First published: Tue Apr 18 2023(Updated: )
### Impact A registered user can perform remote code execution leading to privilege escalation by injecting the proper code in the "property" field of an attachment selector, as a gadget of their own dashboard. Note that the vulnerability does not impact comments of a wiki. ### Patches The vulnerability has been patched in XWiki 13.10.11, 14.4.8, 14.10.2, 15.0-rc-1. ### Workarounds The problem can be worked around by applying following changes directly in XWiki.AttachmentSelector page: https://github.com/xwiki/xwiki-platform/commit/5e8725b4272cd3e5be09d3ca84273be2da6869c1. ### References * https://jira.xwiki.org/browse/XWIKI-20364 * https://github.com/xwiki/xwiki-platform/commit/5e8725b4272cd3e5be09d3ca84273be2da6869c1 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xwiki Xwiki | <13.10.11 | |
Xwiki Xwiki | >=14.0<14.4.8 | |
Xwiki Xwiki | >=14.5<14.10.2 | |
maven/org.xwiki.platform:xwiki-platform-attachment-ui | >=14.5<14.10.2 | 14.10.2 |
maven/org.xwiki.platform:xwiki-platform-attachment-ui | >=14.0-rc-1<14.4.8 | 14.4.8 |
maven/org.xwiki.platform:xwiki-platform-attachment-ui | >=3.0-rc-1<13.10.11 | 13.10.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-29519 is a vulnerability in XWiki Platform that allows a registered user to perform remote code execution and privilege escalation.
CVE-2023-29519 works by injecting malicious code into the "property" field of an attachment selector as a gadget in the user's dashboard.
XWiki Platform versions from 13.10.11 to 14.4.8 are affected by CVE-2023-29519.
CVE-2023-29519 has a severity rating of 8.8, which is considered critical.
To fix CVE-2023-29519, users should update to a version of XWiki Platform that is not affected by the vulnerability.