Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m63c-3rmg-r2cf

Опубликовано: 03 сент. 2025
Источник: github
Github: Прошло ревью
CVSS4: 9.3

Описание

XWiki configuration files can be accessed through jsx and sx endpoints

Impact

It's possible to get access and read configuration files by using URLs such as http://localhost:8080/bin/ssx/Main/WebHome?resource=../../WEB-INF/xwiki.cfg&minify=false.

This can apparently be reproduced on Tomcat instances.

Patches

This has been patched in 17.4.0-rc-1, 16.10.7.

Workarounds

There is no known workaround, other than upgrading XWiki.

For more information

If you have any questions or comments about this advisory:

Attribution

The vulnerability was reported by Gregor Neumann.

Пакеты

Наименование

org.xwiki.platform:xwiki-platform-skin-skinx

maven
Затронутые версииВерсия исправления

>= 4.2-milestone-2, < 16.10.7

16.10.7

EPSS

Процентиль: 67%
0.00527
Низкий

9.3 Critical

CVSS4

Дефекты

CWE-23

Связанные уязвимости

CVSS3: 7.5
nvd
5 месяцев назад

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In versions 4.2-milestone-2 through 16.10.6, configuration files are accessible through jsx and sx endpoints. It's possible to access and read configuration files by using URLs such as `http://localhost:8080/bin/ssx/Main/WebHome?resource=../../WEB-INF/xwiki.cfg&minify=false`. This is fixed in version 16.10.7.

CVSS3: 7.5
fstec
5 месяцев назад

Уязвимость компонента org.xwiki.platform:xwiki-platform-skin-skinx платформы создания совместных веб-приложений XWiki Platform, позволяющая нарушителю оказать воздействие на конфиденциальность защищаемой информации

EPSS

Процентиль: 67%
0.00527
Низкий

9.3 Critical

CVSS4

Дефекты

CWE-23