Wiki source code of Security

Last modified by Vincent Massol on 2024/12/23

Hide last authors
Simon Urli 34.1 1 This page aims at listing the various security aspects an administrator needs to be aware of when dealing with XWiki. For all security decision a developer needs to take when writing scripts and extensions, you should have a look to [[the security page of the developer guide>>Documentation.DevGuide.Security.WebHome]].
2
Ricardo Rodríguez 9.1 3 {{box cssClass="floatinginfobox" title="**Contents**"}}
4 {{toc/}}
5 {{/box}}
Silvia Macovei 5.1 6
Simon Urli 26.1 7 = Security Policy =
8
9 XWiki security policy [[is detailed here>>dev:Community.SecurityPolicy.WebHome]].
10
Caleb James DeLisle 6.1 11 = Security related features =
Ricardo Rodríguez 9.1 12
Caleb James DeLisle 6.1 13 XWiki offers some features for protecting security and some features which have security implications.
vmassol 1.2 14
Caleb James DeLisle 6.1 15 == Admin password ==
Ricardo Rodríguez 9.1 16
Vincent Massol 26.2 17 If you've used the [[Standalone/Demo packaging>>Documentation.AdminGuide.Installation.InstallationStandalone.WebHome]] then a defaut administration user is pre-created for you:
Thomas Mortagne 29.2 18
Vincent Massol 26.2 19 * Username: ##Admin##
20 * Password: ##admin##
Vincent Massol 2.1 21
Vincent Massol 26.2 22 Note: You could also remove that user but first you need to make sure it's not used as author of any page as it might create issue otherwise (some standard pages require their author to have enough right to be taken into account).
Thomas Mortagne 13.1 23
Vincent Massol 26.2 24 If you've used any other packaging to install XWiki, the [[Distribution Wizard>>Documentation.UserGuide.Features.DistributionWizard]] asks you to create an administration account and you get to choose the username and password.
25
Caleb James DeLisle 6.1 26 == Superadmin account ==
Ricardo Rodríguez 9.1 27
Vincent Massol 13.2 28 XWiki provides a ##superadmin## account. It is special, because:
Thomas Mortagne 13.1 29
Sergiu Dumitriu 1.3 30 * It is not stored in the database
31 * It cannot be modified in any way
32 * It always has full access, regardless of the rights settings
33
Silvia Macovei 5.1 34 {{warning}}
Manuel Smeria 12.5 35 Because the Superadmin account is so powerful, it is not safe to leave it enabled for a long time.
Silvia Macovei 5.1 36 {{/warning}}
Sergiu Dumitriu 1.5 37
Manuel Smeria 12.5 38 By default, this account is disabled. To enable it, you have to edit ##<xwiki-dir>/WEB-INF/xwiki.cfg##, uncomment the ##xwiki.superadminpassword=system## line and set a proper password. To disable it, just comment this line. Remember to restart the servlet container after changing ##xwiki.cfg##.
Sergiu Dumitriu 1.3 39
Silvia Macovei 5.1 40 {{info}}
41 Using this superadmin account is useful when you cannot log in anymore, for example when you forgot your admin user password, if you messed up some rights or if you have deleted your admin user by mistake.
42 {{/info}}
Vincent Massol 1.4 43
Caleb James DeLisle 6.1 44 == Cookies ==
Ricardo Rodríguez 9.1 45
Vincent Massol 29.1 46 XWiki uses several cookies on the user's machines. For example, XWiki identifies users who have already logged in by setting cookies. These can be the target of attacks.
vmassol 1.1 47
Vincent Massol 29.1 48 === Cookies List ===
49
50 This is the full list of Cookies used by XWiki core (if you install Extensions, they may define their own cookies and you would need to refer to their documentation).
51
Vincent Massol 36.1 52 |= Cookie name|=Content|=Path|=Domain|=Max age|=Is Secure?|=Http Only?|=Usage
53 |##JSESSIONID##|Unique number representing the Session|##/##|Web site domain|Session duration (30mn by default, can be configured in ##web.xml##)|Yes if request is using HTTPS (can depend on Servlet Container)|Yes if request is using HTTPS (can depend on Servlet Container)|Session cookie created by the Servlet Container
Vincent Massol 36.5 54 |##ckCsrfToken##|Unique number (CSRF Token)|##/##|Web site domain|Session duration (30mn by default, can be configured in ##web.xml##)|Yes|Yes|Created by CKEditor. The CSRF token can be used to secure the communication between the web browser and the server, i.e. for the file upload feature in the editor. However XWiki doesn't use it as it has its own CSRF token mechanism.
Vincent Massol 36.2 55 |##language##|Current user locale|##/##|Not set|10 years|No|No|Remember the locale used
Vincent Massol 36.3 56 |##interfacelanguage##|The interface language used for the current user|##/##|Not set|10 years|No|No|Remember the UI language used
Vincent Massol 36.4 57 |##visitid##|Random alphanumeric value of 32 characters|##/##|A value from the comma-separated list from the ##xwiki.authentication.cookiedomains## config parameter, if it matches the server name|Difference between 1 Jan 2030 and current date|No|No|To uniquely recognize the user when computing visit stats. Note that the stats feature is deprecated and turned off.
Vincent Massol 36.1 58 |##[xwiki.authentication.cookieprefix]username##|The protected user name (i.e. encrypted using ##[xwiki.authentication.encryptionKey]## if ##xwiki.authentication.protection## is set)|##[xwiki.authentication.cookiepath]## or ##/## if not set|##[xwiki.authentication.cookiedomains]## matching the server name of ##/## if not set or no match|##[xwiki.authentication.cookielife]## (in days) or 15 days if not set, or until browser shutdown if "remember me" is not checked|Yes if request is using HTTPS|Yes|Remember me (if external authentication is used, this cookie may not be used). If ##xwiki.authentication.cookieprefix## is not set, then an empty string is used.
59 |##[xwiki.authentication.cookieprefix]password##|The protected password(i.e. encrypted using ##[xwiki.authentication.encryptionKey]## if ##xwiki.authentication.protection## is set)|##[xwiki.authentication.cookiepath]## or ##/## if not set|##[xwiki.authentication.cookiedomains]## matching the server name of ##/## if not set or no match|##[xwiki.authentication.cookielife]## (in days) or 15 days if not set, or until browser shutdown if "remember me" is not checked|Yes if request is using HTTPS|Yes|Remember me (if external authentication is used, this cookie may not be used). If ##xwiki.authentication.cookieprefix## is not set, then an empty string is used.
60 |##[xwiki.authentication.cookieprefix]rememberme##|True if remember me is checked, false otherwise|##[xwiki.authentication.cookiepath]## or ##/## if not set|##[xwiki.authentication.cookiedomains]## matching the server name of ##/## if not set or no match|##[xwiki.authentication.cookielife]## (in days) or 15 days if not set, or until browser shutdown if "remember me" is not checked|Yes if request is using HTTPS|Yes|Remember me (if external authentication is used, this cookie may not be used). If ##xwiki.authentication.cookieprefix## is not set, then an empty string is used.
61 |##[xwiki.authentication.cookieprefix]validation##|MD5 hash based on the protected username, protected password and the IP addres (if ##xwiki.authentication.useip## is set)|##[xwiki.authentication.cookiepath]## or ##/## if not set|##[xwiki.authentication.cookiedomains]## matching the server name of ##/## if not set or no match|##[xwiki.authentication.cookielife]## (in days) or 15 days if not set, or until browser shutdown if "remember me" is not checked|Yes if request is using HTTPS|Yes|Remember me (if external authentication is used, this cookie may not be used). If ##xwiki.authentication.cookieprefix## is not set, then an empty string is used.
Vincent Massol 29.1 62
63 Legend help:
Thomas Mortagne 29.2 64
Vincent Massol 29.1 65 * If "Is Secure?" is true, it means that the cookie is only sent when HTTPS is used.
66
Vincent Massol 37.1 67 === Session Cookie Security ===
68
69 In general, Servlet Containers create the ##JSESSIONID## cookie as ##secure## only when the connexion is made on HTTPS (i.e. on an HTTP connexion the cookie is NOT ##secure## and is thus sent client-side). Some Servlet Containers always set ##httpOnly## but some don't.
70
71 You can configure your Servlet Container to never send the ##JSESSIONID## cookie, at the level of the Servlet Container's configuration files (e.g. in Tomcat's ##web.xml## file). You could also edit XWiki's ##web.xml## file and use:
72
73 {{code language="xml"}}
74 <session-config>
75 <cookie-config>
76 <http-only>true</http-only>
77 <secure>true</secure>
78 </cookie-config>
79 </session-config>
80 {{/code}}
81
Thomas Mortagne 29.2 82 === Cookie Encryption Keys ===
Ricardo Rodríguez 9.1 83
Ecaterina Moraru (Valica) 21.4 84 When a user logs in, three cookies are saved on his machine containing the username, password and a "nothing up my sleeve" hash. The cookies are encrypted so that nobody having access to them can see the username/password. This encryption is done using 2 configuration parameters located in the //xwiki.cfg// configuration file. This file is located in //WEB-INF/// in the XWiki WAR (see the [[Installation guide>>Documentation.AdminGuide.Installation]] for where it's installed).
Thomas Mortagne 29.2 85
86 {{version before="15.9, 15.5.4, 14.10.19"}}
Ecaterina Moraru (Valica) 21.4 87 It's important you edit the //[[xwiki.cfg>>Documentation.AdminGuide.Configuration#HSamplexwiki.cfg]]// file to modify the cookie authentication and encryption keys as they use default values when you install XWiki and these predefined values could be used by an attacker to decipher the username and password. To prevent this, change the following 2 configuration parameters:
Thomas Mortagne 13.1 88
Silvia Macovei 5.1 89 * //xwiki.authentication.validationKey//
90 * //xwiki.authentication.encryptionKey//
Thomas Mortagne 29.2 91 {{/version}}
vmassol 1.1 92
Vincent Massol 22.1 93 See the [[Authentication parameters section>>Documentation.AdminGuide.Authentication.WebHome#HAuthenticationparameters]] for more details.
Caleb James DeLisle 6.1 94
95 === Encrypt cookies using IP address ===
Ricardo Rodríguez 9.1 96
Vincent Massol 23.2 97 Even if the password cannot be extracted from the cookie, the cookies might be stolen (see [[XSS>>Documentation.AdminGuide.Security#HCrossSiteScripting]]) and used as they are. To limit this by default, the cookies are blocked from being used except by the same IP address that was used to create them.
Caleb James DeLisle 6.1 98
Vincent Massol 23.2 99 You can disable this by setting the [[##xwiki.cfg##>>Documentation.AdminGuide.Configuration#HSamplexwiki.cfg]] parameter ##xwiki.authentication.useip## to false.
100
Alex Busenius 7.1 101 == Override version information ==
102
Ecaterina Moraru (Valica) 20.1 103 By default, the exact XWiki version is shown in the footer of every page. This is not harmful by itself, but can provide useful information to the attacker, who can use known vulnerabilities against this version.
Alex Busenius 7.1 104
Simon Urli 23.3 105 You can change the version string shown in the footer using the [[Administration Application>>extensions:Extension.Administration Application]]. Click on the ##Presentation## icon and change the version string in the //Version// field. Please note that with this solution, the version can still be find through a REST request on the wiki.
Alex Busenius 7.1 106
Manuel Smeria 12.5 107 If you want to be sure the version is definitely not leaked somewhere else, you can replace the file //WEB-INF/version.properties// by your own version with the following content: {{code}}version=your version string here{{/code}}.
Alex Busenius 7.1 108
Vincent Massol 33.1 109 = Antivirus =
110
111 There's an [[Antivirus Application>>https://store.xwiki.com/xwiki/bin/view/Extension/AntivirusApplication/]] developed by a sponsoring company offering scanning for antivirus when attaching files to wiki pages.
112
Caleb James DeLisle 6.1 113 = Discussion of attack vectors =
Ricardo Rodríguez 9.1 114
Caleb James DeLisle 6.1 115 Perfect security is generally considered impossible. With simple static HTML servers we can have near perfect security but those are not very useful. This document discusses different threat models and how to fortify against each. These attacks are grouped by type of access gained if successful. More dangerous attacks are near the top yet the most common attacks are less dangerous (and easier to perform) and will be seen at the bottom.
