Miggo Logo

CVE-2022-36099: XWiki Platform Wiki UI Main Wiki Eval Injection vulnerability

10

CVSS Score
3.1

Basic Information

EPSS Score
0.94472%
Published
9/16/2022
Updated
6/27/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.xwiki.platform:xwiki-platform-wiki-ui-mainwikimaven>= 5.3-milestone-2, < 13.10.613.10.6
org.xwiki.platform:xwiki-platform-wiki-ui-mainwikimaven>= 14.0, < 14.414.4

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from two instances of the Velocity translation macro in XWikiServerClassSheet.xml that used $request.domain without proper escaping. The patch explicitly adds rendering escape wrappers (services.rendering.escape and escapetool.java) to sanitize this parameter. This matches the CWE-95 (Eval Injection) pattern where unneutralized user input flows into dynamically evaluated template directives. The direct correlation between the vulnerability description, attack payload examples, and the patched lines confirms this as the injection point.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t It's possi*l* to inj**t *r*itr*ry wiki synt*x in*lu*in* *roovy, Pyt*on *n* V*lo*ity s*ript m**ros vi* t** r*qu*st (URL p*r*m*t*r) usin* t** `XWikiS*rv*r*l*ssS***t` i* t** us*r **s vi*w ****ss to t*is s***t *n* *not**r p*** t**t **s ***n s*

Reasoning

T** vuln*r**ility st*ms *rom two inst*n**s o* t** `V*lo*ity` tr*nsl*tion m**ro in `XWikiS*rv*r*l*ssS***t.xml` t**t us** `$r*qu*st.*om*in` wit*out prop*r *s**pin*. T** p*t** *xpli*itly ***s r*n**rin* *s**p* wr*pp*rs (`s*rvi**s.r*n**rin*.*s**p*` *n* `*