com.xwiki.identity-oauth:identity-oauth-ui is a package to aid in building identity and service providers based on OAuth authorizations. When a user logs in via the OAuth method, the identityOAuth parameters sent in the GET request is vulnerable to cross site scripting (XSS) and XWiki syntax injection. This allows remote code execution via the groovy macro and thus affects the confidentiality, integrity and availability of the whole XWiki installation. The issue has been fixed in Identity OAuth version 1.6. There are no known workarounds for this vulnerability and users are advised to upgrade.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-2744 com.xwiki.identity-oauth:identity-oauth-ui is a package to aid in building identity and service providers based on OAuth authorizations. When a user logs in via the OAuth method, the identityOAuth parameters sent in the GET request is vulnerable to cross site scripting (XSS) and XWiki syntax injection. This allows remote code execution via the groovy macro and thus affects the confidentiality, integrity and availability of the whole XWiki installation. The issue has been fixed in Identity OAuth version 1.6. There are no known workarounds for this vulnerability and users are advised to upgrade.
Github GHSA Github GHSA GHSA-h2rm-29ch-wfmh XWiki Identity Oauth Privilege escalation (PR)/remote code execution from login screen through unescaped URL parameter
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-09-16T14:25:37.420Z

Reserved: 2023-10-04T16:02:46.330Z

Link: CVE-2023-45144

cve-icon Vulnrichment

Updated: 2024-08-02T20:14:19.069Z

cve-icon NVD

Status : Modified

Published: 2023-10-16T21:15:11.333

Modified: 2024-11-21T08:26:26.227

Link: CVE-2023-45144

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.