Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mq7h-5574-hw9f

Опубликовано: 21 нояб. 2022
Источник: github
Github: Прошло ревью
CVSS3: 7.4

Описание

Cross-Site Request Forgery (CSRF) allowing to delete or rename tags

Impact

It's possible with a simple request to perform deletion or renaming of tags without needing any confirmation, by using a CSRF attack.

Patches

The problem has been patched in XWiki 13.10.7, 14.4.1 and 14.5RC1.

Workarounds

It's possible to patch existing instances directly by editing the page Main.Tags and add this kind of check, in the code for renaming and for deleting:

#if (!$services.csrf.isTokenValid($request.get('form_token'))) #set ($discard = $response.sendError(401, "Wrong CSRF token")) #end

See the commit with the fix for more information about patching the page: https://github.com/xwiki/xwiki-platform/commit/7fd4cda0590180c4d34f557597e9e10e263def9e

References

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

org.xwiki.platform:xwiki-platform-tag-ui

maven
Затронутые версииВерсия исправления

>= 3.2-milestone-2, < 13.10.7

13.10.7

Наименование

org.xwiki.platform:xwiki-platform-tag-ui

maven
Затронутые версииВерсия исправления

>= 14.0.0, < 14.4.1

14.4.1

EPSS

Процентиль: 74%
0.00819
Низкий

7.4 High

CVSS3

Дефекты

CWE-352

Связанные уязвимости

CVSS3: 7.4
nvd
около 3 лет назад

XWiki Platform is vulnerable to Cross-Site Request Forgery (CSRF) that may allow attackers to delete or rename tags without needing any confirmation. The problem has been patched in XWiki 13.10.7, 14.4.1 and 14.5RC1. Workarounds: It's possible to patch existing instances directly by editing the page Main.Tags and add this kind of check, in the code for renaming and for deleting: ``` #if (!$services.csrf.isTokenValid($request.get('form_token'))) #set ($discard = $response.sendError(401, "Wrong CSRF token")) #end ```

EPSS

Процентиль: 74%
0.00819
Низкий

7.4 High

CVSS3

Дефекты

CWE-352