[MAVEN:GHSA-H2RM-29CH-WFMH] XWiki Identity Oauth Privilege escalation (PR)/remote code execution from login screen through unescaped URL parameter
Severity
Critical
Affected Packages
1
Fixed Packages
1
CVEs
1
Impact
When login via the OAuth method, the identityOAuth parameters, sent in a GET request is vulnerable to XSS and XWiki syntax injection. This allows remote code execution via the groovy macro and thus affects the confidentiality, integrity and availability of the whole XWiki installation.
The vulnerability is in this part of the code.
Patches
The issue has been fixed in Identity OAuth version 1.6 by https://github.com/xwikisas/identity-oauth/commit/d805d3154b17c6bf455ddf5deb0a3461a3833bc6 . The fix is in the content of the IdentityOAuth/LoginUIExtension file
Workarounds
There are no known workarounds besides upgrading.
References
Are there any links users can visit to find out more?
- Original report: https://jira.xwiki.org/browse/XWIKI-20719
Package | Affected Version |
---|---|
pkg:maven/com.xwiki.identity-oauth/identity-oauth-ui | >= 1.0, < 1.6 |
Package | Fixed Version |
---|---|
pkg:maven/com.xwiki.identity-oauth/identity-oauth-ui | = 1.6 |
- ID
- MAVEN:GHSA-H2RM-29CH-WFMH
- Severity
- critical
- URL
- https://github.com/advisories/GHSA-h2rm-29ch-wfmh
- Published
-
2023-10-17T12:51:01
(11 months ago) - Modified
-
2023-11-07T05:01:29
(10 months ago) - Rights
- Maven Security Team
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:maven/com.xwiki.identity-oauth/identity-oauth-ui | com.xwiki.identity-oauth | identity-oauth-ui | >= 1.0 < 1.6 | |||
Fixed | pkg:maven/com.xwiki.identity-oauth/identity-oauth-ui | com.xwiki.identity-oauth | identity-oauth-ui | = 1.6 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |