Описание
XWiki configuration files can be accessed through jsx and sx endpoints
Impact
It's possible to get access and read configuration files by using URLs such as http://localhost:8080/bin/ssx/Main/WebHome?resource=../../WEB-INF/xwiki.cfg&minify=false.
This can apparently be reproduced on Tomcat instances.
Patches
This has been patched in 17.4.0-rc-1, 16.10.7.
Workarounds
There is no known workaround, other than upgrading XWiki.
For more information
If you have any questions or comments about this advisory:
- Open an issue in Jira XWiki.org
- Email us at Security Mailing List
Attribution
The vulnerability was reported by Gregor Neumann.
Ссылки
- https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-m63c-3rmg-r2cf
- https://nvd.nist.gov/vuln/detail/CVE-2025-55748
- https://github.com/xwiki/xwiki-platform/commit/9e7b4c03f2143978d891109a17159f73d4cdd318#diff-ee78930a9ac5ea586179fe8ab88a5fd58e369d175927d1e88a0b4dbc3ebcbf1eR62
- https://jira.xwiki.org/browse/XWIKI-23109
Пакеты
org.xwiki.platform:xwiki-platform-skin-skinx
>= 4.2-milestone-2, < 16.10.7
16.10.7
Связанные уязвимости
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In versions 4.2-milestone-2 through 16.10.6, configuration files are accessible through jsx and sx endpoints. It's possible to access and read configuration files by using URLs such as `http://localhost:8080/bin/ssx/Main/WebHome?resource=../../WEB-INF/xwiki.cfg&minify=false`. This is fixed in version 16.10.7.
Уязвимость компонента org.xwiki.platform:xwiki-platform-skin-skinx платформы создания совместных веб-приложений XWiki Platform, позволяющая нарушителю оказать воздействие на конфиденциальность защищаемой информации