Vulnerability Description
APIs to evaluate content with Velocity is a package for APIs to evaluate content with Velocity. Starting with version 2.3 and prior to 12.6.7, 12.10.3, and 13.0, the velocity scripts are not properly sandboxed against using the Java File API to perform read or write operations on the filesystem. Writing an attacking script in Velocity requires the Script rights in XWiki so not all users can use it, and it also requires finding an XWiki API which returns a File. The problem has been patched in versions 12.6.7, 12.10.3, and 13.0. There is no easy workaround for fixing this vulnerability other than upgrading and being careful when giving Script rights.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xwiki | Xwiki | >= 2.3, < 12.6.7 |
Related Weaknesses (CWE)
References
- https://github.com/xwiki/xwiki-commons/commit/215951cfb0f808d0bf5b1097c9e7d1e503PatchThird Party Advisory
- https://github.com/xwiki/xwiki-commons/pull/127PatchThird Party Advisory
- https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-cvx5-m8vg-vxgcThird Party Advisory
- https://jira.xwiki.org/browse/XWIKI-5168ExploitVendor Advisory
- https://github.com/xwiki/xwiki-commons/commit/215951cfb0f808d0bf5b1097c9e7d1e503PatchThird Party Advisory
- https://github.com/xwiki/xwiki-commons/pull/127PatchThird Party Advisory
- https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-cvx5-m8vg-vxgcThird Party Advisory
- https://jira.xwiki.org/browse/XWIKI-5168ExploitVendor Advisory
FAQ
What is CVE-2022-24897?
CVE-2022-24897 is a vulnerability with a CVSS score of 7.5 (HIGH). APIs to evaluate content with Velocity is a package for APIs to evaluate content with Velocity. Starting with version 2.3 and prior to 12.6.7, 12.10.3, and 13.0, the velocity scripts are not properly ...
How severe is CVE-2022-24897?
CVE-2022-24897 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-24897?
Check the references section above for vendor advisories and patch information. Affected products include: Xwiki Xwiki.