logo

CVE-2022-41927 org.xwiki.platform:xwiki-platform-tag-ui

Package

Manager: maven
Name: org.xwiki.platform:xwiki-platform-tag-ui
Vulnerable Version: >=3.2-milestone-2 <13.10.7 || >=14.0.0 <14.4.1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00174 pctl0.39174

Details

Cross-Site Request Forgery (CSRF) allowing to delete or rename tags ### Impact It's possible with a simple request to perform deletion or renaming of tags without needing any confirmation, by using a CSRF attack. ### Patches The problem has been patched in XWiki 13.10.7, 14.4.1 and 14.5RC1. ### Workarounds It's possible to patch existing instances directly by editing the page Main.Tags and add this kind of check, in the code for renaming and for deleting: ``` #if (!$services.csrf.isTokenValid($request.get('form_token'))) #set ($discard = $response.sendError(401, "Wrong CSRF token")) #end ``` See the commit with the fix for more information about patching the page: https://github.com/xwiki/xwiki-platform/commit/7fd4cda0590180c4d34f557597e9e10e263def9e ### References * https://jira.xwiki.org/browse/XWIKI-19748 * https://github.com/xwiki/xwiki-platform/commit/7fd4cda0590180c4d34f557597e9e10e263def9e ### For more information If you have any questions or comments about this advisory: * Open an issue in [JIRA](https://jira.xwiki.org) * Email us at [security ML](mailto:security@xwiki.org)

Metadata

Created: 2022-11-21T22:34:35Z
Modified: 2022-11-21T22:34:35Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/11/GHSA-mq7h-5574-hw9f/GHSA-mq7h-5574-hw9f.json
CWE IDs: ["CWE-352"]
Alternative ID: GHSA-mq7h-5574-hw9f
Finding: F007
Auto approve: 1