Lucene search

K
cveGitHub_MCVE-2022-23621
HistoryFeb 09, 2022 - 10:15 p.m.

CVE-2022-23621

2022-02-0922:15:07
CWE-862
CWE-552
GitHub_M
web.nvd.nist.gov
72
cve-2022-23621
xwiki platform
runtime services
vulnerability
security patch
file access
update
nvd

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

CVSS3

5.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H

AI Score

4.9

Confidence

High

EPSS

0.001

Percentile

41.4%

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with SCRIPT right can read any file located in the XWiki WAR (for example xwiki.cfg and xwiki.properties) through XWiki#invokeServletAndReturnAsString as $xwiki.invokeServletAndReturnAsString("/WEB-INF/xwiki.cfg"). This issue has been patched in XWiki versions 12.10.9, 13.4.3 and 13.7-rc-1. Users are advised to update. The only workaround is to limit SCRIPT right.

Affected configurations

Nvd
Vulners
Node
xwikixwikiRange<12.10.9
OR
xwikixwikiRange13.413.4.3
OR
xwikixwikiRange13.4.413.7
VendorProductVersionCPE
xwikixwiki*cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "xwiki-platform",
    "vendor": "xwiki",
    "versions": [
      {
        "status": "affected",
        "version": ">= 13.6.0, < 13.7-rc-1"
      },
      {
        "status": "affected",
        "version": ">= 13.0.0, < 13.4.3"
      },
      {
        "status": "affected",
        "version": "< 12.10.9"
      }
    ]
  }
]

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

CVSS3

5.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H

AI Score

4.9

Confidence

High

EPSS

0.001

Percentile

41.4%

Related for CVE-2022-23621