116
117 == Server root attacks ==
Ricardo Rodríguez 9.1 118
Caleb James DeLisle 6.1 119 This attack is characterized by assent of power in the operating system and is largely beyond the scope of this document as it is the responsibility of the operating system to prevent users ascending power.
120
121 === Likelihood / Known Issues ===
Ricardo Rodríguez 9.1 122
Caleb James DeLisle 6.1 123 Not a very common attack method.
124
125 === Mitigation Methods ===
Ricardo Rodríguez 9.1 126
Caleb James DeLisle 6.1 127 * Run a decent operating system
Manuel Smeria 12.5 128 * Run the Java VM with XWiki under its own username, only give this user permissions to files needed for the operation of XWiki and make sure this user doesn't have sudo access
Caleb James DeLisle 6.1 129 * Don't run extraneous processes on the server
130 * Run services on non-standard ports (ssh)
131 * Firewall all ports not explicitly needed
132
133 == Java VM attacks ==
Ricardo Rodríguez 9.1 134
Caleb James DeLisle 6.1 135 This attack is characterized by the attacker running arbitrary code on Java and perhaps using Java level security flaws to execute native code thus gaining access in the user level of the Java VM process.
136
137 === Likelihood / Known Issues ===
Ricardo Rodríguez 9.1 138
Manuel Smeria 12.5 139 * XWiki requires reflection of private fields and variables for the [[component module>>extensions:Extension.Component Module]] This means that jsr223 scripts such as Groovy and Python are able to read and write any field or variable in the system which may lead to execution of native code via Java Native Access. Virtual wikis are not insulated against this attack method and as such virtual wiki administrators cannot be given programming permission (note that there is another reason for not giving wiki admin programming rights in a farm, it is because you may access any document without rights being checked, even in another wiki). This flaw could lead to dumping of connected databases, however user passwords are SHA-512 hashed (see [[this issue>>http://jira.codehaus.org/browse/GROOVY-1875]] for more details.
140 ** This attack method requires the use of a registered username which has programming rights
Caleb James DeLisle 6.1 141
142 === Mitigation Methods ===
Ricardo Rodríguez 9.1 143
Manuel Smeria 12.5 144 * Enable a SecurityManager which peeks at the calling stack and only allows unchecked reflection if called by the component manager
145 * Disable Groovy entirely
146 * Guard programming rights closely, have a special username just for saving documents which contain approved Groovy scripts
Caleb James DeLisle 6.1 147
148 == Database Injection attacks ==
Ricardo Rodríguez 9.1 149
Caleb James DeLisle 6.1 150 Such an attack happens from inside of unsafe scripting and results in unintended information being given up by the database.
151
152 === Likelihood / Known Issues ===
Ricardo Rodríguez 9.1 153
Caleb James DeLisle 6.1 154 * XWiki uses Hibernate as a database controller so some of the injection methods are mitigated. XWiki gives you the capability to create safe scripts and unsafe scripts.
155 ** This attack method may often be performed without a registered username.
156
157 === Mitigation Methods ===
Ricardo Rodríguez 9.1 158
Thomas Mortagne 13.1 159 * You can use this groovy snippet to test your database to see if it supports [[stacked queries>>http://ferruh.mavituna.com/sql-injection-cheatsheet-oku/#StackingQueries]]. If your database does not support stacked queries, injection in a SELECT query can only lead to additional arbitrary SELECT queries:(((
Ricardo Rodríguez 9.1 160 {{code language="java"}}
Caleb James DeLisle 6.1 161 {{groovy}}
162 try {
163 session = xcontext.getContext().getWiki().getHibernateStore().getSessionFactory().openSession();
164 session.connection().createStatement().execute("begin transaction; rollback;");
165 println("Your database supports stacked queries.")
