CVE-2023-29519
CVSS V2 None
CVSS V3 None
Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. A registered user can perform remote code execution leading to privilege escalation by injecting the proper code in the "property" field of an attachment selector, as a gadget of their own dashboard. Note that the vulnerability does not impact comments of a wiki. The vulnerability has been patched in XWiki 13.10.11, 14.4.8, 14.10.2, 15.0-rc-1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Overview
- CVE ID
- CVE-2023-29519
- Assigner
- security-advisories@github.com
- Vulnerability Status
- Analyzed
- Published Version
- 2023-04-19T00:15:08
- Last Modified Date
- 2023-04-28T17:47:31
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:* | 1 | OR | 13.10.11 | |
cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:* | 1 | OR | 14.0 | 14.4.8 |
cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:* | 1 | OR | 14.5 | 14.10.2 |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-29519 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29519 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-19 01:00:46 | Added to TrackCVE | |||
2023-04-19 01:00:50 | Weakness Enumeration | new | ||
2023-04-19 13:00:57 | 2023-04-19T12:39:38 | CVE Modified Date | updated | |
2023-04-19 13:00:57 | Received | Awaiting Analysis | Vulnerability Status | updated |
2023-04-21 16:01:03 | Awaiting Analysis | Undergoing Analysis | Vulnerability Status | updated |
2023-04-28 18:01:18 | 2023-04-28T17:47:31 | CVE Modified Date | updated | |
2023-04-28 18:01:18 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2023-04-28 18:01:23 | CPE Information | updated |