Uploaded image for project: 'XWiki Platform'
  1. XWiki Platform
  2. XWIKI-20331

RCE payloads stored in comments and profile are executed when admin user edits them.

    XMLWordPrintable

Details

    • Unknown

    Description

      SUBMISSION REFERENCES

      RESEARCHER INFORMATION

      • Submitter: floerer

      SUBMISSION INFORMATION

      • Created at: Fri, 04 Nov 2022 12:53:00 GMT
      • Submission status: Archived

      REPORT CONTENT

      • Severity: Critical (9.0)
      • Domain: https://intigriti.xwiki.com/ (Url)
      • Proof of concept: XWiki allows users to use scripts like Python, Groovy and Velocity.
        Normally only users with a lot of permissions are able to use these scripts since this is RCE by design.
        However I think there is something really dangerous about this feature because any user is able to enter scripts into their own profile or in comments.
        The user that places the payload will see an error like this: {883163}

        However when the admin want so edit the comment or the user profile the script is immediately executed when the inline editor is loaded.
        So without knowing the admin can execute a very dangerous script.

      *Steps to reproduce*
      1. Login on your https://intigriti.xwiki.com account.
      2. Go to your profile (by clicking in the top right corner on your profile picture) and then on this page click on the edit pencil of you `personal details`
      3. In the `about` section click on `Source` and then paste the following payload:

      ```
      groovy
      def cmd = "id".execute();
      println("${cmd.text}");
      /groovy
      ```

      4. Click on `Save & View` at the bottom and you will see that you will get an error message since you are not allowed to execute this script.
      5. You can also paste these scripts in comments, basically in al places where you have such an text editor. Once an admin tries to edit your page the script will execute automatically and the following will be shown:

      {292253}

      This means that the CMD command succesfully executed.

      PS. I tested this on my local instance but for the `intigriti.xwiki.com` instance you need to get admin permissions to test this or you need someone from the xWiki team to check this out.

      • Impact: Store RCE payloads in comments and in your profile. Whenever an admin tries to edit your comments or profile the RCE will execute.
      • Personal data involved: No
      • Endpoint: https://intigriti.xwiki.com/bin/edit/XWiki/<user>?editor=inline&category=profile
      • Type: Remote Code Execution
      • Attachments: Knipsel.jpg, RCE.jpg

      Attachments

        1. 292253_RCE.jpg
          31 kB
          Intigriti Integration
        2. 883163_Knipsel.jpg
          34 kB
          Intigriti Integration

        Issue Links

          Activity

            People

              mleduc Manuel Leduc
              intigriti Intigriti Integration
              Votes:
              0 Vote for this issue
              Watchers:
              4 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved: