CVE-2023-34466 – org.xwiki.platform:xwiki-platform-tag-api
Package
Manager: maven
Name: org.xwiki.platform:xwiki-platform-tag-api
Vulnerable Version: >=5.0-milestone-1 <14.4.8 || >=14.5 <14.10.4
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.0019 pctl0.41062
Details
XWiki Platform's tags on non-viewable pages can be revealed to users ### Impact Tags from pages not viewable to the current user are leaked by the tags API. This information can also be exploited to infer the document reference of non-viewable pages. ### Patches This vulnerability has been patched in XWiki 14.4.8, 14.10.4, and 15.0 RC1. ### Workarounds There is no workaround apart from upgrading to a fixed version. ### References - https://jira.xwiki.org/browse/XWIKI-20002 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)
Metadata
Created: 2023-06-20T16:45:12Z
Modified: 2023-06-20T16:45:12Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/06/GHSA-7f2f-pcv3-j2r7/GHSA-7f2f-pcv3-j2r7.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-7f2f-pcv3-j2r7
Finding: F038
Auto approve: 1