Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2jhm-qp48-hv5j

Опубликовано: 09 фев. 2022
Источник: github
Github: Прошло ревью
CVSS3: 5.5

Описание

Missing authorization in xwiki-platform

Impact

Any user with SCRIPT right (EDIT right before XWiki 7.4) can read any file located in the XWiki WAR (for example xwiki.cfg and xwiki.properties) through XWiki#invokeServletAndReturnAsString:

$xwiki.invokeServletAndReturnAsString("/WEB-INF/xwiki.cfg")

Patches

It has been patched in XWiki versions 12.10.9, 13.4.3 and 13.7-rc-1.

Workarounds

The only workaround is to give SCRIPT right only to trusted users.

References

https://jira.xwiki.org/browse/XWIKI-18870

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

org.xwiki.platform:xwiki-platform-oldcore

maven
Затронутые версииВерсия исправления

>= 13.6-rc-1, <= 13.6

13.7-rc-1

Наименование

org.xwiki.platform:xwiki-platform-oldcore

maven
Затронутые версииВерсия исправления

>= 13.0.0, < 13.4.3

13.4.3

Наименование

org.xwiki.platform:xwiki-platform-oldcore

maven
Затронутые версииВерсия исправления

< 12.10.9

12.10.9

EPSS

Процентиль: 29%
0.00105
Низкий

5.5 Medium

CVSS3

Дефекты

CWE-552
CWE-862

Связанные уязвимости

CVSS3: 5.5
nvd
почти 4 года назад

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with SCRIPT right can read any file located in the XWiki WAR (for example xwiki.cfg and xwiki.properties) through XWiki#invokeServletAndReturnAsString as `$xwiki.invokeServletAndReturnAsString("/WEB-INF/xwiki.cfg")`. This issue has been patched in XWiki versions 12.10.9, 13.4.3 and 13.7-rc-1. Users are advised to update. The only workaround is to limit SCRIPT right.

EPSS

Процентиль: 29%
0.00105
Низкий

5.5 Medium

CVSS3

Дефекты

CWE-552
CWE-862