APIs to evaluate content with Velocity is a package for APIs to evaluate content with Velocity. Starting with version 2.3 and prior to 12.6.7, 12.10.3, and 13.0, the velocity scripts are not properly sandboxed against using the Java File API to perform read or write operations on the filesystem. Writing an attacking script in Velocity requires the Script rights in XWiki so not all users can use it, and it also requires finding an XWiki API which returns a File. The problem has been patched in versions 12.6.7, 12.10.3, and 13.0. There is no easy workaround for fixing this vulnerability other than upgrading and being careful when giving Script rights.
References
Link | Resource |
---|---|
https://github.com/xwiki/xwiki-commons/commit/215951cfb0f808d0bf5b1097c9e7d1e503449ab8 | Patch Third Party Advisory |
https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-cvx5-m8vg-vxgc | Third Party Advisory |
https://github.com/xwiki/xwiki-commons/pull/127 | Patch Third Party Advisory |
https://jira.xwiki.org/browse/XWIKI-5168 | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-05-02 15:15
Updated : 2022-05-11 07:42
NVD link : CVE-2022-24897
Mitre link : CVE-2022-24897
JSON object : View
CWE
CWE-668
Exposure of Resource to Wrong Sphere
Products Affected
xwiki
- xwiki