XWiki 2.5-milestone-2 < 13.10.11, 14.0-rc-1 < 14.4.8, 14.5 < 14.10.1 Information Disclosure Vulnerabilit
Reporter | Title | Published | Views | Family All 8 |
---|---|---|---|---|
![]() | Design/Logic Flaw | 19 Apr 202300:15 | – | prion |
![]() | CVE-2023-29517 | 19 Apr 202300:15 | – | cve |
![]() | CVE-2023-29517 Exposure of Sensitive Information to an Unauthorized Actor in org.xwiki.platform:xwiki-platform-office-viewer | 18 Apr 202323:54 | – | vulnrichment |
![]() | CVE-2023-29517 | 19 Apr 202300:15 | – | nvd |
![]() | GHSA-M3C3-9QJ7-7XMX Exposure of Sensitive Information to an Unauthorized Actor in org.xwiki.platform:xwiki-platform-office-viewer | 20 Apr 202322:01 | – | osv |
![]() | CVE-2023-29517 | 19 Apr 202300:15 | – | osv |
![]() | Exposure of Sensitive Information to an Unauthorized Actor in org.xwiki.platform:xwiki-platform-office-viewer | 20 Apr 202322:01 | – | github |
![]() | CVE-2023-29517 Exposure of Sensitive Information to an Unauthorized Actor in org.xwiki.platform:xwiki-platform-office-viewer | 18 Apr 202323:54 | – | cvelist |
Source | Link |
---|---|
github | www.github.com/advisories/GHSA-m3c3-9qj7-7xmx |
# SPDX-FileCopyrightText: 2023 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
CPE = "cpe:/a:xwiki:xwiki";
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.124379");
script_version("2023-10-13T16:09:03+0000");
script_tag(name:"last_modification", value:"2023-10-13 16:09:03 +0000 (Fri, 13 Oct 2023)");
script_tag(name:"creation_date", value:"2023-07-26 11:55:21 +0000 (Wed, 26 Jul 2023)");
script_tag(name:"cvss_base", value:"7.8");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:N/A:N");
script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2023-04-28 17:28:00 +0000 (Fri, 28 Apr 2023)");
script_cve_id("CVE-2023-29517");
script_tag(name:"qod_type", value:"remote_banner");
script_tag(name:"solution_type", value:"VendorFix");
script_name("XWiki 2.5-milestone-2 < 13.10.11, 14.0-rc-1 < 14.4.8, 14.5 < 14.10.1 Information Disclosure Vulnerability (GHSA-m3c3-9qj7-7xmx)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2023 Greenbone AG");
script_family("Web application abuses");
script_dependencies("gb_xwiki_enterprise_detect.nasl");
script_mandatory_keys("xwiki/detected");
script_tag(name:"summary", value:"Xwiki is prone to an information disclosure vulnerability.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"The office document viewer macro was allowing anyone to see any
file content from the hosting server, provided that the office server was connected and depending
on the permissions of the user running the servlet engine (e.g. tomcat) running XWiki. The same
vulnerability also allowed to perform internal requests to resources from the hosting server.");
script_tag(name:"affected", value:"XWiki version 2.5-milestone-2 prior to 13.10.11, 14.0-rc-1 prior to
14.4.8 and 14.5 prior to 14.10.1.");
script_tag(name:"solution", value:"Update to version 13.10.11, 14.4.8, 14.10.1 or later.");
script_xref(name:"URL", value:"https://github.com/advisories/GHSA-m3c3-9qj7-7xmx");
exit(0);
}
include("host_details.inc");
include("version_func.inc");
if( ! port = get_app_port( cpe:CPE ) )
exit( 0 );
if ( ! infos = get_app_version_and_location( cpe:CPE, port:port, exit_no_version:TRUE ) )
exit( 0 );
version = infos["version"];
location = infos["location"];
if( version_in_range_exclusive( version:version, test_version_lo:"2.5-milestone-2", test_version_up:"13.10.11" ) ) {
report = report_fixed_ver( installed_version:version, fixed_version:"13.10.11", install_path:location );
security_message( port:port, data:report );
exit( 0 );
}
if( version_in_range_exclusive( version:version, test_version_lo:"14.0-rc-1", test_version_up:"14.4.8" ) ) {
report = report_fixed_ver( installed_version:version, fixed_version:"14.4.8", install_path:location );
security_message( port:port, data:report );
exit( 0 );
}
if( version_in_range_exclusive( version:version, test_version_lo:"14.5", test_version_up:"14.10.1" ) ) {
report = report_fixed_ver( installed_version:version, fixed_version:"14.10.1", install_path:location );
security_message( port:port, data:report );
exit( 0 );
}
exit( 99 );
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo