XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with edit rights on a document can trigger an XAR import on a forged XAR file, leading to the ability to display the content of any file on the XWiki server host. This vulnerability has been patched in XWiki 13.10.11, 14.4.7 and 14.10-rc-1. Users are advised to upgrade. Users unable to upgrade may apply the patch `e3527b98fd` manually.
References
Link | Resource |
---|---|
https://github.com/xwiki/xwiki-platform/commit/e3527b98fdd8dc8179c24dc55e662b2c55199434 | Patch |
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gx4f-976g-7g6v | Exploit Patch Vendor Advisory |
https://jira.xwiki.org/browse/XWIKI-20320 | Exploit Issue Tracking Patch Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2023-03-07T18:13:39.799Z
Updated: 2023-03-07T18:13:39.799Z
Reserved: 2023-03-01T19:03:56.633Z
Link: CVE-2023-27480
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-03-07T19:15:12.663
Modified: 2023-03-14T16:57:18.623
Link: CVE-2023-27480
JSON object: View
Redhat Information
No data.
CWE