CVE-2023-50722

Published: Dic 15, 2023 Last Modified: Nov 21, 2024 EU-VD ID: EUVD-2023-3187 Aliases: GHSA-cp3j-273x-3jxc
ExploitDB:
Other exploit source:
Google Dorks:
CRITICAL 9,6
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: required
Scope: changed
Confidentiality: high
Integrity: high
Availability: high

Description

AI Translation Available

XWiki Platform is a generic wiki platform. Starting in 2.3 and prior to versions 14.10.15, 15.5.2, and 15.7-rc-1, there is a reflected XSS or also direct remote code execution vulnerability in the code for displaying configurable admin sections. The code that can be passed through a URL parameter is only executed when the user who is visiting the crafted URL has edit right on at least one configuration section. While any user of the wiki could easily create such a section, this vulnerability doesn't require the attacker to have an account or any access on the wiki. It is sufficient to trick any admin user of the XWiki installation to visit the crafted URL. This vulnerability allows full remote code execution with programming rights and thus impacts the confidentiality, integrity and availability of the whole XWiki installation. This has been fixed in XWiki 14.10.15, 15.5.2 and 15.7RC1. The patch can be manually applied to the document `XWiki.ConfigurableClass`.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0326
Percentile
0,9th
Updated

EPSS Score Trend (Last 90 Days)

79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Stable
Common Consequences
Security Scopes Affected:
Access Control Confidentiality Integrity Availability
Potential Impacts:
Bypass Protection Mechanism Read Application Data Execute Unauthorized Code Or Commands
Applicable Platforms
Technologies: AI/ML, Web Based, Web Server
View CWE Details
352

Cross-Site Request Forgery (CSRF)

Stable
Common Consequences
Security Scopes Affected:
Confidentiality Integrity Availability Non-Repudiation Access Control
Potential Impacts:
Gain Privileges Or Assume Identity Bypass Protection Mechanism Read Application Data Modify Application Data Dos: Crash, Exit, Or Restart
Applicable Platforms
Technologies: Web Based, Web Server
View CWE Details
Application

Xwiki by Xwiki

Version Range Affected
From 15.0 (inclusive)
To 15.5.2 (exclusive)
cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Xwiki by Xwiki

Version Range Affected
From 2.3 (inclusive)
To 14.10.5 (exclusive)
cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Xwiki by Xwiki

cpe:2.3:a:xwiki:xwiki:15.6:rc1:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Xwiki by Xwiki

cpe:2.3:a:xwiki:xwiki:15.6:-:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Xwiki by Xwiki

cpe:2.3:a:xwiki:xwiki:15.7:rc1:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://github.com/xwiki/xwiki-platform/commit/5e14c8d08fd0c5b619833d35090b470a…
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-cp3j-273x-3jxc
https://jira.xwiki.org/browse/XWIKI-21167
https://github.com/xwiki/xwiki-platform/commit/5e14c8d08fd0c5b619833d35090b470a…
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-cp3j-273x-3jxc
https://jira.xwiki.org/browse/XWIKI-21167