CVE-2023-29525 – Privilege escalation from view right on XWiki.Notifications.Code.LegacyNotificationAdministration in xwiki-platform
https://notcve.org/view.php?id=CVE-2023-29525
Affected versions of xwiki are subject to code injection in the `since` parameter of the `/xwiki/bin/view/XWiki/Notifications/Code/LegacyNotificationAdministration` endpoint. • https://github.com/xwiki/xwiki-platform/commit/6d74e2e4aa03d19f0be385ab63ae9e0f0e90a766 https://github.com/xwiki/xwiki-platform/commit/8e7c7f90f2ddaf067cb5b83b181af41513028754#diff-4e13f4ee4a42938bf1201b7ee71ca32edeacba22559daf0bcb89d534e0225949R70 https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-jgg7-w2rj-58cj https://jira.xwiki.org/browse/XWIKI-20287 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •
CVE-2023-29526 – Async and display macro allow displaying and interacting with any document in restricted mode
https://notcve.org/view.php?id=CVE-2023-29526
A comment with either macro will be executed when viewed providing a code injection vector in the context of the running server. • https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gpq5-7p34-vqx5 https://jira.xwiki.org/browse/XRENDERING-694 https://jira.xwiki.org/browse/XWIKI-20394 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •
CVE-2023-29527 – Code injection from account through AWM view sheet in xwiki platform
https://notcve.org/view.php?id=CVE-2023-29527
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions a user without script or programming right may edit a user profile (or any other document) with the wiki editor and add groovy script content. Viewing the document after saving it will execute the groovy script in the server context which provides code execution. This vulnerability has been patched in XWiki 15.0-rc-1 and 14.10.3. Users are advised to upgrade. • https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-jgrg-qvpp-9vwr https://jira.xwiki.org/browse/XWIKI-20423 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •
CVE-2023-25550
https://notcve.org/view.php?id=CVE-2023-25550
A CWE-94: Improper Control of Generation of Code ('Code Injection') vulnerability exists that allows remote code execution via the “hostname” parameter when maliciously crafted hostname syntax is entered. Affected products: StruxureWare Data Center Expert (V7.9.2 and prior) • https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-045-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-045-02.pdf • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2023-25549
https://notcve.org/view.php?id=CVE-2023-25549
A CWE-94: Improper Control of Generation of Code ('Code Injection') vulnerability exists that allows for remote code execution when using a parameter of the DCE network settings endpoint. Affected products: StruxureWare Data Center Expert (V7.9.2 and prior) • https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-045-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-045-02.pdf • CWE-94: Improper Control of Generation of Code ('Code Injection') •