CVE-2023-36468

9.9 CRITICAL

📋 TL;DR

XWiki Platform retains vulnerable old document revisions after upgrades, allowing attackers to exploit previously fixed vulnerabilities by accessing specific historical versions. This affects all XWiki installations that were upgraded from vulnerable versions, potentially leading to remote code execution even after patches are applied. Only fresh installations are unaffected.

💻 Affected Systems

Products:
  • XWiki Platform
Versions: All versions before 14.10.7 and 15.2RC1 when upgraded from vulnerable versions
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects upgraded installations, not fresh installs. Manually added vulnerable script macros also affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, and service disruption via CVE-2022-36100 exploitation.

🟠

Likely Case

Attackers with view rights exploit old vulnerable revisions to execute arbitrary code, compromising the XWiki instance.

🟢

If Mitigated

Limited impact if old revisions are deleted or restricted execution is enforced.

🌐 Internet-Facing: HIGH - Publicly accessible XWiki instances can be exploited remotely with view rights.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires adding 'rev=1.1' parameter to URLs. CVE-2022-36100 provides ready exploit path.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 14.10.7 or 15.2RC1

Vendor Advisory: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-8q9q-r9v2-644m

Restart Required: Yes

Instructions:

1. Upgrade to XWiki 14.10.7 or 15.2RC1. 2. Restart XWiki service. 3. Verify old revisions execute in restricted mode.

🔧 Temporary Workarounds

Delete old document revisions

all

Manually delete historical versions of all documents to remove vulnerable revisions

Use XWiki administration tools or database queries to delete document history

🧯 If You Can't Patch

  • Implement strict network access controls to limit XWiki exposure
  • Monitor for exploitation attempts using 'rev=' parameter in URLs

🔍 How to Verify

Check if Vulnerable:

Check if XWiki version is below 14.10.7/15.2RC1 and was upgraded from vulnerable version. Test by accessing documents with 'rev=1.1' parameter.

Check Version:

Check XWiki administration dashboard or xwiki.properties file for version

Verify Fix Applied:

After upgrade, verify that accessing documents with 'rev=' parameter shows restricted execution or error.

📡 Detection & Monitoring

Log Indicators:

  • URL requests containing 'rev=' parameter
  • Unusual script execution patterns
  • Access to historical document versions

Network Indicators:

  • HTTP requests with rev parameter to XWiki endpoints
  • Unusual outbound connections from XWiki server

SIEM Query:

web.url:*rev=* AND destination.port:8080 AND process.name:java

🔗 References

📤 Share & Export