Hi Fernando,
Actually, I've fixed the issue just after reading xipe's comment back in
2009, by enclosing everything the macro outputs in {{{verbatim
markup}}}. See the update line at the top of the blog post.
This was even before XWiki prevented nested scripting by default. Could
you edit your comment on the macro's extension page since the security
issue has been addressed even before the macro was released ?
Thanks,
Jerome
On 11/20/2012 05:52 PM, Fernando Correia wrote:
One comment in the blog post[1] about the RSS
Aggregator Macro[2] warns
against a serious security flaw: the extension is embedding in the page's
wiki markup strings it reads from the web (RSS feeds); if these strings
contain wiki code such as this:
<title>Let's execute some groovy: {{groovy}}println
"id".execute().getText(){{/groovy}}</title>
then it would allow random code to be executed on the server.
I investigated the issue and my current understanding is that this
vulnerability has been addressed at XWiki itself, when nested scripts[3]
were disabled in v. 2.4M2[4].
Am I correct to assume this vulnerability has been closed and that it's
safe to run this extension?
[1]
http://www.velociter.fr/journal/XWiki-plus-groovy-is-love-the-10-lines-RSS-…
[2]
http://extensions.xwiki.org/xwiki/bin/view/Extension/RSS+Aggregator+Macro
[3]
http://extensions.xwiki.org/xwiki/bin/view/Extension/Script+Macro#HNestedsc…
[4]
http://www.xwiki.org/xwiki/bin/view/ReleaseNotes/ReleaseNotesXWikiEnterpris…
_______________________________________________
users mailing list
users(a)xwiki.org
http://lists.xwiki.org/mailman/listinfo/users