CVE-2023-50723

XWiki Platform is a generic wiki platform. Starting in 2.3 and prior to versions 14.10.15, 15.5.2, and 15.7-rc-1, anyone who can edit an arbitrary wiki page in an XWiki installation can gain programming right through several cases of missing escaping in the code for displaying sections in the administration interface. This impacts the confidentiality, integrity and availability of the whole XWiki installation. Normally, all users are allowed to edit their own user profile so this should be exploitable by all users of the XWiki instance. This has been fixed in XWiki 14.10.15, 15.5.2 and 15.7RC1. The patches can be manually applied to the `XWiki.ConfigurableClassMacros` and `XWiki.ConfigurableClass` pages.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*
cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*
cpe:2.3:a:xwiki:xwiki:15.6:-:*:*:*:*:*:*
cpe:2.3:a:xwiki:xwiki:15.6:rc1:*:*:*:*:*:*
cpe:2.3:a:xwiki:xwiki:15.7:rc1:*:*:*:*:*:*

History

19 Dec 2023, 20:33

Type Values Removed Values Added
First Time Xwiki xwiki
Xwiki
CPE cpe:2.3:a:xwiki:xwiki:15.7:rc1:*:*:*:*:*:*
cpe:2.3:a:xwiki:xwiki:15.6:rc1:*:*:*:*:*:*
cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*
cpe:2.3:a:xwiki:xwiki:15.6:-:*:*:*:*:*:*
CWE CWE-95
References () https://jira.xwiki.org/browse/XWIKI-21194 - () https://jira.xwiki.org/browse/XWIKI-21194 - Patch, Vendor Advisory
References () https://github.com/xwiki/xwiki-platform/commit/0f367aaae4e0696f61cf5a67a75edd27d1d16db6 - () https://github.com/xwiki/xwiki-platform/commit/0f367aaae4e0696f61cf5a67a75edd27d1d16db6 - Patch
References () https://jira.xwiki.org/browse/XWIKI-21121 - () https://jira.xwiki.org/browse/XWIKI-21121 - Patch, Vendor Advisory
References () https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-qj86-p74r-7wp5 - () https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-qj86-p74r-7wp5 - Patch, Vendor Advisory
References () https://github.com/xwiki/xwiki-platform/commit/749f6aee1bfbcf191c3734ea0aa9eba3aa63240e - () https://github.com/xwiki/xwiki-platform/commit/749f6aee1bfbcf191c3734ea0aa9eba3aa63240e - Patch
References () https://github.com/xwiki/xwiki-platform/commit/1157c1ecea395aac7f64cd8a6f484b1225416dc7 - () https://github.com/xwiki/xwiki-platform/commit/1157c1ecea395aac7f64cd8a6f484b1225416dc7 - Patch
References () https://github.com/xwiki/xwiki-platform/commit/bd82be936c21b65dee367d558e3050b9b6995713 - () https://github.com/xwiki/xwiki-platform/commit/bd82be936c21b65dee367d558e3050b9b6995713 - Patch
References () https://jira.xwiki.org/browse/XWIKI-21122 - () https://jira.xwiki.org/browse/XWIKI-21122 - Patch, Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8

15 Dec 2023, 20:09

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-15 19:15

Updated : 2024-02-28 20:54


NVD link : CVE-2023-50723

Mitre link : CVE-2023-50723

CVE.ORG link : CVE-2023-50723


JSON object : View

Products Affected

xwiki

  • xwiki
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')

CWE-95

Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')