logo

CVE-2021-32729 org.xwiki.platform:xwiki-platform-security-authentication-script

Package

Manager: maven
Name: org.xwiki.platform:xwiki-platform-security-authentication-script
Vulnerable Version: >=11.6 <12.6.8 || >=12.7 <12.10.4

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00046 pctl0.13684

Details

A user without PR can reset user authentication failures information ### Impact The script service method used to reset the authentication failures record can be executed by any user with Script rights and does not require Programming rights as it should have. Note that being able to reset the authentication failure record mean that an attacker with script right might use it to try performing a bruteforce attack since she'd been able to virtually deactivate the mechanism introduced to mitigate those attacks. ### Patches The problem has been patched in version 12.6.8, 12.10.4 and 13.0. ### Workarounds There's no workaround besides upgrading and being careful on which user should have Script right access. Note that any bruteforce attack on the authentication should be visible in the logs since the authentication failures are logged. ### References https://jira.xwiki.org/browse/XWIKI-18276 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira](http://jira.xwiki.org) * Email us at [the security mailing-list](mailto:security@xwiki.org)

Metadata

Created: 2021-07-02T19:19:31Z
Modified: 2021-07-02T16:44:24Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/07/GHSA-m738-3rc4-5xv3/GHSA-m738-3rc4-5xv3.json
CWE IDs: ["CWE-287", "CWE-693", "CWE-732"]
Alternative ID: GHSA-m738-3rc4-5xv3
Finding: F039
Auto approve: 1