CVE-2021-21379 – It's possible to execute anything with the rights of the author of a macro which uses the {{wikimacrocontent}} macro
https://notcve.org/view.php?id=CVE-2021-21379
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions of XWiki Platform, the `{{wikimacrocontent}}` executes the content with the rights of the wiki macro author instead of the caller of that wiki macro. This makes possible to inject scripts through it and they will be executed with the rights of the wiki macro (very often a user which has Programming rights). Fortunately, no such macro exists by default in XWiki Standard but one could have been created or installed with an extension. This vulnerability has been patched in versions XWiki 12.6.3, 11.10.11 and 12.8-rc-1. • https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-v662-xpcc-9xf6 https://jira.xwiki.org/browse/XWIKI-17759 • CWE-281: Improper Preservation of Permissions •
CVE-2020-13654
https://notcve.org/view.php?id=CVE-2020-13654
XWiki Platform before 12.8 mishandles escaping in the property displayer. XWiki Platform versiones anteriores a 12.8, maneja inapropiadamente el escape en el visualizador de propiedades. • https://cve.nstsec.com/cve-2020-13654 https://github.com/xwiki/xwiki-platform/compare/xwiki-platform-12.7.1...xwiki-platform-12.8 https://github.com/xwiki/xwiki-platform/pull/1315 https://jira.xwiki.org/browse/XWIKI-17374 • CWE-116: Improper Encoding or Escaping of Output •
CVE-2020-15252 – RCE in XWiki
https://notcve.org/view.php?id=CVE-2020-15252
In XWiki before version 12.5 and 11.10.6, any user with SCRIPT right (EDIT right before XWiki 7.4) can gain access to the application server Servlet context which contains tools allowing to instantiate arbitrary Java objects and invoke methods that may lead to arbitrary code execution. This is patched in XWiki 12.5 and XWiki 11.10.6. En XWiki versiones anteriores a 2.5 y 11.10.6, cualquier usuario con derecho de SCRIPT (EDITA justo antes de XWiki versión 7.4) puede obtener acceso al contexto de Servlet del servidor de aplicaciones que contiene herramientas que permiten crear instancias de objetos Java arbitrarios e invocar métodos que pueden conllevar a una ejecución de código arbitraria. Esto está parcheado en XWiki versión 12.5 y XWiki versión 11.10.6 • https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-5hv6-mh8q-q9v8 https://jira.xwiki.org/browse/XWIKI-17141 https://jira.xwiki.org/browse/XWIKI-17423 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2020-15171 – Users with SCRIPT rights can execute arbitrary code in XWiki
https://notcve.org/view.php?id=CVE-2020-15171
In XWiki before versions 11.10.5 or 12.2.1, any user with SCRIPT right (EDIT right before XWiki 7.4) can gain access to the application server Servlet context which contains tools allowing to instantiate arbitrary Java objects and invoke methods that may lead to arbitrary code execution. The only workaround is to give SCRIPT right only to trusted users. En XWiki versiones anteriores a 11.10.5 o 12.2.1, cualquier usuario con derecho de SCRIPT (derecho EDIT anterior a XWiki 7.4), puede obtener acceso al contexto del Servlet del servidor de aplicaciones, que contiene herramientas que permiten crear instancias de objetos Java arbitrarios e invocar métodos que pueden conducir a una ejecución de código. La única solución alternativa es otorgar el derecho de SCRIPT solo a los usuarios de confianza • https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-7qw5-pqhc-xm4g • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2020-11057 – Code Injection in XWiki Platform
https://notcve.org/view.php?id=CVE-2020-11057
In XWiki Platform 7.2 through 11.10.2, registered users without scripting/programming permissions are able to execute python/groovy scripts while editing personal dashboards. This has been fixed 11.3.7 , 11.10.3 and 12.0. En XWiki Platform versiones 7.2 hasta 11.10.2, los usuarios registrados sin permisos de programación y scripting son capaces de ejecutar scripts de python y groovy mientras editan paneles de control personales. Esto ha sido corregido en las versiones 11.3.7, 11.10.3 y 12.0. • https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-rmp6-jjg8-9424 https://jira.xwiki.org/browse/XWIKI-16960 https://medium.com/%40andrew.levkin/tews-4c47cfc011d1 • CWE-94: Improper Control of Generation of Code ('Code Injection') •