Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name CVE-2023-29515 First vendor Publication 2023-04-19
Vendor Cve Last vendor Modification 2023-04-28

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Overall CVSS Score 5.4
Base Score 5.4 Environmental Score 5.4
impact SubScore 2.7 Temporal Score 5.4
Exploitabality Sub Score 2.3
 
Attack Vector Network Attack Complexity Low
Privileges Required Low User Interaction Required
Scope Changed Confidentiality Impact Low
Integrity Impact Low Availability Impact None
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user who can create a space can become admin of that space through App Within Minutes. The admin right implies the script right and thus allows JavaScript injection. The vulnerability can be exploited by creating an app in App Within Minutes. If the button should be disabled because the user doesn't have global edit right, the app can also be created by directly opening `/xwiki/bin/view/AppWithinMinutes/CreateApplication?wizard=true` on the XWiki installation. This has been patched in XWiki 13.10.11, 14.4.8, 14.10.1 and 15.0 RC1 by not granting the space admin right if the user doesn't have script right on the space where the app is created. Error message are displayed to warn the user that the app will be broken in this case. Users who became space admin through this vulnerability won't loose the space admin right due to the fix, so it is advised to check if all users who created AWM apps should keep their space admin rights. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29515

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 97

Sources (Detail)

Source Url
MISC https://github.com/xwiki/xwiki-platform/commit/e73b890623efa604adc484ad82f37e...
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-44h9-xxvx-pg6x
https://jira.xwiki.org/browse/XWIKI-20190

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
Date Informations
2024-02-02 02:45:05
  • Multiple Updates
2024-02-01 12:29:59
  • Multiple Updates
2023-11-30 02:31:10
  • Multiple Updates
2023-11-03 02:38:29
  • Multiple Updates
2023-11-01 02:31:46
  • Multiple Updates
2023-09-30 13:27:54
  • Multiple Updates
2023-09-05 13:40:26
  • Multiple Updates
2023-09-05 01:29:11
  • Multiple Updates
2023-09-02 13:38:39
  • Multiple Updates
2023-09-02 01:29:38
  • Multiple Updates
2023-08-30 02:27:11
  • Multiple Updates
2023-08-12 13:44:01
  • Multiple Updates
2023-08-12 01:28:52
  • Multiple Updates
2023-08-11 13:35:32
  • Multiple Updates
2023-08-11 01:29:45
  • Multiple Updates
2023-08-06 13:32:39
  • Multiple Updates
2023-08-06 01:28:30
  • Multiple Updates
2023-08-04 13:33:06
  • Multiple Updates
2023-08-04 01:28:55
  • Multiple Updates
2023-07-14 13:32:53
  • Multiple Updates
2023-07-14 01:28:32
  • Multiple Updates
2023-07-12 13:40:16
  • Multiple Updates
2023-07-01 02:23:07
  • Multiple Updates
2023-05-17 02:19:13
  • Multiple Updates
2023-05-02 00:27:19
  • Multiple Updates
2023-04-28 21:27:18
  • Multiple Updates
2023-04-20 02:16:37
  • Multiple Updates
2023-04-20 02:16:36
  • Multiple Updates
2023-04-19 17:27:15
  • Multiple Updates
2023-04-19 09:27:15
  • First insertion