Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xwph-x6xj-wggv

Опубликовано: 12 апр. 2023
Источник: github
Github: Прошло ревью
CVSS3: 4.7

Описание

org.xwiki.platform:xwiki-platform-oldcore Open Redirect vulnerability

Impact

It is possible to bypass the existing security measures put in place to avoid open redirect by using a redirect such as //mydomain.com (i.e. omitting the http:). It was also possible to bypass it when using URL such as http:/mydomain.com.

Patches

The problem has been patched on XWiki 13.10.10, 14.4.4 and 14.8RC1.

Workarounds

The only way to workaround the bug is by providing a patched jar of xwiki-platform-oldcore containing the following changes: https://github.com/xwiki/xwiki-platform/commit/e4f7f68e93cb08c25632c126356d218abf192d1e#diff-c445f288d5d63424f56ef13f65514ab4e174a72e979b53b88197c2b7def267cf.

References

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

org.xwiki.platform:xwiki-platform-oldcore

maven
Затронутые версииВерсия исправления

>= 6.0-rc-1, < 13.10.10

13.10.10

Наименование

org.xwiki.platform:xwiki-platform-oldcore

maven
Затронутые версииВерсия исправления

>= 14.0-rc-1, < 14.4.4

14.4.4

Наименование

org.xwiki.platform:xwiki-platform-oldcore

maven
Затронутые версииВерсия исправления

>= 14.5, < 14.8-rc-1

14.8-rc-1

EPSS

Процентиль: 94%
0.12787
Средний

4.7 Medium

CVSS3

Дефекты

CWE-601

Связанные уязвимости

CVSS3: 4.7
nvd
больше 2 лет назад

XWiki Commons are technical libraries common to several other top level XWiki projects. It is possible to bypass the existing security measures put in place to avoid open redirect by using a redirect such as `//mydomain.com` (i.e. omitting the `http:`). It was also possible to bypass it when using URL such as `http:/mydomain.com`. The problem has been patched on XWiki 13.10.10, 14.4.4 and 14.8RC1.

EPSS

Процентиль: 94%
0.12787
Средний

4.7 Medium

CVSS3

Дефекты

CWE-601