CVE-2023-48293
📋 TL;DR
This CSRF vulnerability in XWiki Admin Tools allows attackers to execute arbitrary database queries when an admin user views malicious content. It affects XWiki instances with Admin Tools Application before version 4.5.1, potentially enabling data destruction, privilege escalation, and complete system compromise.
💻 Affected Systems
- XWiki Admin Tools Application
📦 What is this software?
Xwiki by Xwiki
⚠️ Risk & Real-World Impact
Worst Case
Complete database wipe, creation of admin accounts for attackers, and full compromise of the XWiki instance leading to data loss and unauthorized access.
Likely Case
Data manipulation or deletion through crafted queries when admins view malicious comments or pages containing embedded attack vectors.
If Mitigated
Limited impact with proper CSRF protections, admin awareness training, and restricted access to admin tools.
🎯 Exploit Status
Exploit requires admin user to view malicious content; attack vectors include comments with embedded wiki syntax.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.5.1
Vendor Advisory: https://github.com/xwiki-contrib/application-admintools/security/advisories/GHSA-4f4c-rhjv-4wgv
Restart Required: No
Instructions:
1. Upgrade Admin Tools Application to version 4.5.1 or later. 2. Apply the patch manually to affected pages if upgrade not possible. 3. Verify form token checks are implemented.
🔧 Temporary Workarounds
Delete SQLToolsGroovy document
allRemoves database query tools functionality entirely
Delete document: Admin.SQLToolsGroovy
🧯 If You Can't Patch
- Restrict access to admin tools to trusted networks only
- Implement additional CSRF protection at web application firewall level
🔍 How to Verify
Check if Vulnerable:
Check Admin Tools Application version; if <4.5.1, vulnerable. Review Admin/QueryOnXWiki page for form token implementation.
Check Version:
Check XWiki extension manager or Admin Tools Application version in XWiki administration interface.
Verify Fix Applied:
Verify Admin Tools Application version is ≥4.5.1. Test QueryOnXWiki tool requires form token for queries.
📡 Detection & Monitoring
Log Indicators:
- Unusual database query patterns from Admin/QueryOnXWiki
- Multiple DELETE or UPDATE operations in short time
Network Indicators:
- Requests to /xwiki/bin/view/Admin/QueryOnXWiki with query parameters from unexpected sources
SIEM Query:
source="xwiki.log" AND ("QueryOnXWiki" OR "DELETE FROM" OR "UPDATE xwikidoc")
🔗 References
- https://github.com/xwiki-contrib/application-admintools/commit/45298b4fbcafba6914537dcdd798a1e1385f9e46
- https://github.com/xwiki-contrib/application-admintools/security/advisories/GHSA-4f4c-rhjv-4wgv
- https://jira.xwiki.org/browse/ADMINTOOL-92
- https://github.com/xwiki-contrib/application-admintools/commit/45298b4fbcafba6914537dcdd798a1e1385f9e46
- https://github.com/xwiki-contrib/application-admintools/security/advisories/GHSA-4f4c-rhjv-4wgv
- https://jira.xwiki.org/browse/ADMINTOOL-92