Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. The create action is vulnerable to a CSRF attack, allowing script and thus remote code execution when targeting a user with script/programming right, thus compromising the confidentiality, integrity and availability of the whole XWiki installation. When a user with script right views this image and a log message `ERROR foo - Script executed!` appears in the log, the XWiki installation is vulnerable. This has been patched in XWiki 14.10.9 and 15.4RC1 by requiring a CSRF token for the actual page creation.
Remediation
References
https://github.com/xwiki/xwiki-platform/commit/4b20528808d0c311290b0d9ab2cfc44063380ef7
https://jira.xwiki.org/browse/XWIKI-20849
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4f8m-7h83-9f6m
Related Vulnerabilities
CVE-2021-39150 Vulnerability in maven package com.thoughtworks.xstream:xstream
CVE-2023-32982 Vulnerability in maven package org.jenkins-ci.plugins:ansible
CVE-2022-0437 Vulnerability in npm package karma
CVE-2020-9298 Vulnerability in maven package com.netflix.spinnaker.orca:orca-core
CVE-2017-18077 Vulnerability in maven package org.webjars.npm:brace-expansion