logo

CVE-2023-26476 org.xwiki.platform:xwiki-platform-wiki-ui-mainwiki

Package

Manager: maven
Name: org.xwiki.platform:xwiki-platform-wiki-ui-mainwiki
Vulnerable Version: >=3.2-m3 <13.4.4 || >=13.5.0 <13.10.9 || >=14.0.0 <14.7-rc-1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00239 pctl0.46875

Details

XWiki Platform packages Expose Sensitive Information to an Unauthorized Actor ### Impact Users can deduce the content of the password fields by repeated call to `LiveTableResults` and `WikisLiveTableResultsMacros`. ### Patches The issue is applied on versions 14.7-rc-1, 13.4.4, and 13.10.9. ### Workarounds The issue can be fixed by upgrading to versions 14.7-rc-1, 13.4.4, and 13.10.9 and higher, or in version >= 3.2M3 by applying the patch manually on `LiveTableResults` and `WikisLiveTableResultsMacros`. ### References - Jira: https://jira.xwiki.org/browse/XWIKI-19949 - Patch: https://github.com/xwiki/xwiki-platform/commit/7f8825537c9523ccb5051abd78014d156f9791c8 ### For more information If you have any questions or comments about this advisory: - Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) - Email us at [Security Mailing List](mailto:security@xwiki.org)

Metadata

Created: 2023-03-03T22:47:49Z
Modified: 2023-03-03T22:47:49Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/03/GHSA-5cf8-vrr8-8hjm/GHSA-5cf8-vrr8-8hjm.json
CWE IDs: ["CWE-200", "CWE-307"]
Alternative ID: GHSA-5cf8-vrr8-8hjm
Finding: F038
Auto approve: 1