XWiki 平台图标主题中的代码注入 (CVE-2023-36470)

admin 2023-11-29 22:53:28 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
中危 XWiki 平台图标主题中的代码注入 (CVE-2023-36470)

CVE编号

CVE-2023-36470

利用情况

暂无

补丁情况

官方补丁

披露时间

2023-06-30
漏洞描述
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. By either creating a new or editing an existing document with an icon set, an attacker can inject XWiki syntax and Velocity code that is executed with programming rights and thus allows remote code execution. There are different attack vectors, the simplest is the Velocity code in the icon set's HTML or XWiki syntax definition. The [icon picker](https://extensions.xwiki.org/xwiki/bin/view/Extension/Icon%20Theme%20Application#HIconPicker) can be used to trigger the rendering of any icon set. The XWiki syntax variant of the icon set is also used without any escaping in some documents, allowing to inject XWiki syntax including script macros into a document that might have programming right, for this the currently used icon theme needs to be edited. Further, the HTML output of the icon set is output as JSON in the icon picker and this JSON is interpreted as XWiki syntax, allowing again the injection of script macros into a document with programming right and thus allowing remote code execution. This impacts the confidentiality, integrity and availability of the whole XWiki instance. This issue has been patched in XWiki 14.10.6 and 15.1. Icon themes now require script right and the code in the icon theme is executed within the context of the icon theme, preventing any rights escalation. A macro for displaying icons has been introduced to avoid injecting the raw wiki syntax of an icon set into another document. Users are advised to upgrade. There are no known workarounds for this vulnerability.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://github.com/xwiki/xwiki-platform/commit/46b542854978e9caa687a5c2b8817b...
https://github.com/xwiki/xwiki-platform/commit/79418dd92ca11941b46987ef881bf5...
https://github.com/xwiki/xwiki-platform/commit/b0cdfd893912baaa053d106a92e39f...
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-fm68-j7ww-h9xf
https://jira.xwiki.org/browse/XWIKI-20524
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 xwiki xwiki * From (including) 6.2 Up to (excluding) 14.10.6
运行在以下环境
应用 xwiki xwiki 15.0 -
运行在以下环境
应用 xwiki xwiki 15.1 -
阿里云评分 6.6
  • 攻击路径 远程
  • 攻击复杂度 复杂
  • 权限要求 普通权限
  • 影响范围 全局影响
  • EXP成熟度 未验证
  • 补丁情况 官方补丁
  • 数据保密性 无影响
  • 数据完整性 无影响
  • 服务器危害 无影响
  • 全网数量 N/A
CWE-ID 漏洞类型
CWE-74 输出中的特殊元素转义处理不恰当(注入)
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0