Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS03cGg2LTVjbXEteGdqcc0p1w
Path traversal in xwiki-platform-skin-skinx
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. AbstractSxExportURLFactoryActionHandler#processSx does not escape anything from SSX document reference when serializing it on filesystem, so it's easy to mess up the HTML export process with reference elements containing filesystem syntax like "../", "./". or "/" in general (the last two not causing any security threat, but can cause conflicts with others serialized files). Patch can be found in 13.6-rc-1. Giving script or subwiki admin right only to trusted people and disabling HTML/PDF export can be done as workaround.
Permalink: https://github.com/advisories/GHSA-7ph6-5cmq-xgjqJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS03cGg2LTVjbXEteGdqcc0p1w
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 3 years ago
Updated: over 1 year ago
CVSS Score: 6.8
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:H
Identifiers: GHSA-7ph6-5cmq-xgjq, CVE-2022-23620
References:
- https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-7ph6-5cmq-xgjq
- https://github.com/xwiki/xwiki-platform/commit/ab778254fb8f71c774e1c1239368c44fe3b6bba5
- https://jira.xwiki.org/browse/XWIKI-18819
- https://nvd.nist.gov/vuln/detail/CVE-2022-23620
- https://github.com/advisories/GHSA-7ph6-5cmq-xgjq
Blast Radius: 1.0
Affected Packages
maven:org.xwiki.platform:xwiki-platform-skin-skinx
Affected Version Ranges: >= 6.2-rc-1, < 13.6Fixed in: 13.6