CVE-2020-13654
https://notcve.org/view.php?id=CVE-2020-13654
XWiki Platform before 12.8 mishandles escaping in the property displayer. XWiki Platform versiones anteriores a 12.8, maneja inapropiadamente el escape en el visualizador de propiedades. • https://cve.nstsec.com/cve-2020-13654 https://github.com/xwiki/xwiki-platform/compare/xwiki-platform-12.7.1...xwiki-platform-12.8 https://github.com/xwiki/xwiki-platform/pull/1315 https://jira.xwiki.org/browse/XWIKI-17374 • CWE-116: Improper Encoding or Escaping of Output •
CVE-2020-15252 – RCE in XWiki
https://notcve.org/view.php?id=CVE-2020-15252
In XWiki before version 12.5 and 11.10.6, any user with SCRIPT right (EDIT right before XWiki 7.4) can gain access to the application server Servlet context which contains tools allowing to instantiate arbitrary Java objects and invoke methods that may lead to arbitrary code execution. This is patched in XWiki 12.5 and XWiki 11.10.6. En XWiki versiones anteriores a 2.5 y 11.10.6, cualquier usuario con derecho de SCRIPT (EDITA justo antes de XWiki versión 7.4) puede obtener acceso al contexto de Servlet del servidor de aplicaciones que contiene herramientas que permiten crear instancias de objetos Java arbitrarios e invocar métodos que pueden conllevar a una ejecución de código arbitraria. Esto está parcheado en XWiki versión 12.5 y XWiki versión 11.10.6 • https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-5hv6-mh8q-q9v8 https://jira.xwiki.org/browse/XWIKI-17141 https://jira.xwiki.org/browse/XWIKI-17423 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2020-15171 – Users with SCRIPT rights can execute arbitrary code in XWiki
https://notcve.org/view.php?id=CVE-2020-15171
In XWiki before versions 11.10.5 or 12.2.1, any user with SCRIPT right (EDIT right before XWiki 7.4) can gain access to the application server Servlet context which contains tools allowing to instantiate arbitrary Java objects and invoke methods that may lead to arbitrary code execution. The only workaround is to give SCRIPT right only to trusted users. En XWiki versiones anteriores a 11.10.5 o 12.2.1, cualquier usuario con derecho de SCRIPT (derecho EDIT anterior a XWiki 7.4), puede obtener acceso al contexto del Servlet del servidor de aplicaciones, que contiene herramientas que permiten crear instancias de objetos Java arbitrarios e invocar métodos que pueden conducir a una ejecución de código. La única solución alternativa es otorgar el derecho de SCRIPT solo a los usuarios de confianza • https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-7qw5-pqhc-xm4g • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2018-16277
https://notcve.org/view.php?id=CVE-2018-16277
The Image Import function in XWiki through 10.7 has XSS. La función Image Import en XWiki hasta la versión 10.7 tiene Cross-Site Scripting (XSS). • https://mksec.tk/index.php/2018/09/27/cve-2018-16277-xss-in-xwiki • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •