CVE-2022-23619 – org.xwiki.platform:xwiki-platform-web
Package
Manager: maven
Name: org.xwiki.platform:xwiki-platform-web
Vulnerable Version: >=13.5rc1 <13.6rc1 || >=13.0.0 <13.4.1 || >=0 <12.10.9
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00069 pctl0.21679
Details
Information exposure in xwiki-platform ### Impact It's possible to guess if a user has an account on the wiki by using the "Forgot your password" form, even if the wiki is closed to guest users. ### Patches The problem has been patched on XWiki 12.10.9, 13.4.1 and 13.6RC1. ### Workarounds There's no easy workaround other than applying the upgrade. ### References https://jira.xwiki.org/browse/XWIKI-18787 ### For more information If you have any questions or comments about this advisory: * Open an issue in [JIRA](https://jira.xwiki.org) * Email us at [XWiki Security Mailing list](mailto:security@xwiki.org)
Metadata
Created: 2022-02-09T21:51:19Z
Modified: 2022-02-09T21:51:19Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-35fg-hjcr-j65f/GHSA-35fg-hjcr-j65f.json
CWE IDs: ["CWE-200", "CWE-640"]
Alternative ID: GHSA-35fg-hjcr-j65f
Finding: F038
Auto approve: 1