Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Incorrect Authorization vulnerabilities in an interactive lesson.
Start learningUpgrade org.xwiki.platform:xwiki-platform-repository-server-ui
to version 15.10.9, 16.3.0 or higher.
org.xwiki.platform:xwiki-platform-repository-server-ui is an application for managing extensions in a repository based on XWiki.
Affected versions of this package are vulnerable to Incorrect Authorization through the ExtensionCode.ExtensionClass
object. An authenticated attacker without script
nor programming
rights can execute arbitrary code on the server by manipulating the description field to execute Groovy scripts.
This vulnerability can be mitigated by disabling the Extension Repository Application
if it is not needed, or by manually applying this patch to the page ExtensionCode.ExtensionSheet
, as well as this patch to the page ExtensionCode.ExtensionAuthorsDisplayer
.
As a normal user without script
nor programming
rights, go to your profile and add an object of type ExtensionCode.ExtensionClass
. Set the description to {{async}}{{groovy}}println("Hello from Description"){{/groovy}}{{/async}}
and press Save and View
. If the description displays as Hello from Description
without any error, then the instance is vulnerable.