener una cuenta ya que, de forma predeterminada, el perfil de usuario es editable. Esto permite a un atacante ejecutar acciones arbitrarias con los derechos del usuario que abre el enlace malicioso. Dependiendo de los derechos del usuario, esto puede permitir la ejecuci\u00f3n remota de c\u00f3digo y acceso completo de lectura y escritura a toda la instalaci\u00f3n de XWiki. Esto se ha parcheado en `org.xwiki.platform:xwiki-platform-web` 13.4-rc-1, `org.xwiki.platform:xwiki-platform-web-templates` 14.10.2 y 15.5-rc-1, y `org.xwiki.platform:xwiki-web-standard` 3.1-milestone-1 agregando el escape apropiado. El archivo de plantilla vulnerable createinline.vm es parte de WAR de XWiki y se puede parchear aplicando manualmente los cambios de la soluci\u00f3n.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H\",\"baseScore\":9.0,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.3,\"impactScore\":6.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H\",\"baseScore\":9.0,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.3,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.1.1\",\"versionEndExcluding\":\"13.4\",\"matchCriteriaId\":\"8A146D81-B4C9-40D7-9780-8E4DFF51951A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.10\",\"versionEndExcluding\":\"14.10.2\",\"matchCriteriaId\":\"5338BB78-3138-4025-8C58-C1F500A716B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xwiki:xwiki:2.4:milestone2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FAFF67A-3777-44B7-B460-7A309D8B0CA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xwiki:xwiki:2.5:milestone2:*:*:*:*:*:*\",\"matchCriteriaId\":\"37D367C2-4799-4133-AEAC-18B6269481FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xwiki:xwiki:3.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"B80CC851-2324-437A-B4A5-06A5EB2FE180\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xwiki:xwiki:3.0:milestone_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5F1C457-1591-4025-BD49-BABB9BA9762F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xwiki:xwiki:3.0:milestone1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BEE764B-ED54-43D8-9748-DE57B5F1D701\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xwiki:xwiki:3.0:milestone2:*:*:*:*:*:*\",\"matchCriteriaId\":\"90C4A1EA-8B6A-4FE8-985B-EB924DA3A826\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xwiki:xwiki:3.0:milestone3:*:*:*:*:*:*\",\"matchCriteriaId\":\"A45A230D-909F-42D3-836D-95660805B094\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xwiki:xwiki:3.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6400CA62-5250-4BA5-A94B-7D529CDBE38E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xwiki:xwiki:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"354538B6-6468-4BFE-AA82-62664F8F17A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xwiki:xwiki:3.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEEE5DB5-54FC-40D2-891C-70E41115A464\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xwiki:xwiki:3.1:milestone1:*:*:*:*:*:*\",\"matchCriteriaId\":\"951DC6B5-F7BE-4FF4-9B2B-5ECCD2A07FE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xwiki:xwiki:3.1:milestone2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4D018E2-67B9-4D5A-AF97-4804EE834B68\"}]}]}],\"references\":[{\"url\":\"https://github.com/xwiki/xwiki-platform/commit/ba56fda175156dd35035f2b8c86cbd8ef1f90c2e\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gr82-8fj2-ggc3\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://jira.xwiki.org/browse/XWIKI-20962\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/xwiki/xwiki-platform/commit/ba56fda175156dd35035f2b8c86cbd8ef1f90c2e\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gr82-8fj2-ggc3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://jira.xwiki.org/browse/XWIKI-20962\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\",\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.