APIs to evaluate content with Velocity is a package for APIs to evaluate content with Velocity. Starting with version 2.3 and prior to 12.6.7, 12.10.3, and 13.0, the velocity scripts are not properly sandboxed against using the Java File API to perform read or write operations on the filesystem. Writing an attacking script in Velocity requires the Script rights in XWiki so not all users can use it, and it also requires finding an XWiki API which returns a File. The problem has been patched in versions 12.6.7, 12.10.3, and 13.0. There is no easy workaround for fixing this vulnerability other than upgrading and being careful when giving Script rights.
References
Link | Resource |
---|---|
https://github.com/xwiki/xwiki-commons/commit/215951cfb0f808d0bf5b1097c9e7d1e503449ab8 | Patch Third Party Advisory |
https://github.com/xwiki/xwiki-commons/pull/127 | Patch Third Party Advisory |
https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-cvx5-m8vg-vxgc | Third Party Advisory |
https://jira.xwiki.org/browse/XWIKI-5168 | Exploit Vendor Advisory |
https://github.com/xwiki/xwiki-commons/commit/215951cfb0f808d0bf5b1097c9e7d1e503449ab8 | Patch Third Party Advisory |
https://github.com/xwiki/xwiki-commons/pull/127 | Patch Third Party Advisory |
https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-cvx5-m8vg-vxgc | Third Party Advisory |
https://jira.xwiki.org/browse/XWIKI-5168 | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/xwiki/xwiki-commons/commit/215951cfb0f808d0bf5b1097c9e7d1e503449ab8 - Patch, Third Party Advisory | |
References | () https://github.com/xwiki/xwiki-commons/pull/127 - Patch, Third Party Advisory | |
References | () https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-cvx5-m8vg-vxgc - Third Party Advisory | |
References | () https://jira.xwiki.org/browse/XWIKI-5168 - Exploit, Vendor Advisory |
06 Jul 2023, 13:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-22 |
Information
Published : 2022-05-02 22:15
Updated : 2024-11-21 06:51
NVD link : CVE-2022-24897
Mitre link : CVE-2022-24897
CVE.ORG link : CVE-2022-24897
JSON object : View
Products Affected
xwiki
- xwiki
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')