CWE
74
Advisory Published
Advisory Published
Updated

CVE-2023-29514: Code injection in template provider administration in xwiki-platform

First published: Tue Apr 18 2023(Updated: )

### Impact Any user with edit rights on any document (e.g., the own user profile) can execute code with programming rights, leading to remote code execution by following these steps: 1. Set the title of any document you can edit (can be the user profile) to ``` {{async async="true" cached="false" context="doc.reference"}}{{groovy}}println("Hello " + "from groovy!"){{/groovy}}{{/async}} ``` 2. Use the object editor to add an object of type `XWiki.TemplateProviderClass` (named "Template Provider Class") to that document. 3. Go to another document you can view (can be the home page) and append `?sheet=XWiki.AdminTemplatesSheet` to the URL. When the attack is successful, a template with name "Hello from groovy!" is displayed in the list while on fixed systems, the full title should be displayed. ### Patches This vulnerability has been patched in XWiki 13.10.11, 14.4.8, 14.10.1 and 15.0 RC1. ### Workarounds The vulnerability can be fixed by patching the code in the affected XWiki document as shown in the [patch](https://github.com/xwiki/xwiki-platform/commit/7bf7094f8ffac095f5d66809af7554c9cc44de09). ### References * https://jira.xwiki.org/browse/XWIKI-20268 * https://github.com/xwiki/xwiki-platform/commit/7bf7094f8ffac095f5d66809af7554c9cc44de09 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)

Credit: security-advisories@github.com security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
Xwiki Xwiki<13.10.11
Xwiki Xwiki>=14.0<14.4.8
Xwiki Xwiki>=14.5<14.10.1
maven/org.xwiki.platform:xwiki-platform-administration-ui>=14.5<14.10.1
14.10.1
maven/org.xwiki.platform:xwiki-platform-administration-ui>=14.0-rc-1<14.4.8
14.4.8
maven/org.xwiki.platform:xwiki-platform-administration-ui>=4.2-milestone-1<13.10.11
13.10.11
maven/org.xwiki.platform:xwiki-platform-administration>=3.1-milestone-1<4.2-milestone-1
maven/org.xwiki.platform.applications:xwiki-application-administration>=1.35<=1.49

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2023-29514?

    CVE-2023-29514 is a vulnerability in XWiki Platform that allows any user with edit rights to execute code with programming rights, leading to remote code execution.

  • How severe is CVE-2023-29514?

    CVE-2023-29514 has a severity rating of 8.8, which is considered critical.

  • How can I fix CVE-2023-29514?

    To fix CVE-2023-29514, you should update your XWiki installation to version 14.10.1 or later.

  • Is CVE-2023-29514 already patched?

    Yes, CVE-2023-29514 has been patched in XWiki 14.10.1.

  • Where can I find more information about CVE-2023-29514?

    You can find more information about CVE-2023-29514 in the XWiki Platform GitHub repository and the XWiki JIRA page.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203