logo

CVE-2023-35151 org.xwiki.platform:xwiki-platform-rest-server

Package

Manager: maven
Name: org.xwiki.platform:xwiki-platform-rest-server
Vulnerable Version: >=7.3-milestone-1 <14.4.8 || >=14.5 <14.10.6 || >=15.0-rc-1 <15.1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00208 pctl0.4327

Details

XWiki Platform may show email addresses in clear in REST results ### Impact Any user can call a REST endpoint and obtain the obfuscated passwords (even when the mail obfuscation is activated). For instance, by calling http://localhost:8080/xwiki/rest/wikis/xwiki/spaces/XWiki/pages/U1/objects/XWiki.XWikiUsers/0 when user `U1` exists on wiki `xwiki`. ### Patches The issue has been patched on XWiki 14.4.8, 14.10.6, and 15.1 ### Workarounds There is no known workaround. It is advised to upgrade to one of the patched versions. ### References - https://jira.xwiki.org/browse/XWIKI-16138 - https://github.com/xwiki/xwiki-platform/commit/824cd742ecf5439971247da11bfe7e0ad2b10ede ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)

Metadata

Created: 2023-06-20T16:46:29Z
Modified: 2023-06-20T16:46:29Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/06/GHSA-8g9c-c9cm-9c56/GHSA-8g9c-c9cm-9c56.json
CWE IDs: ["CWE-359", "CWE-668"]
Alternative ID: GHSA-8g9c-c9cm-9c56
Finding: F038
Auto approve: 1