First published: Tue Apr 18 2023(Updated: )
### Impact It's possible to execute anything with the right of the Scheduler Application sheet page. To reproduce: 1. As a user without script or programming rights, edit your user profile with the object editor and add a new object of type XWiki.SchedulerJobClass (search for "Scheduler") 1. In "Job Script", add the following ```{{/code}} {{async async="true" cached="false" context="doc.reference"}}{{groovy}}println("Hello " + "from groovy!"){{/groovy} {{/async}}``` 1. Click "Save & View" 1. If the job information isn't already displayed (you should see "Job Name", "Job Description", etc.), append ?sheet=XWiki.SchedulerJobSheet to the URL. ### Patches This has been patched in XWiki 14.10.3 and 15.0 RC1. ### Workarounds While the fix in the scheduler itself is easy, it relies on the code macro `source` parameter, which was introduced in 14.10.2 so you have to upgrade to benefit from it. ### References https://jira.xwiki.org/browse/XWIKI-20295 https://jira.xwiki.org/browse/XWIKI-20462 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xwiki Xwiki | <14.10.3 | |
maven/org.xwiki.platform:xwiki-platform-scheduler-ui | >=2.0.1<14.10.3 | 14.10.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-29524 is a vulnerability in XWiki Platform that allows an attacker to execute arbitrary code with the permissions of the Scheduler Application sheet page.
CVE-2023-29524 has a severity rating of 8.8 out of 10, which is considered critical.
CVE-2023-29524 affects XWiki Platform versions up to and excluding 14.10.3.
CVE-2023-29524 can be exploited by a user without script or programming rights by editing their user profile with the object editor and adding a new malicious code.
Yes, a fix is available for CVE-2023-29524. It is recommended to update XWiki Platform to version 14.10.3 or later.