Miggo Logo

CVE-2023-36468: Upgrading doesn't prevent exploiting vulnerable XWiki documents

10

CVSS Score
3.1

Basic Information

EPSS Score
0.91129%
Published
6/30/2023
Updated
11/12/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.xwiki.platform:xwiki-platform-oldcoremaven>= 2.0, < 14.10.714.10.7
org.xwiki.platform:xwiki-platform-oldcoremaven>= 15.0-rc-1, < 15.2-rc-115.2-rc-1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from XWiki's handling of old document revisions. Prior to the patch, functions responsible for rendering document content (titles, transformations, and general content) did not account for a 'restricted' mode. The commit introduced checks for document.isRestricted() in these areas to disable script execution in old revisions. The vulnerable functions are those that previously processed content without these checks, allowing attackers to exploit old vulnerable versions by specifying revision parameters (rev=1.1). Key examples include title evaluation in AbstractDocumentTitleDisplayer, transformation context handling in XWikiDocumentCompatibilityAspect, and content rendering in XWikiDocument - all lacked restricted mode enforcement before the patch.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t W**n *n XWiki inst*ll*tion is up*r**** *n* t**t up*r*** *ont*ins * *ix *or * *u* in * *o*um*nt, just * n*w v*rsion o* t**t *o*um*nt is *****. In som* **s*s, it's still possi*l* to *xploit t** vuln*r**ility t**t w*s *ix** in t** n*w v*rsio

Reasoning

T** vuln*r**ility st*ms *rom XWiki's **n*lin* o* ol* *o*um*nt r*visions. Prior to t** p*t**, *un*tions r*sponsi*l* *or r*n**rin* *o*um*nt *ont*nt (titl*s, tr*ns*orm*tions, *n* **n*r*l *ont*nt) *i* not ***ount *or * 'r*stri*t**' mo**. T** *ommit intro