Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-h2rm-29ch-wfmh: XWiki Identity Oauth Privilege escalation (PR)/remote code execution from login screen through unescaped URL parameter

Impact

When login via the OAuth method, the identityOAuth parameters, sent in a GET request is vulnerable to XSS and XWiki syntax injection. This allows remote code execution via the groovy macro and thus affects the confidentiality, integrity and availability of the whole XWiki installation.

The vulnerability is in this part of the code.

Patches

The issue has been fixed in Identity OAuth version 1.6 by https://github.com/xwikisas/identity-oauth/commit/d805d3154b17c6bf455ddf5deb0a3461a3833bc6 . The fix is in the content of the IdentityOAuth/LoginUIExtension file

Workarounds

There are no known workarounds besides upgrading.

References

Are there any links users can visit to find out more?

  • Original report: https://jira.xwiki.org/browse/XWIKI-20719
ghsa
#xss#vulnerability#mac#git#java#rce#oauth#auth#jira#maven

Package

maven com.xwiki.identity-oauth:identity-oauth-ui (Maven)

Affected versions

>= 1.0, < 1.6

Patched versions

1.6

Description

Impact

When login via the OAuth method, the identityOAuth parameters, sent in a GET request is vulnerable to XSS and XWiki syntax injection. This allows remote code execution via the groovy macro and thus affects the confidentiality, integrity and availability of the whole XWiki installation.

The vulnerability is in this part of the code.

Patches

The issue has been fixed in Identity OAuth version 1.6 by xwikisas/identity-oauth@d805d31 . The fix is in the content of the IdentityOAuth/LoginUIExtension file

Workarounds

There are no known workarounds besides upgrading.

References

Are there any links users can visit to find out more?

  • Original report: https://jira.xwiki.org/browse/XWIKI-20719

References

  • GHSA-h2rm-29ch-wfmh
  • https://nvd.nist.gov/vuln/detail/CVE-2023-45144
  • xwikisas/identity-oauth@d805d31
  • xwikisas/identity-oauth@d805d31#diff-2ab2e0716443d790d7d798320e4a45151661f4eca5440331f4a227b29c87c188
  • https://github.com/xwikisas/identity-oauth/blob/master/ui/src/main/resources/IdentityOAuth/LoginUIExtension.vm#L58
  • https://jira.xwiki.org/browse/XWIKI-20719

oanalavinia published to xwikisas/identity-oauth

Oct 16, 2023

Published to the GitHub Advisory Database

Oct 17, 2023

Reviewed

Oct 17, 2023

Related news

CVE-2023-45144: Improve escaping (#30) · xwikisas/identity-oauth@d805d31

com.xwiki.identity-oauth:identity-oauth-ui is a package to aid in building identity and service providers based on OAuth authorizations. When a user logs in via the OAuth method, the identityOAuth parameters sent in the GET request is vulnerable to cross site scripting (XSS) and XWiki syntax injection. This allows remote code execution via the groovy macro and thus affects the confidentiality, integrity and availability of the whole XWiki installation. The issue has been fixed in Identity OAuth version 1.6. There are no known workarounds for this vulnerability and users are advised to upgrade.

ghsa: Latest News

GHSA-rcfx-77hg-w2wv: FastMCP updated to MCP 1.23+ due to CVE-2025-66416