XWiki Commons are technical libraries common to several other top level XWiki projects. It is possible to bypass the existing security measures put in place to avoid open redirect by using a redirect such as `//mydomain.com` (i.e. omitting the `http:`). It was also possible to bypass it when using URL such as `http:/mydomain.com`. The problem has been patched on XWiki 13.10.10, 14.4.4 and 14.8RC1.
References
Link | Resource |
---|---|
https://github.com/xwiki/xwiki-platform/commit/e4f7f68e93cb08c25632c126356d218abf192d1e#diff-c445f288d5d63424f56ef13f65514ab4e174a72e979b53b88197c2b7def267cf | Patch |
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-xwph-x6xj-wggv | Exploit Patch Vendor Advisory |
https://jira.xwiki.org/browse/XWIKI-10309 | Exploit Issue Tracking |
https://jira.xwiki.org/browse/XWIKI-19994 | Exploit Issue Tracking |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2023-04-15T15:24:22.093Z
Updated: 2023-04-15T15:24:22.093Z
Reserved: 2023-04-03T13:37:18.454Z
Link: CVE-2023-29204
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-04-15T16:15:07.147
Modified: 2023-04-26T18:30:32.577
Link: CVE-2023-29204
JSON object: View
Redhat Information
No data.
CWE