Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS0yamhtLXFwNDgtaHY1as0p2A

Missing authorization in xwiki-platform

Impact

Any user with SCRIPT right (EDIT right before XWiki 7.4) can read any file located in the XWiki WAR (for example xwiki.cfg and xwiki.properties) through XWiki#invokeServletAndReturnAsString:

$xwiki.invokeServletAndReturnAsString("/WEB-INF/xwiki.cfg")

Patches

It has been patched in XWiki versions 12.10.9, 13.4.3 and 13.7-rc-1.

Workarounds

The only workaround is to give SCRIPT right only to trusted users.

References

https://jira.xwiki.org/browse/XWIKI-18870

For more information

If you have any questions or comments about this advisory:

Permalink: https://github.com/advisories/GHSA-2jhm-qp48-hv5j
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS0yamhtLXFwNDgtaHY1as0p2A
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 2 years ago
Updated: 9 months ago


CVSS Score: 5.5
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H

Identifiers: GHSA-2jhm-qp48-hv5j, CVE-2022-23621
References: Repository: https://github.com/xwiki/xwiki-platform
Blast Radius: 1.0

Affected Packages

maven:org.xwiki.platform:xwiki-platform-oldcore
Affected Version Ranges: < 12.10.9, >= 13.0.0, < 13.4.3, >= 13.6-rc-1, <= 13.6
Fixed in: 12.10.9, 13.4.3, 13.7-rc-1