166 } catch (Exception e) {
167 println("Your database does not support stacked queries.");
168 } finally {
169 try {
170 session.close()
171 } catch (Exception e) {}
172 }
173 {{/groovy}}
174 {{/code}}
Manuel Smeria 12.5 175 )))
176 * Configure your database to log or if possible disable comment syntax {{code language="none"}} -- /* */ and # {{/code}}. Comments are not used by Hibernate and are central to most of the more dangerous SQL injection.
177 * When designing scripts avoid the temptation to concatenate user input into database queries
Caleb James DeLisle 6.1 178
179 **WRONG:**
180
181 {{code}}
182 #set($x = $xwiki.searchDocuments("where doc.fullName = '${userContent}'"))
183 {{/code}}
184
Manuel Smeria 12.5 185 If the user enters: {{code}} ' or doc.hidden = 1 or doc.fullName = ' {{/code}} your code will create the Hibernate query: {{code language="sql"}}where doc.fullName = '' or doc.hidden = 1 or doc.fullName = ''{{/code}}.
Caleb James DeLisle 6.1 186
187 This may not be a horrible outcome but it is not what you wanted and others surely can invent far more dangerous injections than this.
188 Fortunately Hibernate itself protects against the worst type of injection such as:
189
Ricardo Rodríguez 9.1 190 {{code language="sql"}}
Caleb James DeLisle 6.1 191 Embarrassing Mistake'); DROP TABLE xwikidoc;--
192 {{/code}}
193
Manuel Smeria 12.5 194 This is because it does not allow multiple commands in one call and does not allow the ~-~- comment syntax (can be bypassed in some versions; see above).
Caleb James DeLisle 6.1 195
Manuel Smeria 12.5 196 **RIGHT:**
Caleb James DeLisle 6.1 197
198 {{code}}
199 ## We are passing a ? in the query and then passing the parameter as a list (Velocity notation for list is [element, element] )
200 #set($x = $xwiki.searchDocuments("where doc.fullName = ?", [$userContent]))
201 {{/code}}
202
203 Your code will now instruct Hibernate to name the userContent parameter and pass it to the database separately from the query. The above injection trick will not work.
204
Manuel Smeria 12.5 205 * Avoid "Privileged API" whenever possible and only use non API when absolutely necessary. If each of your calls requires you to pass the context as a parameter, you're doing it wrong.
Caleb James DeLisle 6.1 206
Thomas Mortagne 27.1 207 For more information check the [[XWiki API Reference>>Documentation.DevGuide.API]].
Caleb James DeLisle 6.1 208
209 == Cross Site Scripting ==
Ricardo Rodríguez 9.1 210
Caleb James DeLisle 6.1 211 Cross site scripting or XSS is the least harmful to the server of all attack methods, however it is the most common.
Manuel Smeria 12.5 212 XSS can lead to users altering documents which they didn't want to or having their authentication cookies copied. XSS can also lead to exploitation of web browsers and plugins such as pdf or ActiveX. Such exploits often install malware.
Caleb James DeLisle 6.1 213
214 === Attack vectors (persistent injection) ===
Ricardo Rodríguez 9.1 215
Caleb James DeLisle 6.1 216 Persistent injection is characterized by saving content in the system which when loaded by the unwitting user, executes as javascript in their browser. This is the more dangerous variety because it sits in a page waiting for a victim.
217
218 1. Persistent injection through XWiki document content by editing the document.
219 2. Persistent injecting through comments.
220
221 ==== Likelihood / Known Issues ====
Ricardo Rodríguez 9.1 222
Caleb James DeLisle 6.1 223 * XWiki syntax 1.0 does not filter out HTML so script injection is possible
Thomas Mortagne 17.1 224 * XWiki syntax 2.0 contains html macro which when invoked allows injection of raw html and script. There is still no safe way to disable this (see [[this issue>>https://jira.xwiki.org/browse/XWIKI-3953]] for more information.
Manuel Smeria 12.5 225 ** This attack method requires the attacker to have a registered username (unless anonymous editing or commenting is allowed).
