CVE-2022-23621 – org.xwiki.platform:xwiki-platform-oldcore
Package
Manager: maven
Name: org.xwiki.platform:xwiki-platform-oldcore
Vulnerable Version: >=13.6-rc-1 <13.7-rc-1 || >=13.0.0 <13.4.3 || >=0 <12.10.9
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00105 pctl0.29246
Details
Missing authorization in xwiki-platform ### Impact Any user with SCRIPT right (EDIT right before XWiki 7.4) can read any file located in the XWiki WAR (for example xwiki.cfg and xwiki.properties) through XWiki#invokeServletAndReturnAsString: ``` $xwiki.invokeServletAndReturnAsString("/WEB-INF/xwiki.cfg") ``` ### Patches It has been patched in XWiki versions 12.10.9, 13.4.3 and 13.7-rc-1. ### Workarounds The only workaround is to give SCRIPT right only to trusted users. ### References https://jira.xwiki.org/browse/XWIKI-18870 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki](https://jira.xwiki.org) * Email us at [our security mailing list](mailto:security@xwiki.org)
Metadata
Created: 2022-02-09T21:56:05Z
Modified: 2022-02-09T21:56:05Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-2jhm-qp48-hv5j/GHSA-2jhm-qp48-hv5j.json
CWE IDs: ["CWE-552", "CWE-862"]
Alternative ID: GHSA-2jhm-qp48-hv5j
Finding: F039
Auto approve: 1