Skip to content

XWiki Platform allows remote code execution from user account

Critical severity GitHub Reviewed Published Jun 20, 2024 in xwiki/xwiki-platform • Updated Jun 21, 2024

Package

maven org.xwiki.platform:xwiki-platform-oldcore (Maven)

Affected versions

>= 13.4.7, < 13.5
>= 13.10.3, < 14.10.21
>= 15.0-rc-1, < 15.5.5
>= 15.6-rc-1, < 15.10.6
>= 16.0.0-rc-1, < 16.0.0

Patched versions

14.10.21
14.10.21
15.5.5
15.10.6
16.0.0

Description

Impact

When an admin disables a user account, the user's profile is executed with the admin's rights. This allows a user to place malicious code in the user profile before getting an admin to disable the user account.

To reproduce, as a user without script nor programming rights, edit the about section of your user profile and add {{groovy}}services.logging.getLogger("attacker").error("Hello from Groovy!"){{/groovy}}.
As an admin, go to the user profile and click the "Disable this account" button.
Then, reload the page. If the logs show attacker - Hello from Groovy! then the instance is vulnerable.

Patches

This has been patched in XWiki 14.10.21, 15.5.5, 15.10.6 and 16.0.0.

Workarounds

We're not aware of any workaround except upgrading.

References

References

@michitux michitux published to xwiki/xwiki-platform Jun 20, 2024
Published to the GitHub Advisory Database Jun 20, 2024
Reviewed Jun 20, 2024
Published by the National Vulnerability Database Jun 20, 2024
Last updated Jun 21, 2024

Severity

Critical
9.1
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

CVE ID

CVE-2024-37899

GHSA ID

GHSA-j584-j2vj-3f93

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.