Lucene search

K
githubGitHub Advisory DatabaseGHSA-MQ7H-5574-HW9F
HistoryNov 21, 2022 - 10:34 p.m.

Cross-Site Request Forgery (CSRF) allowing to delete or rename tags

2022-11-2122:34:35
CWE-352
GitHub Advisory Database
github.com
21
csrf
xwiki
vulnerability
patching
deletion
renaming
security

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N

0.001 Low

EPSS

Percentile

21.6%

Impact

It’s possible with a simple request to perform deletion or renaming of tags without needing any confirmation, by using a CSRF attack.

Patches

The problem has been patched in XWiki 13.10.7, 14.4.1 and 14.5RC1.

Workarounds

It’s possible to patch existing instances directly by editing the page Main.Tags and add this kind of check, in the code for renaming and for deleting:

#if (!$services.csrf.isTokenValid($request.get('form_token')))
    #set ($discard = $response.sendError(401, "Wrong CSRF token"))
#end

See the commit with the fix for more information about patching the page: https://github.com/xwiki/xwiki-platform/commit/7fd4cda0590180c4d34f557597e9e10e263def9e

References

For more information

If you have any questions or comments about this advisory:

Affected configurations

Vulners
Node
org.xwiki.platform\xwikiMatchplatform
OR
org.xwiki.platform\xwikiMatchplatform
OR
org.xwiki.platform\xwikiMatchplatform

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N

0.001 Low

EPSS

Percentile

21.6%

Related for GHSA-MQ7H-5574-HW9F