Описание
XWiki configuration files can be accessed through the webjars API
Impact
It's possible to get access and read configuration files by using URLs such as http://localhost:8080/xwiki/webjars/wiki%3Axwiki/..%2F..%2F..%2F..%2F..%2FWEB-INF%2Fxwiki.cfg. The trick here is to encode the / which is decoded when parsing the URL segment, but not re-encoded when assembling the file path.
Patches
This has been patched in 17.4.0-rc-1, 16.10.7.
Workarounds
There is no known workaround, other than upgrading XWiki.
For more information
If you have any questions or comments about this advisory:
- Open an issue in Jira XWiki.org
- Email us at Security Mailing List
Ссылки
- https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-qww7-89xh-x7m7
- https://nvd.nist.gov/vuln/detail/CVE-2025-55747
- https://github.com/xwiki/xwiki-platform/commit/9e7b4c03f2143978d891109a17159f73d4cdd318#diff-45ea9c87d5fb68cd5db0da7f78cf25e76f1325f5fe56e21618b21786fc706236R80-R81
- https://jira.xwiki.org/browse/XWIKI-19350
Пакеты
org.xwiki.platform:xwiki-platform-webjars-api
>= 6.1-milestone-2, < 16.10.7
16.10.7
Связанные уязвимости
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In versions 6.1-milestone-2 through 16.10.6, configuration files are accessible through the webjars API. This is fixed in version 16.10.7.
Уязвимость компонента org.xwiki.platform:xwiki-platform-webjars-api платформы создания совместных веб-приложений XWiki Platform, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации