Vulnerabilites related to xwiki-contrib - application-admintools
cve-2023-48292
Vulnerability from cvelistv5
Published
2023-11-20 18:02
Modified
2024-08-02 21:23
Severity ?
EPSS score ?
Summary
The XWiki Admin Tools Application provides tools to help the administration of XWiki. Starting in version 4.4 and prior to version 4.5.1, a cross site request forgery vulnerability in the admin tool for executing shell commands on the server allows an attacker to execute arbitrary shell commands by tricking an admin into loading the URL with the shell command. A very simple possibility for an attack are comments. When the attacker can leave a comment on any page in the wiki it is sufficient to include an image with an URL like `/xwiki/bin/view/Admin/RunShellCommand?command=touch%20/tmp/attacked` in the comment. When an admin views the comment, the file `/tmp/attacked` will be created on the server. The output of the command is also vulnerable to XWiki syntax injection which offers a simple way to execute Groovy in the context of the XWiki installation and thus an even easier way to compromise the integrity and confidentiality of the whole XWiki installation. This has been patched by adding a form token check in version 4.5.1 of the admin tools. Some workarounds are available. The patch can be applied manually to the affected wiki pages. Alternatively, the document `Admin.RunShellCommand` can also be deleted if the possibility to run shell commands isn't needed.
References
▼ | URL | Tags |
---|---|---|
https://github.com/xwiki-contrib/application-admintools/security/advisories/GHSA-8jpr-ff92-hpf9 | x_refsource_CONFIRM | |
https://github.com/xwiki-contrib/application-admintools/commit/03815c505c9f37006a0c56495e862dc549a39da8 | x_refsource_MISC | |
https://jira.xwiki.org/browse/ADMINTOOL-91 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
xwiki-contrib | application-admintools |
Version: >= 4.4, < 4.5.1 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T21:23:39.506Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "https://github.com/xwiki-contrib/application-admintools/security/advisories/GHSA-8jpr-ff92-hpf9", tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/xwiki-contrib/application-admintools/security/advisories/GHSA-8jpr-ff92-hpf9", }, { name: "https://github.com/xwiki-contrib/application-admintools/commit/03815c505c9f37006a0c56495e862dc549a39da8", tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/xwiki-contrib/application-admintools/commit/03815c505c9f37006a0c56495e862dc549a39da8", }, { name: "https://jira.xwiki.org/browse/ADMINTOOL-91", tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://jira.xwiki.org/browse/ADMINTOOL-91", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "application-admintools", vendor: "xwiki-contrib", versions: [ { status: "affected", version: ">= 4.4, < 4.5.1", }, ], }, ], descriptions: [ { lang: "en", value: "The XWiki Admin Tools Application provides tools to help the administration of XWiki. Starting in version 4.4 and prior to version 4.5.1, a cross site request forgery vulnerability in the admin tool for executing shell commands on the server allows an attacker to execute arbitrary shell commands by tricking an admin into loading the URL with the shell command. A very simple possibility for an attack are comments. When the attacker can leave a comment on any page in the wiki it is sufficient to include an image with an URL like `/xwiki/bin/view/Admin/RunShellCommand?command=touch%20/tmp/attacked` in the comment. When an admin views the comment, the file `/tmp/attacked` will be created on the server. The output of the command is also vulnerable to XWiki syntax injection which offers a simple way to execute Groovy in the context of the XWiki installation and thus an even easier way to compromise the integrity and confidentiality of the whole XWiki installation. This has been patched by adding a form token check in version 4.5.1 of the admin tools. Some workarounds are available. The patch can be applied manually to the affected wiki pages. Alternatively, the document `Admin.RunShellCommand` can also be deleted if the possibility to run shell commands isn't needed.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.7, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-352", description: "CWE-352: Cross-Site Request Forgery (CSRF)", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-11-20T18:02:42.934Z", orgId: "a0819718-46f1-4df5-94e2-005712e83aaa", shortName: "GitHub_M", }, references: [ { name: "https://github.com/xwiki-contrib/application-admintools/security/advisories/GHSA-8jpr-ff92-hpf9", tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/xwiki-contrib/application-admintools/security/advisories/GHSA-8jpr-ff92-hpf9", }, { name: "https://github.com/xwiki-contrib/application-admintools/commit/03815c505c9f37006a0c56495e862dc549a39da8", tags: [ "x_refsource_MISC", ], url: "https://github.com/xwiki-contrib/application-admintools/commit/03815c505c9f37006a0c56495e862dc549a39da8", }, { name: "https://jira.xwiki.org/browse/ADMINTOOL-91", tags: [ "x_refsource_MISC", ], url: "https://jira.xwiki.org/browse/ADMINTOOL-91", }, ], source: { advisory: "GHSA-8jpr-ff92-hpf9", discovery: "UNKNOWN", }, title: "XWiki Admin Tools Application Run Shell Command allows CSRF RCE attacks", }, }, cveMetadata: { assignerOrgId: "a0819718-46f1-4df5-94e2-005712e83aaa", assignerShortName: "GitHub_M", cveId: "CVE-2023-48292", datePublished: "2023-11-20T18:02:42.934Z", dateReserved: "2023-11-14T17:41:15.570Z", dateUpdated: "2024-08-02T21:23:39.506Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-48293
Vulnerability from cvelistv5
Published
2023-11-20 18:14
Modified
2024-10-11 15:23
Severity ?
EPSS score ?
Summary
The XWiki Admin Tools Application provides tools to help the administration of XWiki. Prior to version 4.5.1, a cross-site request forgery vulnerability in the query on XWiki tool allows executing arbitrary database queries on the database of the XWiki installation. Among other things, this allows modifying and deleting all data of the wiki. This could be both used to damage the wiki and to create an account with elevated privileges for the attacker, thus impacting the confidentiality, integrity and availability of the whole XWiki instance. A possible attack vector are comments on the wiki, by embedding an image with wiki syntax like `[[image:path:/xwiki/bin/view/Admin/QueryOnXWiki?query=DELETE%20FROM%20xwikidoc]]`, all documents would be deleted from the database when an admin user views this comment. This has been patched in Admin Tools Application 4.5.1 by adding form token checks. Some workarounds are available. The patch can also be applied manually to the affected pages. Alternatively, if the query tool is not needed, by deleting the document `Admin.SQLToolsGroovy`, all database query tools can be deactivated.
References
▼ | URL | Tags |
---|---|---|
https://github.com/xwiki-contrib/application-admintools/security/advisories/GHSA-4f4c-rhjv-4wgv | x_refsource_CONFIRM | |
https://github.com/xwiki-contrib/application-admintools/commit/45298b4fbcafba6914537dcdd798a1e1385f9e46 | x_refsource_MISC | |
https://jira.xwiki.org/browse/ADMINTOOL-92 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
xwiki-contrib | application-admintools |
Version: < 4.5.1 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T21:23:39.486Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "https://github.com/xwiki-contrib/application-admintools/security/advisories/GHSA-4f4c-rhjv-4wgv", tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/xwiki-contrib/application-admintools/security/advisories/GHSA-4f4c-rhjv-4wgv", }, { name: "https://github.com/xwiki-contrib/application-admintools/commit/45298b4fbcafba6914537dcdd798a1e1385f9e46", tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/xwiki-contrib/application-admintools/commit/45298b4fbcafba6914537dcdd798a1e1385f9e46", }, { name: "https://jira.xwiki.org/browse/ADMINTOOL-92", tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://jira.xwiki.org/browse/ADMINTOOL-92", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-48293", options: [ { Exploitation: "poc", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2023-12-19T20:11:10.452417Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-11T15:23:39.463Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "application-admintools", vendor: "xwiki-contrib", versions: [ { status: "affected", version: "< 4.5.1", }, ], }, ], descriptions: [ { lang: "en", value: "The XWiki Admin Tools Application provides tools to help the administration of XWiki. Prior to version 4.5.1, a cross-site request forgery vulnerability in the query on XWiki tool allows executing arbitrary database queries on the database of the XWiki installation. Among other things, this allows modifying and deleting all data of the wiki. This could be both used to damage the wiki and to create an account with elevated privileges for the attacker, thus impacting the confidentiality, integrity and availability of the whole XWiki instance. A possible attack vector are comments on the wiki, by embedding an image with wiki syntax like `[[image:path:/xwiki/bin/view/Admin/QueryOnXWiki?query=DELETE%20FROM%20xwikidoc]]`, all documents would be deleted from the database when an admin user views this comment. This has been patched in Admin Tools Application 4.5.1 by adding form token checks. Some workarounds are available. The patch can also be applied manually to the affected pages. Alternatively, if the query tool is not needed, by deleting the document `Admin.SQLToolsGroovy`, all database query tools can be deactivated.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-352", description: "CWE-352: Cross-Site Request Forgery (CSRF)", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-11-20T18:14:08.724Z", orgId: "a0819718-46f1-4df5-94e2-005712e83aaa", shortName: "GitHub_M", }, references: [ { name: "https://github.com/xwiki-contrib/application-admintools/security/advisories/GHSA-4f4c-rhjv-4wgv", tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/xwiki-contrib/application-admintools/security/advisories/GHSA-4f4c-rhjv-4wgv", }, { name: "https://github.com/xwiki-contrib/application-admintools/commit/45298b4fbcafba6914537dcdd798a1e1385f9e46", tags: [ "x_refsource_MISC", ], url: "https://github.com/xwiki-contrib/application-admintools/commit/45298b4fbcafba6914537dcdd798a1e1385f9e46", }, { name: "https://jira.xwiki.org/browse/ADMINTOOL-92", tags: [ "x_refsource_MISC", ], url: "https://jira.xwiki.org/browse/ADMINTOOL-92", }, ], source: { advisory: "GHSA-4f4c-rhjv-4wgv", discovery: "UNKNOWN", }, title: "XWiki Admin Tools Application CSRF with QueryOnXWiki allows arbitrary database queries", }, }, cveMetadata: { assignerOrgId: "a0819718-46f1-4df5-94e2-005712e83aaa", assignerShortName: "GitHub_M", cveId: "CVE-2023-48293", datePublished: "2023-11-20T18:14:08.724Z", dateReserved: "2023-11-14T17:41:15.570Z", dateUpdated: "2024-10-11T15:23:39.463Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }