XWiki Rendering is a generic Rendering system that converts textual input in a given syntax into another syntax. Prior to version 14.10.6 of `org.xwiki.platform:xwiki-core-rendering-macro-footnotes` and `org.xwiki.platform:xwiki-rendering-macro-footnotes` and prior to version 15.1-rc-1 of `org.xwiki.platform:xwiki-rendering-macro-footnotes`, the footnote macro executed its content in a potentially different context than the one in which it was defined. In particular in combination with the include macro, this allows privilege escalation from a simple user account in XWiki to programming rights and thus remote code execution, impacting the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.6 and 15.1-rc-1. There is no workaround apart from upgrading to a fixed version of the footnote macro.
References
Link | Resource |
---|---|
https://github.com/xwiki/xwiki-rendering/commit/5f558b8fac8b716d19999225f38cb8ed0814116e | Patch |
https://github.com/xwiki/xwiki-rendering/security/advisories/GHSA-35j5-m29r-xfq5 | Patch Vendor Advisory |
https://jira.xwiki.org/browse/XRENDERING-688 | Exploit Issue Tracking Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-10-25 18:17
Updated : 2023-10-31 18:48
NVD link : CVE-2023-37912
Mitre link : CVE-2023-37912
CVE.ORG link : CVE-2023-37912
JSON object : View
Products Affected
xwiki
- xwiki-rendering
CWE