CVE-2023-37277
📋 TL;DR
This CVE describes a Cross-Site Request Forgery (CSRF) vulnerability in XWiki Platform's REST API that allows attackers to execute arbitrary code when combined with a user having programming rights. The vulnerability affects XWiki installations with default configurations, particularly those using browsers without SameSite cookie restrictions enabled. Successful exploitation can lead to complete compromise of the XWiki instance.
💻 Affected Systems
- XWiki Platform
📦 What is this software?
Xwiki by Xwiki
Xwiki by Xwiki
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to full system compromise, data theft, service disruption, and potential lateral movement within the network.
Likely Case
Unauthorized script execution through CSRF attacks, potentially leading to data manipulation, privilege escalation, or service disruption.
If Mitigated
Limited impact with proper CSRF protections and SameSite cookie restrictions enabled in browsers.
🎯 Exploit Status
Exploitation requires social engineering to trick a user with programming rights into visiting a malicious page. The technical exploit itself is straightforward once the user is targeted.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: XWiki 14.10.8 and 15.2
Vendor Advisory: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-6xxr-648m-gch6
Restart Required: Yes
Instructions:
1. Backup your XWiki installation. 2. Upgrade to XWiki 14.10.8 or 15.2. 3. Restart the XWiki service. 4. Verify the patch is applied by checking the version.
🔧 Temporary Workarounds
Enable SameSite Cookie Restrictions
allConfigure browsers to enforce SameSite cookie restrictions to mitigate CSRF attacks.
Browser-specific configuration required
Restrict Programming Rights
allLimit users with programming rights to minimize attack surface.
XWiki administration panel configuration
🧯 If You Can't Patch
- Implement web application firewall rules to block suspicious REST API requests
- Isolate XWiki instance from internet access and restrict internal access
🔍 How to Verify
Check if Vulnerable:
Check XWiki version. If below 14.10.8 or 15.2, the system is vulnerable.
Check Version:
Check XWiki administration panel or view xwiki.properties file
Verify Fix Applied:
Verify XWiki version is 14.10.8 or 15.2 or higher.
📡 Detection & Monitoring
Log Indicators:
- Unusual REST API POST requests, unexpected script macro executions, unauthorized administrative actions
Network Indicators:
- CSRF token missing in REST API requests, suspicious cross-origin requests to XWiki endpoints
SIEM Query:
source="xwiki" AND (http_method="POST" AND uri="/rest/*" AND NOT csrf_token=*)
🔗 References
- https://github.com/xwiki/xwiki-platform/commit/4c175405faa0e62437df397811c7526dfc0fbae7
- https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-6xxr-648m-gch6
- https://jira.xwiki.org/browse/XWIKI-20135
- https://github.com/xwiki/xwiki-platform/commit/4c175405faa0e62437df397811c7526dfc0fbae7
- https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-6xxr-648m-gch6
- https://jira.xwiki.org/browse/XWIKI-20135