漏洞标题
通过XWiki平台中来宾管理下的section参数实现远程代码执行
漏洞描述信息
## 概述
XWiki Platform的代码中未能正确转义section URL参数,导致具有文档`XWiki.AdminSheet`阅读权限的任何用户(包括未经过身份验证的用户)可以执行代码,包括Groovy代码。
## 影响版本
- XWiki 14.10.14
- XWiki 15.6 RC1
- XWiki 15.5.1
## 细节
- 该漏洞存在于`XWiki.AdminSheet`文档的section URL参数中,未能对其进行适当转义。
- 任何具有该文档读取权限的用户可以利用此漏洞执行任意代码,包括Groovy代码。
## 影响
- 该漏洞会影响XWiki实例的机密性、完整性和可用性。
- 用户应升级到修复版本。无法升级的用户可手动应用修复补丁`fec8e0e53f9`。
- 为防止未认证用户攻击,可从该文档中移除访客查看权限(此权限仅对空间和Wiki管理员是必需的)。
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
漏洞类别
对生成代码的控制不恰当(代码注入)
漏洞标题
Remote code execution through the section parameter in Administration as guest in XWiki Platform
漏洞描述信息
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. XWiki doesn't properly escape the section URL parameter that is used in the code for displaying administration sections. This allows any user with read access to the document `XWiki.AdminSheet` (by default, everyone including unauthenticated users) to execute code including Groovy code. This impacts the confidentiality, integrity and availability of the whole XWiki instance. This vulnerability has been patched in XWiki 14.10.14, 15.6 RC1 and 15.5.1. Users are advised to upgrade. Users unablr to upgrade may apply the fix in commit `fec8e0e53f9` manually. Alternatively, to protect against attacks from unauthenticated users, view right for guests can be removed from this document (it is only needed for space and wiki admins).
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
漏洞类别
对生成代码的控制不恰当(代码注入)
漏洞标题
XWiki Platform 安全漏洞
漏洞描述信息
XWiki Platform是法国XWiki基金会的一套用于创建Web协作应用程序的Wiki平台。 XWiki Platform存在安全漏洞,该漏洞源于没有正确转义代码中用于显示管理部分的URL参数。
CVSS信息
N/A
漏洞类别
其他