First published: Tue Nov 07 2023(Updated: )
### Impact In XWiki Platform, it's possible for a user to write a script in which any velocity content is executed with the right of any other document content author. To reproduce: As a user with script but not programming right, create a document with the following content: ``` {{velocity}} #set($main = $xwiki.getDocument('AppWithinMinutes.DynamicMessageTool')) $main.setTitle('$doc.getDocument().getContentAuthor()') $main.getPlainTitle() {{/velocity}} ``` Since this API require programming right and the user does not have it, the expected result is `$doc.document.authors.contentAuthor` (not executed script), unfortunately with the security vulnerability we get `XWiki.superadmin` which shows that the title was executed with the right of the unmodified document. ### Patches This has been patched in XWiki 14.10.7 and 15.2-RC-1. ### Workarounds There are no known workarounds for it. ### References * https://jira.xwiki.org/browse/XWIKI-20624 * https://github.com/xwiki/xwiki-platform/commit/11a9170dfe63e59f4066db67f84dbfce4ed619c6 * https://jira.xwiki.org/browse/XWIKI-20625 * https://github.com/xwiki/xwiki-platform/commit/41d7dca2d30084966ca6a7ee537f39ee8354a7e3 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.xwiki.platform:xwiki-platform-display-api | >=15.0<15.2-rc-1 | 15.2-rc-1 |
maven/org.xwiki.platform:xwiki-platform-display-api | >=3.2-milestone-3<14.10.7 | 14.10.7 |
Xwiki Xwiki | >=3.3<14.10.7 | |
Xwiki Xwiki | >=15.0<15.2 | |
Xwiki Xwiki | =3.2-milestone3 | |
>=3.3<14.10.7 | ||
>=15.0<15.2 | ||
=3.2-milestone3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
An attacker can execute velocity content with the privileges of any other document content author.
Create a document with a velocity script as a user with script but not programming rights.
The severity of CVE-2023-46244 is critical with a CVSS score of 9.1.
Versions 15.0 to 15.2-rc-1 and versions 3.2-milestone-3 to 14.10.7 of XWiki Platform are affected.
Upgrade to version 15.2-rc-1 or apply the remedy for versions 15.2-rc-1 and version 14.10.7 as specified in the references.