XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. The create action is vulnerable to a CSRF attack, allowing script and thus remote code execution when targeting a user with script/programming right, thus compromising the confidentiality, integrity and availability of the whole XWiki installation. When a user with script right views this image and a log message `ERROR foo - Script executed!` appears in the log, the XWiki installation is vulnerable. This has been patched in XWiki 14.10.9 and 15.4RC1 by requiring a CSRF token for the actual page creation.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-2206 XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. The create action is vulnerable to a CSRF attack, allowing script and thus remote code execution when targeting a user with script/programming right, thus compromising the confidentiality, integrity and availability of the whole XWiki installation. When a user with script right views this image and a log message `ERROR foo - Script executed!` appears in the log, the XWiki installation is vulnerable. This has been patched in XWiki 14.10.9 and 15.4RC1 by requiring a CSRF token for the actual page creation.
Github GHSA Github GHSA GHSA-4f8m-7h83-9f6m XWiki Platform vulnerable to CSRF privilege escalation/RCE via the create action
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-10-02T20:19:27.637Z

Reserved: 2023-08-16T18:24:02.390Z

Link: CVE-2023-40572

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-08-24T02:15:09.643

Modified: 2024-11-21T08:19:44.413

Link: CVE-2023-40572

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.