First published: Fri Oct 16 2020(Updated: )
In XWiki before version 12.5 and 11.10.6, any user with SCRIPT right (EDIT right before XWiki 7.4) can gain access to the application server Servlet context which contains tools allowing to instantiate arbitrary Java objects and invoke methods that may lead to arbitrary code execution. This is patched in XWiki 12.5 and XWiki 11.10.6.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
XWiki | <11.10.6 | |
XWiki | >=12.0<12.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15252 has a critical severity rating due to its potential for arbitrary code execution.
To fix CVE-2020-15252, upgrade to XWiki versions 12.5, 11.10.6, or later.
CVE-2020-15252 affects any user with SCRIPT rights in XWiki versions prior to 12.5 and 11.10.6.
CVE-2020-15252 is a remote code execution vulnerability that allows unauthorized access to the application server context.
XWiki versions before 12.5 and between 12.0 and 12.5, as well as all versions before 11.10.6, are vulnerable to CVE-2020-15252.