logo

CVE-2022-23620 org.xwiki.platform:xwiki-platform-skin-skinx

Package

Manager: maven
Name: org.xwiki.platform:xwiki-platform-skin-skinx
Vulnerable Version: >=6.2-rc-1 <13.6

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00307 pctl0.53422

Details

Path traversal in xwiki-platform-skin-skinx XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. AbstractSxExportURLFactoryActionHandler#processSx does not escape anything from SSX document reference when serializing it on filesystem, so it's easy to mess up the HTML export process with reference elements containing filesystem syntax like "../", "./". or "/" in general (the last two not causing any security threat, but can cause conflicts with others serialized files). Patch can be found in 13.6-rc-1. Giving script or subwiki admin right only to trusted people and disabling HTML/PDF export can be done as workaround.

Metadata

Created: 2022-02-09T21:53:29Z
Modified: 2022-05-19T22:09:24Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-7ph6-5cmq-xgjq/GHSA-7ph6-5cmq-xgjq.json
CWE IDs: ["CWE-116", "CWE-22"]
Alternative ID: GHSA-7ph6-5cmq-xgjq
Finding: F063
Auto approve: 1