Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-v9j2-q4q5-cxh4

Опубликовано: 02 июл. 2021
Источник: github
Github: Прошло ревью
CVSS3: 5.7

Описание

No CSRF protection on the password change form

Impact

It's possible for forge an URL that, when accessed by an admin, will reset the password of any user in XWiki.

Patches

The problem has been patched in XWiki 12.10.5, 13.2RC1.

Workarounds

It's possible to apply the patch manually by modifying the register_macros.vm template like in https://github.com/xwiki/xwiki-platform/commit/0a36dbcc5421d450366580217a47cc44d32f7257.

References

https://jira.xwiki.org/browse/XWIKI-18315

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

org.xwiki.platform:xwiki-platform-administration-ui

maven
Затронутые версииВерсия исправления

< 12.10.5

12.10.5

Наименование

org.xwiki.platform:xwiki-platform-administration-ui

maven
Затронутые версииВерсия исправления

>= 13.0, < 13.2

13.2

EPSS

Процентиль: 38%
0.0017
Низкий

5.7 Medium

CVSS3

Дефекты

CWE-352

Связанные уязвимости

CVSS3: 5.7
nvd
больше 4 лет назад

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. A cross-site request forgery vulnerability exists in versions prior to 12.10.5, and in versions 13.0 through 13.1. It's possible for forge an URL that, when accessed by an admin, will reset the password of any user in XWiki. The problem has been patched in XWiki 12.10.5 and 13.2RC1. As a workaround, it is possible to apply the patch manually by modifying the `register_macros.vm` template.

EPSS

Процентиль: 38%
0.0017
Низкий

5.7 Medium

CVSS3

Дефекты

CWE-352