// For flags

CVE-2023-45138

Change Request Application vulnerable to XSS and remote code execution through change request title

Severity Score

9.6
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

Change Request is an pplication allowing users to request changes on a wiki without publishing the changes directly. Starting in version 0.11 and prior to version 1.9.2, it's possible for a user without any specific right to perform script injection and remote code execution just by inserting an appropriate title when creating a new Change Request. This vulnerability is particularly critical as Change Request aims at being created by user without any particular rights. The vulnerability has been fixed in Change Request 1.9.2. It's possible to workaround the issue without upgrading by editing the document `ChangeRequest.Code.ChangeRequestSheet` and by performing the same change as in the fix commit.

Change Request es una aplicación que permite a los usuarios solicitar cambios en una wiki sin publicar los cambios directamente. A partir de la versión 0.11 y antes de la versión 1.9.2, es posible que un usuario sin ningún derecho específico realice inyección de script y ejecución remota de código simplemente insertando un título apropiado al crear una nueva Change Request. Esta vulnerabilidad es particularmente crítica ya que Change Request pretende ser creada por un usuario sin ningún derecho particular. La vulnerabilidad se ha solucionado en Change Request 1.9.2. Es posible workaround en el problema sin actualizar editando el documento `ChangeRequest.Code.ChangeRequestSheet` y realizando el mismo cambio que en el commit de corrección.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2023-10-04 CVE Reserved
  • 2023-10-12 CVE Published
  • 2024-09-18 CVE Updated
  • 2024-11-13 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Xwiki
Search vendor "Xwiki"
Change Request
Search vendor "Xwiki" for product "Change Request"
>= 0.11 < 1.9.2
Search vendor "Xwiki" for product "Change Request" and version " >= 0.11 < 1.9.2"
-
Affected