Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7ph6-5cmq-xgjq

Опубликовано: 09 фев. 2022
Источник: github
Github: Прошло ревью
CVSS3: 6.8

Описание

Path traversal in xwiki-platform-skin-skinx

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. AbstractSxExportURLFactoryActionHandler#processSx does not escape anything from SSX document reference when serializing it on filesystem, so it's easy to mess up the HTML export process with reference elements containing filesystem syntax like "../", "./". or "/" in general (the last two not causing any security threat, but can cause conflicts with others serialized files). Patch can be found in 13.6-rc-1. Giving script or subwiki admin right only to trusted people and disabling HTML/PDF export can be done as workaround.

Пакеты

Наименование

org.xwiki.platform:xwiki-platform-skin-skinx

maven
Затронутые версииВерсия исправления

>= 6.2-rc-1, < 13.6

13.6

EPSS

Процентиль: 54%
0.00307
Низкий

6.8 Medium

CVSS3

Дефекты

CWE-116
CWE-22

Связанные уязвимости

CVSS3: 6.8
nvd
почти 4 года назад

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions AbstractSxExportURLFactoryActionHandler#processSx does not escape anything from SSX document references when serializing it on filesystem, it is possible to for the HTML export process to contain reference elements containing filesystem syntax like "../", "./". or "/" in general. The referenced elements are not properly escaped. This issue has been resolved in version 13.6-rc-1. This issue can be worked around by limiting or disabling document export.

EPSS

Процентиль: 54%
0.00307
Низкий

6.8 Medium

CVSS3

Дефекты

CWE-116
CWE-22