XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions of `org.xwiki.platform:xwiki-platform-logging-ui` it is possible to trick a user with programming rights into visiting a constructed url where e.g., by embedding an image with this URL in a document that is viewed by a user with programming rights which will evaluate an expression in the constructed url and execute it. This issue has been addressed in versions 13.10.11, 14.4.7, and 14.10. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/xwiki/xwiki-platform/commit/49fdfd633ddfa346c522d2fe71754dc72c9496ca | Patch |
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4655-wh7v-3vmg | Exploit Patch Vendor Advisory |
https://jira.xwiki.org/browse/XWIKI-20291 | Exploit Issue Tracking Patch Vendor Advisory |
https://github.com/xwiki/xwiki-platform/commit/49fdfd633ddfa346c522d2fe71754dc72c9496ca | Patch |
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4655-wh7v-3vmg | Exploit Patch Vendor Advisory |
https://jira.xwiki.org/browse/XWIKI-20291 | Exploit Issue Tracking Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:56
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.0 |
References | () https://github.com/xwiki/xwiki-platform/commit/49fdfd633ddfa346c522d2fe71754dc72c9496ca - Patch | |
References | () https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4655-wh7v-3vmg - Exploit, Patch, Vendor Advisory | |
References | () https://jira.xwiki.org/browse/XWIKI-20291 - Exploit, Issue Tracking, Patch, Vendor Advisory |
Information
Published : 2023-04-17 22:15
Updated : 2024-11-21 07:56
NVD link : CVE-2023-29213
Mitre link : CVE-2023-29213
CVE.ORG link : CVE-2023-29213
JSON object : View
Products Affected
xwiki
- xwiki