Eforms: Freemarker template execution injection
Issue date: 04-04-2022Affects versions: 14.7, 13.4, 12.6
Security Issue ID
SECURITY-269
Affected Product Version(s)
12.6.24, 13.4.15, 14.7.3, and previous versions
Severity
low
Description
In affected versions of brXM, it is possible for an authenticated content author to set a freemarker expression, such as "<#assign ex="freemarker.template.utility.Execute"?new()> ${ex("cat /somefile") }" through the eforms MailFormDataPlugin, and get it executed (and emailed) each time a site visitor would submit a form.
The vulnerability is rated with low severity, since with the proper usage of document workflows and permissions, the form would require approval from an editor before such freemarker expression could be applied. Therefore, actual exploitation would require collaboration from two separate authenticated users, one of whom has at least editor level publication access.
Instructions
Update to 14.7.5, 13.4.16, 12.6.25, or later versions.