CVE-2023-29204 – URL Redirection to Untrusted Site ('Open Redirect') in org.xwiki.platform:xwiki-platform-oldcore
https://notcve.org/view.php?id=CVE-2023-29204
XWiki Commons are technical libraries common to several other top level XWiki projects. It is possible to bypass the existing security measures put in place to avoid open redirect by using a redirect such as `//mydomain.com` (i.e. omitting the `http:`). It was also possible to bypass it when using URL such as `http:/mydomain.com`. The problem has been patched on XWiki 13.10.10, 14.4.4 and 14.8RC1. • https://github.com/xwiki/xwiki-platform/commit/e4f7f68e93cb08c25632c126356d218abf192d1e#diff-c445f288d5d63424f56ef13f65514ab4e174a72e979b53b88197c2b7def267cf https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-xwph-x6xj-wggv https://jira.xwiki.org/browse/XWIKI-10309 https://jira.xwiki.org/browse/XWIKI-19994 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •
CVE-2023-29203 – Unauthenticated user can have information about hidden users on subwikis through uorgsuggest.vm
https://notcve.org/view.php?id=CVE-2023-29203
XWiki Commons are technical libraries common to several other top level XWiki projects. It's possible to list some users who are normally not viewable from subwiki by requesting users on a subwiki which allows only global users with `uorgsuggest.vm`. This issue only concerns hidden users from main wiki. Note that the disclosed information are the username and the first and last name of users, no other information is leaked. The problem has been patched on XWiki 13.10.8, 14.4.3 and 14.7RC1. • https://github.com/xwiki/xwiki-platform/pull/1883 https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-vvp7-r422-rx83 https://jira.xwiki.org/browse/XWIKI-20007 • CWE-359: Exposure of Private Personal Information to an Unauthorized Actor CWE-668: Exposure of Resource to Wrong Sphere •
CVE-2023-27480 – Data leak through a XAR import XXE attack in xwiki-platform-xar-model
https://notcve.org/view.php?id=CVE-2023-27480
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with edit rights on a document can trigger an XAR import on a forged XAR file, leading to the ability to display the content of any file on the XWiki server host. This vulnerability has been patched in XWiki 13.10.11, 14.4.7 and 14.10-rc-1. Users are advised to upgrade. Users unable to upgrade may apply the patch `e3527b98fd` manually. • https://github.com/xwiki/xwiki-platform/commit/e3527b98fdd8dc8179c24dc55e662b2c55199434 https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gx4f-976g-7g6v https://jira.xwiki.org/browse/XWIKI-20320 • CWE-611: Improper Restriction of XML External Entity Reference •
CVE-2023-27479 – Improper Neutralization of Directives in Dynamically Evaluated Code in org.xwiki.platform:xwiki-platform-panels-ui
https://notcve.org/view.php?id=CVE-2023-27479
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with view rights can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of UIX parameters. A proof of concept exploit is to log in, add an `XWiki.UIExtensionClass` xobject to the user profile page, with an Extension Parameters content containing `label={{/html}} {{async async="true" cached="false" context="doc.reference"}}{{groovy}}println("Hello " + "from groovy!"){{/groovy}}{{/async}}`. • https://github.com/xwiki/xwiki-platform/commit/6de5442f3c91c3634a66c7b458d5b142e1c2a2dc https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-qxjg-jhgw-qhrv https://jira.xwiki.org/browse/XWIKI-20294 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •
CVE-2023-26056 – XWiki Platform allows macro execution as any user without programming rights through the context macro
https://notcve.org/view.php?id=CVE-2023-26056
XWiki Platform is a generic wiki platform. Starting in version 3.0-milestone-1, it's possible to execute a script with the right of another user, provided the target user does not have programming right. The problem has been patched in XWiki 14.8-rc-1, 14.4.5, and 13.10.10. There are no known workarounds for this issue. • https://github.com/xwiki/xwiki-platform/commit/4b75f212c2dd2dfc5fb5726c7830c6dbc9a425c6 https://github.com/xwiki/xwiki-platform/commit/bd34ad6710ed72304304a3d5fec38b7cc050ef3b https://github.com/xwiki/xwiki-platform/commit/dd3f4735b41971b3afc3f3aedf6664b4e8be4894 https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-859x-p6jp-rc2w https://jira.xwiki.org/browse/XWIKI-19856 • CWE-863: Incorrect Authorization •