By creating a document with a specially crafted title, it is possible to trigger remote code execution in the (Solr-based) search in XWiki. This allows any user who can edit the title of a space (all users by default) to execute any Groovy code in the XWiki installation which compromises the confidentiality, integrity and availability of the whole XWiki installation.
To reproduce, as a user without script nor programming rights, create a document with title {{/html}}{{async}}{{groovy}}println("Hello from Groovy Title!"){{/groovy}}{{/async}}
and content Test Document
. Using the search UI, search for "Test Document"
, then deploy the Location
facet on the right of the screen, next to the search results. The installation is vulnerable if you see an item such as:
Hello from Groovy Title!
</a>
<div class="itemCount">1</div>
</li>
</ul>
{{/html}}
This has been patched in XWiki 14.10.20, 15.5.4 and 15.10 RC1.
Modify the Main.SolrSpaceFacet
page following this patch.
{ "nvd_published_at": "2024-04-10T20:15:08Z", "cwe_ids": [ "CWE-95" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2024-04-10T17:13:15Z" }