CVE-2023-29213

9.0 CRITICAL

📋 TL;DR

CVE-2023-29213 is a server-side template injection vulnerability in XWiki Platform's logging UI component that allows remote code execution. Attackers can craft malicious URLs that, when visited by users with programming rights, execute arbitrary code on the server. This affects XWiki instances with users who have programming rights.

💻 Affected Systems

Products:
  • XWiki Platform
Versions: All versions before 13.10.11, 14.4.7, and 14.10
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires users with programming rights to be tricked into visiting malicious URLs, but this is common in wiki environments.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary code with the privileges of the XWiki process, potentially leading to data theft, system takeover, or lateral movement.

🟠

Likely Case

Unauthorized code execution leading to data exfiltration, privilege escalation, or installation of backdoors on vulnerable XWiki instances.

🟢

If Mitigated

Limited impact if proper network segmentation and least privilege principles are followed, though code execution would still be possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires social engineering to trick users with programming rights, but the technical complexity is low once the user visits the malicious URL.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 13.10.11, 14.4.7, or 14.10

Vendor Advisory: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4655-wh7v-3vmg

Restart Required: Yes

Instructions:

1. Identify your XWiki version. 2. Upgrade to 13.10.11, 14.4.7, or 14.10 depending on your current version track. 3. Restart the XWiki application server. 4. Verify the fix by checking the version.

🧯 If You Can't Patch

  • Immediately restrict or revoke programming rights from all non-essential users.
  • Implement strict URL filtering and content security policies to block malicious URL patterns.

🔍 How to Verify

Check if Vulnerable:

Check XWiki version via Admin interface or by examining the application files. If version is below 13.10.11, 14.4.7, or 14.10, the system is vulnerable.

Check Version:

Check XWiki Admin dashboard or examine WEB-INF/xwiki.properties file for version information.

Verify Fix Applied:

After upgrade, confirm version is 13.10.11, 14.4.7, or 14.10 or higher via Admin interface.

📡 Detection & Monitoring

Log Indicators:

  • Unusual template evaluation logs in XWiki application logs
  • Suspicious URL patterns containing expression language syntax in access logs

Network Indicators:

  • HTTP requests to XWiki with unusual parameters containing ${...} patterns

SIEM Query:

source="xwiki.log" AND "template evaluation" AND ("error" OR "unusual")

🔗 References

📤 Share & Export