CVE-2023-26477
CVSS V2 None
CVSS V3 None
Description
XWiki Platform is a generic wiki platform. Starting in versions 6.3-rc-1 and 6.2.4, it's possible to inject arbitrary wiki syntax including Groovy, Python and Velocity script macros via the `newThemeName` request parameter (URL parameter), in combination with additional parameters. This has been patched in the supported versions 13.10.10, 14.9-rc-1, and 14.4.6. As a workaround, it is possible to edit `FlamingoThemesCode.WebHomeSheet` and manually perform the changes from the patch fixing the issue.
Overview
- CVE ID
- CVE-2023-26477
- Assigner
- security-advisories@github.com
- Vulnerability Status
- Analyzed
- Published Version
- 2023-03-02T18:15:10
- Last Modified Date
- 2023-03-10T05:00:53
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:* | 1 | OR | 6.2.4 | 13.10.10 |
cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:* | 1 | OR | 14.0 | 14.4.6 |
cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:* | 1 | OR | 14.5 | 14.9 |
References
Reference URL | Reference Tags |
---|---|
https://github.com/xwiki/xwiki-platform/commit/ea2e615f50a918802fd60b09ec87aa04bc6ea8e2#diff-e2153fa59f9d92ef67b0afbf27984bd17170921a3b558fac227160003d0dfd2aR283-R284 | Patch |
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-x2qm-r4wx-8gpg | Exploit Vendor Advisory |
https://jira.xwiki.org/browse/XWIKI-19757 | Exploit Issue Tracking Vendor Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-26477 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26477 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-17 05:52:17 | Added to TrackCVE | |||
2023-04-17 05:52:19 | Weakness Enumeration | new |