Lucene search

K
githubGitHub Advisory DatabaseGHSA-XWPH-X6XJ-WGGV
HistoryApr 12, 2023 - 8:38 p.m.

org.xwiki.platform:xwiki-platform-oldcore Open Redirect vulnerability

2023-04-1220:38:42
CWE-601
GitHub Advisory Database
github.com
10
open redirect
security advisory
patched versions
vulnerability report
xwiki

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

32.2%

Impact

It is possible to bypass the existing security measures put in place to avoid open redirect by using a redirect such as //mydomain.com (i.e. omitting the http:). It was also possible to bypass it when using URL such as http:/mydomain.com.

Patches

The problem has been patched on XWiki 13.10.10, 14.4.4 and 14.8RC1.

Workarounds

The only way to workaround the bug is by providing a patched jar of xwiki-platform-oldcore containing the following changes: https://github.com/xwiki/xwiki-platform/commit/e4f7f68e93cb08c25632c126356d218abf192d1e#diff-c445f288d5d63424f56ef13f65514ab4e174a72e979b53b88197c2b7def267cf.

References

For more information

If you have any questions or comments about this advisory:

Affected configurations

Vulners
Node
org.xwiki.platform\Matchxwiki-platform-oldcore
OR
org.xwiki.platform\Matchxwiki-platform-oldcore
OR
org.xwiki.platform\Matchxwiki-platform-oldcore
OR
org.xwiki.platform\Matchxwiki-platform-oldcore

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

32.2%

Related for GHSA-XWPH-X6XJ-WGGV