CVE-2023-36468: Upgrading doesn't prevent exploiting vulnerable XWiki documents
10
Basic Information
Technical Details
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.xwiki.platform:xwiki-platform-oldcore | maven | >= 2.0, < 14.10.7 | 14.10.7 |
| org.xwiki.platform:xwiki-platform-oldcore | maven | >= 15.0-rc-1, < 15.2-rc-1 | 15.2-rc-1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from XWiki's handling of old document revisions. Prior to the patch, functions responsible for rendering document content (titles, transformations, and general content) did not account for a 'restricted' mode. The commit introduced checks for document.isRestricted() in these areas to disable script execution in old revisions. The vulnerable functions are those that previously processed content without these checks, allowing attackers to exploit old vulnerable versions by specifying revision parameters (rev=1.1). Key examples include title evaluation in AbstractDocumentTitleDisplayer, transformation context handling in XWikiDocumentCompatibilityAspect, and content rendering in XWikiDocument - all lacked restricted mode enforcement before the patch.