GHSA-vr59-gm53-v7cq
GitHub Security Advisory
XWiki Platform vulnerable to SQL injection through getdeleteddocuments.vm template sort parameter
Advisory Details
### Impact
It's possible for anyone to inject SQL using the parameter sort of the `getdeleteddocuments.vm`. It's injected as is as an ORDER BY value.
One can see the result of the injection with http://127.0.0.1:8080/xwiki/rest/liveData/sources/liveTable/entries?sourceParams.template=getdeleteddocuments.vm&sort=injected (this example does not work, but it shows that an HQL query was executed with the passed value which look nothing like an order by value, without any kind of sanitation).
### Patches
This has been patched in 17.3.0-rc-1, 16.10.6.
### Workarounds
There is no known workaround, other than upgrading XWiki.
### References
https://jira.xwiki.org/browse/XWIKI-23093
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:[email protected])
### Attribution
The vulnerability was identifier by Aleksey Solovev from Positive Technologies.
Affected Packages
Related CVEs
Key Information
Dataset
Data from GitHub Advisory Database. This information is provided for research and educational purposes.