First published: Tue May 09 2023(Updated: )
### Impact It's possible for a user to execute anything with the right of the author of the XWiki.ClassSheet document. **Steps to Reproduce:** 1. Edit your user profile with the object editor and add an object of type `DocumentSheetBinding` with value `Default Class Sheet` 1. Edit your user profile with the wiki editor and add the syntax `{{async}}{{groovy}}println("Hello " + "from groovy!"){{/groovy}}{{/async}}` 1. Click "Save & View" **Expected result:** An error is displayed as the user doesn't have the right to execute the Groovy macro. **Actual result:** The text "Hello from groovy!" is displayed at the top of the document. ### Patches This has been patched in XWiki 15.0-rc-1 and 14.10.4. ### Workarounds There are no known workarounds for it. ### References https://jira.xwiki.org/browse/XWIKI-20566 https://github.com/xwiki/xwiki-platform/commit/de72760d4a3e1e9be64a10660a0c19e9534e2ec4 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xwiki Xwiki | >=3.4<14.10.4 | |
Xwiki Xwiki | =3.3-milestone2 | |
maven/org.xwiki.platform:xwiki-platform-test-ui | >=3.3-milestone-3<14.10.4 | 14.10.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32069 is a vulnerability in XWiki Platform that allows a user to execute arbitrary code with the rights of the author of the XWiki.ClassSheet document.
The severity of CVE-2023-32069 is critical with a CVSS score of 8.8.
CVE-2023-32069 can be exploited by an attacker who has the rights of the author of the XWiki.ClassSheet document, allowing them to execute arbitrary code.
Yes, CVE-2023-32069 has been patched in XWiki versions 15.0-rc-1 and 14.10.4.
Yes, you can find more information about CVE-2023-32069 at the following references: [Reference 1](https://github.com/xwiki/xwiki-platform/commit/de72760d4a3e1e9be64a10660a0c19e9534e2ec4), [Reference 2](https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-36fm-j33w-c25f), [Reference 3](https://jira.xwiki.org/browse/XWIKI-20566).