CVE Vulnerabilities

CVE-2023-22457

Cross-Site Request Forgery (CSRF)

Published: Jan 04, 2023 | Modified: Jan 10, 2023
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

CKEditor Integration UI adds support for editing wiki pages using CKEditor. Prior to versions 1.64.3,t he CKEditor.HTMLConverter document lacked a protection against Cross-Site Request Forgery (CSRF), allowing to execute macros with the rights of the current user. If a privileged user with programming rights was tricked into executing a GET request to this document with certain parameters (e.g., via an image with a corresponding URL embedded in a comment or via a redirect), this would allow arbitrary remote code execution and the attacker could gain rights, access private information or impact the availability of the wiki. The issue has been patched in the CKEditor Integration version 1.64.3. This has also been patched in the version of the CKEditor integration that is bundled starting with XWiki 14.6 RC1. There are no known workarounds for this other than upgrading the CKEditor integration to a fixed version.

Weakness

The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.

Affected Software

Name Vendor Start Version End Version
Ckeditor_integration Xwiki * 1.64.3 (excluding)
Ckeditor Ubuntu bionic *
Ckeditor Ubuntu kinetic *
Ckeditor Ubuntu lunar *
Ckeditor Ubuntu mantic *
Ckeditor Ubuntu trusty *
Ckeditor Ubuntu xenial *
Ckeditor3 Ubuntu bionic *
Ckeditor3 Ubuntu kinetic *
Ckeditor3 Ubuntu lunar *
Ckeditor3 Ubuntu mantic *
Ckeditor3 Ubuntu trusty *
Ckeditor3 Ubuntu xenial *
Ldap-account-manager Ubuntu bionic *
Ldap-account-manager Ubuntu kinetic *
Ldap-account-manager Ubuntu lunar *
Ldap-account-manager Ubuntu mantic *
Ldap-account-manager Ubuntu trusty *
Ldap-account-manager Ubuntu xenial *
Request-tracker4 Ubuntu bionic *
Request-tracker4 Ubuntu kinetic *
Request-tracker4 Ubuntu lunar *
Request-tracker4 Ubuntu mantic *
Request-tracker4 Ubuntu trusty *
Request-tracker4 Ubuntu xenial *

Potential Mitigations

  • Use a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.
  • For example, use anti-CSRF packages such as the OWASP CSRFGuard. [REF-330]
  • Another example is the ESAPI Session Management control, which includes a component for CSRF. [REF-45]
  • Use the “double-submitted cookie” method as described by Felten and Zeller:
  • When a user visits a site, the site should generate a pseudorandom value and set it as a cookie on the user’s machine. The site should require every form submission to include this value as a form value and also as a cookie value. When a POST request is sent to the site, the request should only be considered valid if the form value and the cookie value are the same.
  • Because of the same-origin policy, an attacker cannot read or modify the value stored in the cookie. To successfully submit a form on behalf of the user, the attacker would have to correctly guess the pseudorandom value. If the pseudorandom value is cryptographically strong, this will be prohibitively difficult.
  • This technique requires Javascript, so it may not work for browsers that have Javascript disabled. [REF-331]

References