Vulnerability Details : CVE-2022-41934
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with view rights on commonly accessible documents including the menu macro can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation due to improper escaping of the macro content and parameters of the menu macro. The problem has been patched in XWiki 14.6RC1, 13.10.8 and 14.4.3. The patch (commit `2fc20891`) for the document `Menu.MenuMacro` can be manually applied or a XAR archive of a patched version can be imported. The menu macro was basically unchanged since XWiki 11.6 so on XWiki 11.6 or later the patch for version of 13.10.8 (commit `59ccca24a`) can most likely be applied, on XWiki version 14.0 and later the versions in XWiki 14.6 and 14.4.3 should be appropriate.
Products affected by CVE-2022-41934
- cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*
- cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*
- cpe:2.3:a:xwiki:xwiki:14.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:xwiki:xwiki:14.4.5:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-41934
0.52%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 77 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-41934
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST | |
9.9
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
3.1
|
6.0
|
GitHub, Inc. |
CWE ids for CVE-2022-41934
-
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.Assigned by: security-advisories@github.com (Secondary)
-
The product prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-41934
-
https://www.xwiki.org/xwiki/bin/view/Documentation/UserGuide/Features/Imports#HImportingXWikipages
Imports (XWiki.org)Vendor Advisory
-
https://jira.xwiki.org/browse/XWIKI-19857
[XWIKI-19857] Privilege escalation (PR) from view rights through the menu macro - XWiki.org JIRAExploit;Issue Tracking;Patch;Vendor Advisory
-
https://github.com/xwiki/xwiki-platform/commit/2fc20891e6c6b0ca05ee07e315e7f435e8919f8d
XWIKI-19857: Modernize the menu macro and add escaping · xwiki/xwiki-platform@2fc2089 · GitHubPatch;Third Party Advisory
-
https://github.com/xwiki/xwiki-platform/commit/59ccca24a8465a19f40c51d65fcc2c09c1edea16
XWIKI-19857: Modernize the menu macro and add escaping · xwiki/xwiki-platform@59ccca2 · GitHubPatch;Third Party Advisory
-
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-6w8h-26xx-cf8q
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in org.xwiki.platform:xwiki-platform-menu-ui · Advisory · xwiki/xwiki-platform · GitHubExploit;Patch;Third Party Advisory
Jump to