First published: Thu Dec 12 2024(Updated: )
### Impact On instances where `Extension Repository Application` is installed, any user can execute any code requiring `programming` rights on the server. In order to reproduce on an instance, as a normal user without `script` nor `programming` rights, go to your profile and add an object of type `ExtensionCode.ExtensionClass`. Set the description to `{{async}}{{groovy}}println("Hello from Description"){{/groovy}}{{/async}}` and press `Save and View`. If the description displays as `Hello from Description` without any error, then the instance is vulnerable. ### Patches This vulnerability has been fixed in XWiki 15.10.9 and 16.3.0. ### Workarounds Since `Extension Repository Application` is not mandatory, it can be safely disabled on instances that do not use it. It is also possible to manually apply [this patch](https://github.com/xwiki/xwiki-platform/commit/8659f17d500522bf33595e402391592a35a162e8#diff-9b6f9e853f23d76611967737f8c4072ffceaba4c006ca5a5e65b66d988dc084a) to the page `ExtensionCode.ExtensionSheet`, as well as [this patch](https://github.com/xwiki/xwiki-platform/commit/8659f17d500522bf33595e402391592a35a162e8#diff-d571404d94fa27360cfee64f2a11d8c819b397529db275e005606b7356610f82) to the page `ExtensionCode.ExtensionAuthorsDisplayer`. ### References * https://jira.xwiki.org/browse/XWIKI-21890 * https://github.com/xwiki/xwiki-platform/commit/8659f17d500522bf33595e402391592a35a162e8 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xwiki | >=3.3<15.10.9 | |
Xwiki | >=16.0.0<16.3.0 | |
maven/org.xwiki.platform:xwiki-platform-repository-server-ui | >=16.0.0-rc-1<16.3.0 | 16.3.0 |
maven/org.xwiki.platform:xwiki-platform-repository-server-ui | >=3.3-milestone-1<15.10.9 | 15.10.9 |
>=3.3<15.10.9 | ||
>=16.0.0<16.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-55662 is rated as critical due to its potential to allow unauthorized code execution by any user with access to the Extension Repository Application.
To remediate CVE-2024-55662, upgrade to version 16.3.0 or 15.10.9 of the affected XWiki packages immediately.
CVE-2024-55662 affects XWiki versions 16.0.0-rc-1 to 16.3.0 and 3.3-milestone-1 to 15.10.9 of the xwiki-platform-repository-server-ui package.
Any user with normal access to the server and the Extension Repository Application can exploit CVE-2024-55662 to execute arbitrary code.
The impact of CVE-2024-55662 includes unauthorized code execution, which can compromise server integrity and confidentiality.