CWE
74 95
Advisory Published
Advisory Published
Updated

CVE-2023-37462: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in org.xwiki.platform:xwiki-platform-skin-ui

First published: Fri Jul 14 2023(Updated: )

### Impact Improper escaping in the document `SkinsCode.XWikiSkinsSheet` leads to a possible privilege escalation from view right on that document to programming rights, or in other words, it is possible to execute arbitrary script macros including Groovy and Python macros that allow remote code execution including unrestricted read and write access to all wiki contents. The attack works by opening a non-existing page with a name crafted to contain a dangerous payload. It is possible to check if an existing installation is vulnerable by opening `<xwiki-host>/xwiki/bin/view/%22%5D%5D%20%7B%7Basync%20async%3D%22true%22%20cached%3D%22false%22%20context%3D%22doc.reference%22%7D%7D%7B%7Bgroovy%7D%7Dprintln(%22Hello%20%22%20%2B%20%22from%20groovy!%22)%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D?sheet=SkinsCode.XWikiSkinsSheet&xpage=view` where <xwiki-host is the URL of the XWiki installation. The expected result are two list items with "Edit this skin" and "Test this skin" without any further text. If the installation is vulnerable, the second list item is "Test this skin Hello from groovy!.WebHome"]]". This shows that the Groovy macro has been executed. ### Patches This has been patched in XWiki 14.4.8, 14.10.4 and 15.0-rc-1. ### Workarounds The [fix](https://github.com/xwiki/xwiki-platform/commit/d9c88ddc4c0c78fa534bd33237e95dea66003d29) can also be applied manually to the impacted document `SkinsCode.XWikiSkinsSheet`. ### References * https://jira.xwiki.org/browse/XWIKI-20457 * https://github.com/xwiki/xwiki-platform/commit/d9c88ddc4c0c78fa534bd33237e95dea66003d29 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)

Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
Xwiki Xwiki>=7.0<14.4.8
Xwiki Xwiki>=14.5<14.10.4
maven/org.xwiki.platform:xwiki-platform-skin-ui>=14.5<14.10.4
14.10.4
maven/org.xwiki.platform:xwiki-platform-skin-ui>=7.0-rc-1<14.4.8
14.4.8

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2023-37462?

    CVE-2023-37462 refers to a vulnerability in XWiki Platform that allows for arbitrary code execution.

  • How does CVE-2023-37462 affect XWiki Platform?

    CVE-2023-37462 affects XWiki Platform versions 7.0 to 14.4.8 and 14.5 to 14.10.4, allowing for an injection vector from view right on the document 'SkinsCode.XWikiSkinsSheet' to programming rights.

  • What is the severity of CVE-2023-37462?

    CVE-2023-37462 has a severity rating of 8.8 (Critical).

  • How can I fix CVE-2023-37462?

    To fix CVE-2023-37462, it is recommended to update XWiki Platform to a version that is not affected by the vulnerability.

  • Where can I find more information about CVE-2023-37462?

    You can find more information about CVE-2023-37462 in the XWiki Platform security advisories, the associated GitHub commits, and the XWiki Jira page.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203