First published: Mon May 02 2022(Updated: )
APIs to evaluate content with Velocity is a package for APIs to evaluate content with Velocity. Starting with version 2.3 and prior to 12.6.7, 12.10.3, and 13.0, the velocity scripts are not properly sandboxed against using the Java File API to perform read or write operations on the filesystem. Writing an attacking script in Velocity requires the Script rights in XWiki so not all users can use it, and it also requires finding an XWiki API which returns a File. The problem has been patched in versions 12.6.7, 12.10.3, and 13.0. There is no easy workaround for fixing this vulnerability other than upgrading and being careful when giving Script rights.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xwiki | >=2.3<12.6.7 | |
Xwiki | >=12.7<12.10.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24897 has been rated as a high severity vulnerability due to improper sandboxing that could lead to unauthorized file operations.
To fix CVE-2022-24897, update your XWiki installation to version 12.6.7, 12.10.3, or 13.0 or later.
Versions of XWiki starting from 2.3 up to 12.6.7, 12.10.3, and 13.0 are affected by CVE-2022-24897.
CVE-2022-24897 can be exploited to perform unauthorized read or write operations using the Java File API.
CVE-2022-24897 is not a traditional code injection vulnerability, but it can allow unauthorized access to the file system through malicious scripts.