xwiki-platform vulnerable to Remote Code Execution in Annotations
Critical severity
GitHub Reviewed
Published
Mar 1, 2023
in
xwiki/xwiki-platform
•
Updated Mar 13, 2023
Package
Affected versions
>= 2.3-milestone-1, < 13.10.11
>= 14.0-rc-1, < 14.4.7
>= 14.5, < 14.10
Patched versions
13.10.11
14.4.7
14.10
Description
Published to the GitHub Advisory Database
Mar 2, 2023
Reviewed
Mar 2, 2023
Published by the National Vulnerability Database
Mar 2, 2023
Last updated
Mar 13, 2023
Impact
The annotation displayer does not execute the content in a restricted context. This allows executing anything with the right of the author of any document by annotating the document.
To reproduce: add an annotation with the content
{{groovy}}print "hello"{{/groovy}}
and click the yellow scare to get a display of the annotation inline.The result is "hello" but it should be an error suggesting that it's not allowed to use the groovy macro.
Patches
This has been patched in XWiki 13.10.11, 14.4.7 and 14.10.
Workarounds
There is no easy workaround except to upgrade.
References
https://jira.xwiki.org/browse/XWIKI-20360
https://jira.xwiki.org/browse/XWIKI-20384
For more information
If you have any questions or comments about this advisory:
Attribution
This vulnerability has been reported by René de Sain @renniepak.
References