CVE-2023-48292
📋 TL;DR
This is a critical CSRF vulnerability in XWiki Admin Tools that allows attackers to execute arbitrary shell commands on the server by tricking administrators into visiting malicious URLs. The vulnerability affects XWiki installations with Admin Tools version 4.4 through 4.5.0, and successful exploitation can lead to complete compromise of the XWiki instance.
💻 Affected Systems
- XWiki Admin Tools Application
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete server compromise via arbitrary shell command execution leading to data theft, system takeover, and lateral movement within the network.
Likely Case
Unauthorized shell command execution leading to data exfiltration, backdoor installation, or service disruption.
If Mitigated
Attack fails due to CSRF token validation or lack of admin privileges.
🎯 Exploit Status
Exploit requires admin to view malicious content; simple image tag injection in comments is sufficient.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.5.1
Vendor Advisory: https://github.com/xwiki-contrib/application-admintools/security/advisories/GHSA-8jpr-ff92-hpf9
Restart Required: No
Instructions:
1. Upgrade Admin Tools to version 4.5.1 or later. 2. Alternatively, manually apply the CSRF token patch from commit 03815c505c9f37006a0c56495e862dc549a39da8.
🔧 Temporary Workarounds
Delete RunShellCommand document
allRemove the vulnerable Admin.RunShellCommand document if shell command functionality is not needed.
Delete document Admin.RunShellCommand via XWiki interface
Apply manual patch
allManually add CSRF token validation to the RunShellCommand page.
Apply changes from commit 03815c505c9f37006a0c56495e862dc549a39da8 to Admin.RunShellCommand page
🧯 If You Can't Patch
- Restrict admin access to trusted networks only
- Implement web application firewall rules to block requests to /xwiki/bin/view/Admin/RunShellCommand
🔍 How to Verify
Check if Vulnerable:
Check Admin Tools version in XWiki administration panel; versions 4.4-4.5.0 are vulnerable.
Check Version:
Check XWiki Admin Tools version in XWiki administration interface
Verify Fix Applied:
Verify Admin Tools version is 4.5.1 or later, or test that RunShellCommand page requires CSRF token.
📡 Detection & Monitoring
Log Indicators:
- Requests to /xwiki/bin/view/Admin/RunShellCommand without referrer or CSRF token
- Unusual shell command execution logs
Network Indicators:
- HTTP GET requests to RunShellCommand endpoint with command parameters
SIEM Query:
url.path:"/xwiki/bin/view/Admin/RunShellCommand" AND NOT csrf_token:*
🔗 References
- https://github.com/xwiki-contrib/application-admintools/commit/03815c505c9f37006a0c56495e862dc549a39da8
- https://github.com/xwiki-contrib/application-admintools/security/advisories/GHSA-8jpr-ff92-hpf9
- https://jira.xwiki.org/browse/ADMINTOOL-91
- https://github.com/xwiki-contrib/application-admintools/commit/03815c505c9f37006a0c56495e862dc549a39da8
- https://github.com/xwiki-contrib/application-admintools/security/advisories/GHSA-8jpr-ff92-hpf9
- https://jira.xwiki.org/browse/ADMINTOOL-91