logo

CVE-2024-55663 org.xwiki.platform:xwiki-platform-distribution-war

Package

Manager: maven
Name: org.xwiki.platform:xwiki-platform-distribution-war
Vulnerable Version: >=6.3-milestone-2 <13.10.5 || >=14.0-rc-1 <14.3-rc-1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:U/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.01453 pctl0.80061

Details

XWiki Platform has an SQL injection in getdocuments.vm with sort parameter ### Impact In `getdocument.vm` ; the ordering of the returned documents is defined from an unsanitized request parameter (request.sort) and can allow any user to inject HQL. Depending on the used database backend, the attacker may be able to not only obtain confidential information such as password hashes from the database, but also execute UPDATE/INSERT/DELETE queries. It's possible to employ database backend dependent techniques of breaking out of HQL query context, described, for example, here: https://www.sonarsource.com/blog/exploiting-hibernate-injections. ### Patches This has been patched in 13.10.5 and 14.3-rc-1. ### Workarounds There is no known workaround, other than upgrading XWiki. ### References https://jira.xwiki.org/browse/XWIKI-17568 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)

Metadata

Created: 2024-12-12T19:22:12Z
Modified: 2024-12-16T18:08:46Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/12/GHSA-wh34-m772-5398/GHSA-wh34-m772-5398.json
CWE IDs: ["CWE-116"]
Alternative ID: GHSA-wh34-m772-5398
Finding: F404
Auto approve: 1