Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9qrp-h7fw-42hg

Опубликовано: 01 июн. 2022
Источник: github
Github: Прошло ревью
CVSS3: 2.7

Описание

Path Traversal in XWiki Platform

Impact

One can ask for any file located in the classloader using the template API and a path with ".." in it. For example

{{template name="../xwiki.hbm.xml"/}}

To our knownledge none of the available files of the classloader in XWiki Standard contain any strong confidential data, hence the low confidentiality value of this advisory.

Patches

The issue is patched in versions 14.0 and 13.10.3.

Workarounds

There's no easy workaround for this issue, administrators should upgrade their wiki.

References

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

org.xwiki.platform:xwiki-platform-oldcore

maven
Затронутые версииВерсия исправления

>= 8.3-rc-1, < 13.10.3

13.10.3

EPSS

Процентиль: 20%
0.00063
Низкий

2.7 Low

CVSS3

Дефекты

CWE-22
CWE-24

Связанные уязвимости

CVSS3: 2.7
nvd
больше 3 лет назад

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Starting with version 8.3-rc-1 and prior to versions 12.10.3 and 14.0, one can ask for any file located in the classloader using the template API and a path with ".." in it. The issue is patched in versions 14.0 and 13.10.3. There is no easy workaround for this issue.

EPSS

Процентиль: 20%
0.00063
Низкий

2.7 Low

CVSS3

Дефекты

CWE-22
CWE-24