中危 xwiki xwiki 动态执行代码中指令转义处理不恰当(eval注入)
CVE编号
CVE-2022-41928利用情况
暂无补丁情况
官方补丁披露时间
2022-11-24漏洞描述
XWiki Platform vulnerable to Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in AttachmentSelector.xml. The issue can also be reproduced by inserting the dangerous payload in the `height` or `alt` macro properties. This has been patched in versions 13.10.7, 14.4.2, and 14.5. The issue can be fixed on a running wiki by updating `XWiki.AttachmentSelector` with the versions below: - 14.5-rc-1+: https://github.com/xwiki/xwiki-platform/commit/eb15147adf94bddb92626f862c1710d45bcd64a7#diff-e1513599ab698991f6cbba55d38f3f464432ced8d137a668b1f7618c7e747e23 - 14.4.2+: https://github.com/xwiki/xwiki-platform/commit/c02f8eb1f3c953d124f2c097021536f8bc00fa8d#diff-e1513599ab698991f6cbba55d38f3f464432ced8d137a668b1f7618c7e747e23 - 13.10.7+: https://github.com/xwiki/xwiki-platform/commit/efd0df0468d46149ba68b66660b93f31b6318515#diff-e1513599ab698991f6cbba55d38f3f464432ced8d137a668b1f7618c7e747e23解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9hqh-fmhg-vq2j | |
https://jira.xwiki.org/browse/XWIKI-19800 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | xwiki | xwiki | * | From (excluding) 5.0 | Up to (excluding) 13.10.7 | ||||
运行在以下环境 | |||||||||
应用 | xwiki | xwiki | * | From (including) 14.0.0 | Up to (excluding) 14.4.2 | ||||
运行在以下环境 | |||||||||
应用 | xwiki | xwiki | 14.4.3 | - | |||||
运行在以下环境 | |||||||||
应用 | xwiki | xwiki | 14.4.4 | - | |||||
运行在以下环境 | |||||||||
应用 | xwiki | xwiki | 5.0 | - |
- 攻击路径 远程
- 攻击复杂度 复杂
- 权限要求 普通权限
- 影响范围 全局影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 N/A
CWE-ID | 漏洞类型 |
CWE-95 | 动态执行代码中指令转义处理不恰当(Eval注入) |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论