Page 351 of 8694 results (0.011 seconds)

CVSS: 9.9EPSS: 0%CPEs: 3EXPL: 2

XWiki Commons are technical libraries common to several other top level XWiki projects. Any user with view rights `WikiManager.DeleteWiki` can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the `wikiId` url parameter. The problem has been patched on XWiki 13.10.11, 14.4.7, and 14.10. • https://github.com/xwiki/xwiki-platform/commit/ba4c76265b0b8a5e2218be400d18f08393fe1428#diff-64f39f5f2cc8c6560a44e21a5cfd509ef00e8a2157cd9847c9940a2e08ea43d1R63-R64 https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-w7v9-fc49-4qg4 https://jira.xwiki.org/browse/XWIKI-20297 • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') •

CVSS: 9.9EPSS: 0%CPEs: 3EXPL: 2

XWiki Commons are technical libraries common to several other top level XWiki projects. Any user with view rights on commonly accessible documents including the notification preferences macros can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the user parameter of the macro that provide the notification filters. These macros are used in the user profiles and thus installed by default in XWiki. The vulnerability has been patched in XWiki 13.10.11, 14.4.7 and 14.10. • https://github.com/xwiki/xwiki-platform/commit/cebf9167e4fd64a8777781fc56461e9abbe0b32a https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-p9mj-v5mf-m82x https://jira.xwiki.org/browse/XWIKI-20259 • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') •

CVSS: 9.9EPSS: 0%CPEs: 3EXPL: 2

XWiki Commons are technical libraries common to several other top level XWiki projects. Any user with view rights on commonly accessible documents including the legacy notification activity macro can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the macro parameters of the legacy notification activity macro. This macro is installed by default in XWiki. The vulnerability can be exploited via every wiki page that is editable including the user's profile, but also with just view rights using the HTMLConverter that is part of the CKEditor integration which is bundled with XWiki. • https://github.com/xwiki/xwiki-platform/commit/94392490884635c028199275db059a4f471e57bc https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9pc2-x9qf-7j2q https://jira.xwiki.org/browse/XWIKI-20258 • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') •

CVSS: 8.6EPSS: 0%CPEs: 1EXPL: 1

LilyPond before 2.24 allows attackers to bypass the -dsafe protection mechanism via output-def-lookup or output-def-scope, as demonstrated by dangerous Scheme code in a .ly file that causes arbitrary code execution during conversion to a different file format. • http://lilypond.org/doc/v2.18/Documentation/usage/command_002dline-usage https://gitlab.com/lilypond/lilypond/-/merge_requests/1522 https://lilypond.org/download.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K43PF6VGFJNNGAPY57BW3VMEFFOSMRLF https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ST5BLLQ4GDME3SN7UE5OMNE5GZE66X4Y https://phabricator.wikimedia.org/T259210 https://tracker.debian.org/news/1249694/accepted-lilypond-2221-1-sou • CWE-863: Incorrect Authorization •

CVSS: 9.8EPSS: 6%CPEs: 1EXPL: 3

The Score extension through 0.3.0 for MediaWiki has a remote code execution vulnerability due to improper sandboxing of the GNU LilyPond executable. This allows any user with an ability to edit articles (potentially including unauthenticated anonymous users) to execute arbitrary Scheme or shell code by using crafted {{Image data to generate musical scores containing malicious code. • https://github.com/seqred-s-a/cve-2020-29007 https://phabricator.wikimedia.org/T257062 https://seqred.pl/en/cve-2020-29007-remote-code-execution-in-mediawiki-score https://www.mediawiki.org/wiki/Extension:Score https://www.mediawiki.org/wiki/Extension:Score/2021_security_advisory • CWE-94: Improper Control of Generation of Code ('Code Injection') •