CVE-2023-36470:
XWiki Platform vulnerable to Code Injection in icon themes
10
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.94033%
CWE
Published
6/30/2023
Updated
11/12/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.xwiki.platform:xwiki-platform-icon-default | maven | >= 6.2-milestone-1, < 14.10.6 | 14.10.6 |
org.xwiki.platform:xwiki-platform-icon-script | maven | >= 6.2-milestone-1, < 14.10.6 | 14.10.6 |
org.xwiki.platform:xwiki-platform-icon-script | maven | >= 15.0-rc-1, < 15.2-rc-1 | 15.2-rc-1 |
org.xwiki.platform:xwiki-platform-icon-default | maven | >= 15.0-rc-1, < 15.2-rc-1 | 15.2-rc-1 |
org.xwiki.platform:xwiki-platform-icon-ui | maven | >= 6.2-milestone-1, < 14.10.6 | 14.10.6 |
org.xwiki.platform:xwiki-platform-icon-ui | maven | >= 15.0-rc-1, < 15.2-rc-1 | 15.2-rc-1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from two key issues: 1) The IconManagerScriptService
's render
methods directly injected user-controlled icon theme content (HTML/XWiki syntax) into documents without proper escaping or context isolation. This allowed attackers to execute code in the context of privileged documents. 2) The DefaultIconRenderer
executed Velocity
code from icon themes using the current document's context rather than the icon theme's context, enabling rights escalation. The patches introduced context-aware rendering (via DisplayIconMacro
) and enforced execution within the icon theme's security context, confirming these were the vulnerable points.