GHSA-h2rm-29ch-wfmh

Suggest an improvement
Source
https://github.com/advisories/GHSA-h2rm-29ch-wfmh
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/10/GHSA-h2rm-29ch-wfmh/GHSA-h2rm-29ch-wfmh.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-h2rm-29ch-wfmh
Aliases
Published
2023-10-17T12:51:01Z
Modified
2023-11-08T04:13:37.383140Z
Severity
  • 10.0 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
XWiki Identity Oauth Privilege escalation (PR)/remote code execution from login screen through unescaped URL parameter
Details

Impact

When login via the OAuth method, the identityOAuth parameters, sent in a GET request is vulnerable to XSS and XWiki syntax injection. This allows remote code execution via the groovy macro and thus affects the confidentiality, integrity and availability of the whole XWiki installation.

The vulnerability is in this part of the code.

Patches

The issue has been fixed in Identity OAuth version 1.6 by https://github.com/xwikisas/identity-oauth/commit/d805d3154b17c6bf455ddf5deb0a3461a3833bc6 . The fix is in the content of the IdentityOAuth/LoginUIExtension file

Workarounds

There are no known workarounds besides upgrading.

References

Are there any links users can visit to find out more?

  • Original report: https://jira.xwiki.org/browse/XWIKI-20719
Database specific
{
    "nvd_published_at": "2023-10-16T21:15:11Z",
    "cwe_ids": [
        "CWE-79"
    ],
    "severity": "CRITICAL",
    "github_reviewed": true,
    "github_reviewed_at": "2023-10-17T12:51:01Z"
}
References

Affected packages

Maven / com.xwiki.identity-oauth:identity-oauth-ui

Package

Name
com.xwiki.identity-oauth:identity-oauth-ui
View open source insights on deps.dev
Purl
pkg:maven/com.xwiki.identity-oauth/identity-oauth-ui

Affected ranges

Type
ECOSYSTEM
Events
Introduced
1.0
Fixed
1.6