6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
0.3 Low
EPSS
Percentile
97.0%
It’s possible to exploit well known parameters in XWiki URLs to perform redirection to untrusted site. This vulnerability was partially fixed in the past for XWiki 12.10.7 and 13.3RC1 but there is still the possibility to force specific URLs to skip some checks, e.g. using URLs like http:example.com
in the parameter would allow the redirect.
The issue has now been patched against all patterns that we know about for performing redirect. It also performs a real URI parsing that should protect in most cases. This has been patched in XWiki 14.10.4 and 15.0.
The only workaround is to upgrade XWiki.
If you have any questions or comments about this advisory:
Thanks to Paulos Mesfin who originally reported the vulnerability.
CPE | Name | Operator | Version |
---|---|---|---|
org.xwiki.platform:xwiki-platform-oldcore | lt | 14.10.4 |
github.com/advisories/GHSA-6gvj-8vc5-8v3j
github.com/advisories/GHSA-jp55-vvmf-63mv
github.com/xwiki/xwiki-platform/commit/e4f7f68e93cb08c25632c126356d218abf192d1e
github.com/xwiki/xwiki-platform/security/advisories/GHSA-6gvj-8vc5-8v3j
jira.xwiki.org/browse/XWIKI-20096
jira.xwiki.org/browse/XWIKI-20549
nvd.nist.gov/vuln/detail/CVE-2023-32068