Описание
org.xwiki.commons:xwiki-commons-xml is a common module used by other XWiki top level projects. Starting in version 2.7 and prior to versions 12.10.10, 13.4.4, and 13.8-rc-1, it is possible for a script to access any file accessing to the user running XWiki application server with XML External Entity Injection through the XML script service. The problem has been patched in versions 12.10.10, 13.4.4, and 13.8-rc-1. There is no easy workaround for fixing this vulnerability other than upgrading and being careful when giving Script rights.
Ссылки
- PatchThird Party Advisory
- Third Party Advisory
- ExploitVendor Advisory
- PatchThird Party Advisory
- Third Party Advisory
- ExploitVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 2.7 (включая) до 12.10.10 (исключая)Версия от 13.0 (включая) до 13.4.4 (исключая)Версия от 13.5 (включая) до 13.8 (исключая)
Одно из
cpe:2.3:a:xwiki:commons:*:*:*:*:*:*:*:*
cpe:2.3:a:xwiki:commons:*:*:*:*:*:*:*:*
cpe:2.3:a:xwiki:commons:*:*:*:*:*:*:*:*
EPSS
Процентиль: 32%
0.00127
Низкий
4.9 Medium
CVSS3
4 Medium
CVSS2
Дефекты
CWE-611
CWE-611
Связанные уязвимости
CVSS3: 4.9
github
почти 4 года назад
Arbitrary file access through XML parsing in org.xwiki.commons:xwiki-commons-xml
EPSS
Процентиль: 32%
0.00127
Низкий
4.9 Medium
CVSS3
4 Medium
CVSS2
Дефекты
CWE-611
CWE-611