Learn about CVE-2020-15171 where users with SCRIPT rights in XWiki versions before 11.10.5 or 12.2.1 can execute arbitrary code. Find mitigation steps and impacted systems.
In XWiki before versions 11.10.5 or 12.2.1, any user with SCRIPT right can gain access to the application server Servlet context, allowing arbitrary code execution.
Understanding CVE-2020-15171
XWiki vulnerability allowing users with SCRIPT rights to execute arbitrary code.
What is CVE-2020-15171?
XWiki versions prior to 11.10.5 or 12.2.1 enable users with SCRIPT rights to access the server context, potentially leading to arbitrary code execution.
The Impact of CVE-2020-15171
Technical Details of CVE-2020-15171
XWiki vulnerability details and affected systems.
Vulnerability Description
Users with SCRIPT rights in XWiki can access the server Servlet context, allowing for arbitrary Java object instantiation and method invocation, leading to code execution.
Affected Systems and Versions
=12.0.0, <12.2.1
Exploitation Mechanism
The vulnerability allows users with SCRIPT rights to execute arbitrary code by accessing the server Servlet context.
Mitigation and Prevention
Protecting systems from CVE-2020-15171.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates