Miggo Logo

CVE-2023-29519: org.xwiki.platform:xwiki-platform-attachment-ui vulnerable to Code Injection

8.8

CVSS Score
3.1

Basic Information

EPSS Score
0.93618%
Published
4/20/2023
Updated
11/4/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.xwiki.platform:xwiki-platform-attachment-uimaven>= 3.0-rc-1, < 13.10.1113.10.11
org.xwiki.platform:xwiki-platform-attachment-uimaven>= 14.0-rc-1, < 14.4.814.4.8
org.xwiki.platform:xwiki-platform-attachment-uimaven>= 14.5, < 14.10.214.10.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from unescaped user input in Velocity template-generated HTML. The commit patch adds XML escaping via $escapetool.xml() to the 'name' and 'value' attributes of the hidden input field. The affected code was directly inserting ${classname}${object}${property} and ${propValue} into the HTML output, making it susceptible to code injection when these values contain malicious payloads. The file path and injection pattern match both the CWE-74 description and the provided diff.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t * r**ist*r** us*r **n p*r*orm r*mot* *o** *x**ution l***in* to privil*** *s**l*tion *y inj**tin* t** prop*r *o** in t** "prop*rty" *i*l* o* *n *tt***m*nt s*l**tor, *s * *****t o* t**ir own **s**o*r*. Not* t**t t** vuln*r**ility *o*s not im

Reasoning

T** vuln*r**ility st*ms *rom un*s**p** us*r input in V*lo*ity t*mpl*t*-**n*r*t** *TML. T** *ommit p*t** ***s XML *s**pin* vi* $*s**p*tool.xml() to t** 'n*m*' *n* 'v*lu*' *ttri*ut*s o* t** *i***n input *i*l*. T** *****t** *o** w*s *ir**tly ins*rtin* $