CVE-2022-29253 – org.xwiki.platform:xwiki-platform-oldcore
Package
Manager: maven
Name: org.xwiki.platform:xwiki-platform-oldcore
Vulnerable Version: >=8.3-rc-1 <13.10.3
Severity
Level: Low
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00063 pctl0.19799
Details
Path Traversal in XWiki Platform ### Impact One can ask for any file located in the classloader using the template API and a path with ".." in it. For example ``` {{template name="../xwiki.hbm.xml"/}} ``` To our knownledge none of the available files of the classloader in XWiki Standard contain any strong confidential data, hence the low confidentiality value of this advisory. ### Patches The issue is patched in versions 14.0 and 13.10.3. ### Workarounds There's no easy workaround for this issue, administrators should upgrade their wiki. ### References * https://jira.xwiki.org/browse/XWIKI-19349 * https://github.com/xwiki/xwiki-platform/commit/4917c8f355717bb636d763844528b1fe0f95e8e2 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki](https://jira.xwiki.org) * Email us at [security mailing list](mailto:security@xwiki.org)
Metadata
Created: 2022-06-01T19:56:34Z
Modified: 2022-06-01T19:56:34Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/06/GHSA-9qrp-h7fw-42hg/GHSA-9qrp-h7fw-42hg.json
CWE IDs: ["CWE-22", "CWE-24"]
Alternative ID: GHSA-9qrp-h7fw-42hg
Finding: F063
Auto approve: 1