Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-29514— Code injection in template provider administration in xwiki-platform

CVSS 10.0 · Critical EPSS 30.22% · P97
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-29514

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Code injection in template provider administration in xwiki-platform
Source: NVD (National Vulnerability Database)
Vulnerability Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with edit rights on any document (e.g., their own user profile) can execute code with programming rights, leading to remote code execution. This vulnerability has been patched in XWiki 13.10.11, 14.4.8, 14.10.1 and 15.0 RC1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
输出中的特殊元素转义处理不恰当(注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
XWiki Platform 注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
XWiki Platform是法国XWiki公司的一套用于创建Web协作应用程序的Wiki平台。 XWiki Platform 存在注入漏洞,该漏洞源于任何对任何文档具有编辑权限的用户(例如,他们自己的用户配置文件)都可以使用编程权限执行代码,从而实现远程代码执行。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
xwikixwiki-platform < 13.10.11 -

II. Public POCs for CVE-2023-29514

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-29514

登录查看更多情报信息。

Same Patch Batch · xwiki · 2023-04-18 · 17 CVEs total

CVE-2023-2951010.0 CRITICALCode injection via unescaped translations in xwiki-platform
CVE-2023-2952310.0 CRITICALCode injection in display method used in user profiles in xwiki-platform
CVE-2023-2952410.0 CRITICALCode injection from account through XWiki.SchedulerJobSheet in xwiki-platform
CVE-2023-2952510.0 CRITICALPrivilege escalation from view right on XWiki.Notifications.Code.LegacyNotificationAdminis
CVE-2023-2952610.0 CRITICALAsync and display macro allow displaying and interacting with any document in restricted m
CVE-2023-2952710.0 CRITICALCode injection from account through AWM view sheet in xwiki platform
CVE-2023-295169.9 CRITICALCode injection from view right on XWiki.AttachmentSelector in xwiki-platform
CVE-2023-295129.9 CRITICALCode injection in xwiki-platform-web-templates
CVE-2023-295229.9 CRITICALCode injection from view right on XWiki.ClassSheet in xwiki-platform
CVE-2023-295189.9 CRITICALCode injection from view right using Invitation.InvitationCommon in xwiki-platform
CVE-2023-295199.1 CRITICALCode injection in org.xwiki.platform:xwiki-platform-attachment-ui
CVE-2023-295218.4 HIGHCode injection from account/view through VFS Tree macro in xwiki-platform
CVE-2023-295157.7 HIGHCross-site scripting (XSS) in xwiki-platform
CVE-2023-295177.5 HIGHExposure of Sensitive Information to an Unauthorized Actor in org.xwiki.platform:xwiki-pla
CVE-2023-295135.0 MEDIUMUsers can be created even when registration is disabled without validation via the templat
CVE-2023-295204.3 MEDIUMPage render failure due to broken translations in xwiki-platform

IV. Related Vulnerabilities

V. Comments for CVE-2023-29514

No comments yet


Leave a comment