Miggo Logo

CVE-2023-46731: XWiki Platform vulnerable to remote code execution through the section parameter in Administration as guest

10

CVSS Score
3.1

Basic Information

EPSS Score
0.98019%
Published
11/8/2023
Updated
11/8/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.xwiki.platform:xwiki-platform-administration-uimaven< 14.10.1414.10.14
org.xwiki.platform:xwiki-platform-administration-uimaven>= 15.0-rc-1, < 15.5.115.5.1
org.xwiki.platform:xwiki-platform-administrationmaven< 14.10.1414.10.14

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The patch directly modifies the call to $services.localization.render, indicating that this function is central to the vulnerability. The change adds a syntax parameter ('xwiki/2.1') to the render method, suggesting that without it, the method was vulnerable to interpreting the $sectionName in an unintended way, potentially leading to code execution.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t XWiki *o*sn't prop*rly *s**p* t** s**tion URL p*r*m*t*r t**t is us** in t** *o** *or *ispl*yin* **ministr*tion s**tions. T*is *llows *ny us*r wit* r*** ****ss to t** *o*um*nt `XWiki.**minS***t` (*y ****ult, *v*ryon* in*lu*in* un*ut**nti**t

Reasoning

T** p*t** *ir**tly mo*i*i*s t** **ll to `$s*rvi**s.lo**liz*tion.r*n**r`, in*i**tin* t**t t*is *un*tion is **ntr*l to t** vuln*r**ility. T** ***n** ***s * synt*x p*r*m*t*r ('xwiki/*.*') to t** `r*n**r` m*t*o*, su***stin* t**t wit*out it, t** m*t*o* w*