Caleb James DeLisle 6.1 226
227 ==== Mitigation Methods ====
Ricardo Rodríguez 9.1 228
Thomas Mortagne 13.1 229 * The only way to be sure that script cannot be injected in content (xwiki/1.0 or xwiki/2.0) is to make that content completely passive as follows:(((
Caleb James DeLisle 6.1 230 {{code}}
231 {{html}}
232 $escapetool.html($userContent)
233 {{/html}}
234 {{/code}}
Thomas Mortagne 13.1 235 )))There are however some methods to minimize the risk:
Manuel Smeria 12.5 236 * Disable creation of syntax 1.0 pages. **NOTE**: Pages which are already written in syntax 1.0 can still be altered and should be updated to syntax 2.0, otherwise they must have edit permission locked down so that only authorized users may edit them.
237 * Force unauthorized users to post through a script which escapes //~{~{// (double squigly brackets) because there is currently no way to prevent injection of html macro for unauthorized users.
238 * Set up ObservationManager to scan all page content and object property updates for HTML macro invocation and alert a moderator.
Ricardo Rodríguez 9.1 239
Caleb James DeLisle 6.1 240 === Attack vectors (reflective injection) ===
Ricardo Rodríguez 9.1 241
Caleb James DeLisle 6.1 242 Reflective injection is characterized by convincing a user to click on a specially crafted link which causes a page to generate javascript.
243
244 1. Reflective injection through form fields.
245
246 ==== Mitigation Methods ====
Ricardo Rodríguez 9.1 247
Manuel Smeria 12.5 248 Advise admins to use addons such as [[noscript>>https://addons.mozilla.org/en-US/firefox/addon/noscript/]] which will detect reflective injection attacks and warn the user when it suspects foul play and also avoid clicking on suspicious links.
Caleb James DeLisle 6.1 249
Manuel Smeria 12.5 250 * when content is loaded from request parameters into a form field, make sure it is escaped using [[EscapeTool>>http://velocity.apache.org/tools/devel/generic/EscapeTool.html]]
Caleb James DeLisle 6.1 251
252 **WRONG:**
253
Ricardo Rodríguez 9.1 254 {{code language="xml"}}
Caleb James DeLisle 6.1 255 <input type=text value="$request.get('name')" />
256 {{/code}}
257
258 **RIGHT:**
259
Ricardo Rodríguez 9.1 260 {{code language="xml"}}
Caleb James DeLisle 6.1 261 <input type=text value="$escapetool.html($request.get('name'))" />
262 {{/code}}
263
264 == Cross site request forgery (CSRF) ==
Ricardo Rodríguez 9.1 265
Caleb James DeLisle 6.1 266 The basis of this attack is that a foreign website can craft a malicious link or form which points to the save action in your system and when clicked by a logged in user will cause the user to save the page.
267
268 === Likelihood / Known Issues ===
Ricardo Rodríguez 9.1 269
Manuel Smeria 12.5 270 Currently there is no system implemented to prevent form submission from external sites. See discussion in mailing list about implementing [[secret tokens>>http://lists.xwiki.org/pipermail/devs/2010-March/017727.html]].
Caleb James DeLisle 6.1 271
272 === Mitigation Methods ===
Ricardo Rodríguez 9.1 273
Manuel Smeria 12.5 274 Advise admins to use addons such as [[noscript>>https://addons.mozilla.org/en-US/firefox/addon/noscript/]] which will help prevent automatic form submission by an attack site and also avoid clicking on suspicious links.
Vincent Massol 19.1 275
Vincent Massol 19.2 276 = Advisory Notices =
Vincent Massol 19.1 277
278 Here's a list of sites offering security advisory notices about XWiki:
Ecaterina Moraru (Valica) 20.1 279
slauriere 35.1 280 * [[nvd.nist.gov>>https://nvd.nist.gov/vuln/search/results?form_type=Basic&results_type=overview&query=xwiki&search_type=all&isCpeNameSearch=false]]
Vincent Massol 19.1 281 * [[www.cvedetails.com>>http://www.cvedetails.com/product/6856/Xwiki-Xwiki.html?vendor_id=3885]]
282 * [[vuldb.com>>https://vuldb.com/fr/?search]] (need to search for ##xwiki##)
283 * [[vulners.com>>https://vulners.com/search?query=xwiki]]

Get Connected