[MAVEN:GHSA-H2RM-29CH-WFMH] XWiki Identity Oauth Privilege escalation (PR)/remote code execution from login screen through unescaped URL parameter

Severity Critical
Affected Packages 1
Fixed Packages 1
CVEs 1

Impact

When login via the OAuth method, the identityOAuth parameters, sent in a GET request is vulnerable to XSS and XWiki syntax injection. This allows remote code execution via the groovy macro and thus affects the confidentiality, integrity and availability of the whole XWiki installation.

The vulnerability is in this part of the code.

Patches

The issue has been fixed in Identity OAuth version 1.6 by https://github.com/xwikisas/identity-oauth/commit/d805d3154b17c6bf455ddf5deb0a3461a3833bc6 . The fix is in the content of the IdentityOAuth/LoginUIExtension file

Workarounds

There are no known workarounds besides upgrading.

References

Are there any links users can visit to find out more?

Package Affected Version
pkg:maven/com.xwiki.identity-oauth/identity-oauth-ui >= 1.0, < 1.6
ID
MAVEN:GHSA-H2RM-29CH-WFMH
Severity
critical
URL
https://github.com/advisories/GHSA-h2rm-29ch-wfmh
Published
2023-10-17T12:51:01
(11 months ago)
Modified
2023-11-07T05:01:29
(10 months ago)
Rights
Maven Security Team
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/com.xwiki.identity-oauth/identity-oauth-ui com.xwiki.identity-oauth identity-oauth-ui >= 1.0 < 1.6
Fixed pkg:maven/com.xwiki.identity-oauth/identity-oauth-ui com.xwiki.identity-oauth identity-oauth-ui = 1.6
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...