Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Incorrect Authorization vulnerabilities in an interactive lesson.
Start learningUpgrade org.xwiki.platform:xwiki-platform-repository-server-ui
to version 15.10.9, 16.3.0 or higher.
org.xwiki.platform:xwiki-platform-repository-server-ui is an application for managing extensions in a repository based on XWiki.
Affected versions of this package are vulnerable to Incorrect Authorization through the ExtensionCode.ExtensionClass
object. An authenticated attacker without script
nor programming
rights can execute arbitrary code on the server by manipulating the description field to execute Groovy scripts.
This vulnerability can be mitigated by disabling the Extension Repository Application
if it is not needed, or by manually applying this patch to the page ExtensionCode.ExtensionSheet
, as well as this patch to the page ExtensionCode.ExtensionAuthorsDisplayer
.
As a normal user without script
nor programming
rights, go to your profile and add an object of type ExtensionCode.ExtensionClass
. Set the description to {{async}}{{groovy}}println("Hello from Description"){{/groovy}}{{/async}}
and press Save and View
. If the description displays as Hello from Description
without any error, then the instance is vulnerable.