Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. When an admin disables a user account, the user's profile is executed with the admin's rights. This allows a user to place malicious code in the user profile before getting an admin to disable the user account. To reproduce, as a user without script nor programming rights, edit the about section of your user profile and add `{{groovy}}services.logging.getLogger("attacker").error("Hello from Groovy!"){{/groovy}}`.
As an admin, go to the user profile and click the "Disable this account" button. Then, reload the page. If the logs show `attacker - Hello from Groovy!` then the instance is vulnerable. This has been patched in XWiki 14.10.21, 15.5.5, 15.10.6 and 16.0.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
### Workarounds
We're not aware of any workaround except upgrading.
### References
* https://jira.xwiki.org/browse/XWIKI-21611
* https://github.com/xwiki/xwiki-platform/commit/f89c8f47fad6e5cc7e68c69a7e0acde07f5eed5a
As an admin, go to the user profile and click the "Disable this account" button. Then, reload the page. If the logs show `attacker - Hello from Groovy!` then the instance is vulnerable. This has been patched in XWiki 14.10.21, 15.5.5, 15.10.6 and 16.0.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
### Workarounds
We're not aware of any workaround except upgrading.
### References
* https://jira.xwiki.org/browse/XWIKI-21611
* https://github.com/xwiki/xwiki-platform/commit/f89c8f47fad6e5cc7e68c69a7e0acde07f5eed5a
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-j584-j2vj-3f93 | XWiki Platform allows remote code execution from user account |
References
History
Wed, 05 Feb 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Xwiki
Xwiki xwiki |
|
| CPEs | cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:* cpe:2.3:a:xwiki:xwiki:13.4.7:*:*:*:*:*:*:* cpe:2.3:a:xwiki:xwiki:13.5:rc1:*:*:*:*:*:* cpe:2.3:a:xwiki:xwiki:16.0.0:rc1:*:*:*:*:*:* |
|
| Vendors & Products |
Xwiki
Xwiki xwiki |
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-13T13:51:01.754Z
Reserved: 2024-06-10T19:54:41.362Z
Link: CVE-2024-37899
Updated: 2024-08-02T04:04:23.403Z
Status : Analyzed
Published: 2024-06-20T23:15:52.460
Modified: 2025-02-05T16:01:02.763
Link: CVE-2024-37899
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA