CVE-2023-35153

9.0 CRITICAL

📋 TL;DR

This stored cross-site scripting (XSS) vulnerability in XWiki Platform allows users with edit rights to inject malicious scripts into wiki pages. When other users visit the affected '/xwiki/bin/view/AppWithinMinutes/ClassEditSheet' page, the scripts execute in their browsers. This affects XWiki installations from version 5.4.4 up to (but not including) 14.4.8, 14.10.4, and 15.0.

💻 Affected Systems

Products:
  • XWiki Platform
Versions: 5.4.4 to 14.4.7, 14.10.3 and earlier, all versions before 15.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires users with edit rights to exploit. The vulnerability is in the AppWithinMinutes extension.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers with edit rights could steal session cookies, perform actions as other users, redirect to malicious sites, or install malware on user systems.

🟠

Likely Case

Privilege escalation, session hijacking, or data theft from authenticated users visiting the vulnerable page.

🟢

If Mitigated

Limited impact if proper input validation and output encoding are implemented, though the vulnerability still exists.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires edit rights but is straightforward once those permissions are obtained. The vulnerability is well-documented in public advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 14.4.8, 14.10.4, or 15.0

Vendor Advisory: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4wc6-hqv9-qc97

Restart Required: Yes

Instructions:

1. Backup your XWiki installation. 2. Upgrade to XWiki 14.4.8, 14.10.4, or 15.0. 3. Restart the XWiki service. 4. Verify the fix by checking the version.

🔧 Temporary Workarounds

Manual patch of ClassEditSheet

all

Apply the security patch to the AppWithinMinutes.ClassEditSheet page as referenced in the advisory.

Apply the patch from: https://github.com/xwiki/xwiki-platform/commit/1b87fec1e5b5ec00b7a8c3c3f94f6c5e22547392

🧯 If You Can't Patch

  • Restrict edit rights to trusted users only.
  • Monitor access to '/xwiki/bin/view/AppWithinMinutes/ClassEditSheet' and audit user activities.

🔍 How to Verify

Check if Vulnerable:

Check if your XWiki version is between 5.4.4 and 14.4.7, or 14.10.3 and earlier, or any version before 15.0.

Check Version:

Check the XWiki administration panel or view the page source for version information.

Verify Fix Applied:

After patching, verify the version is 14.4.8, 14.10.4, or 15.0 or higher.

📡 Detection & Monitoring

Log Indicators:

  • Unusual edits to pages containing 'AppWithinMinutes.FormFieldCategoryClass'
  • Multiple accesses to '/xwiki/bin/view/AppWithinMinutes/ClassEditSheet' from single users

Network Indicators:

  • Unexpected outbound connections from XWiki server after page visits

SIEM Query:

source="xwiki" AND (uri="/xwiki/bin/view/AppWithinMinutes/ClassEditSheet" OR message="*AppWithinMinutes.FormFieldCategoryClass*")

🔗 References

📤 Share & Export