CVE-2024-21651 – org.xwiki.platform:xwiki-platform-distribution-war
Package
Manager: maven
Name: org.xwiki.platform:xwiki-platform-distribution-war
Vulnerable Version: >=14.10 <14.10.18 || >=15.0-rc-1 <15.5.3 || >=15.6-rc-1 <15.8-rc-1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00379 pctl0.58653
Details
XWiki vulnerable to Denial of Service attack through attachments ### Impact A user able to attach a file to a page can post a malformed TAR file by manipulating file modification times headers, which when parsed by Tika, could cause a denial of service issue via CPU consumption. ### Patches This vulnerability has been patched in XWiki 14.10.18, 15.5.3 and 15.8 RC1. ### Workarounds The workaround is to download [commons-compress 1.24](https://search.maven.org/remotecontent?filepath=org/apache/commons/commons-compress/1.24.0/commons-compress-1.24.0.jar) and replace the one located in XWiki `WEB-INF/lib/` folder. ### References https://jira.xwiki.org/browse/XCOMMONS-2796 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)
Metadata
Created: 2024-01-08T16:39:47Z
Modified: 2024-01-09T16:12:43Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/01/GHSA-8959-rfxh-r4j4/GHSA-8959-rfxh-r4j4.json
CWE IDs: ["CWE-400"]
Alternative ID: GHSA-8959-rfxh-r4j4
Finding: F002
Auto approve: 1