CVE-2022-41935
Exposure of Sensitive Information to an Unauthorized Actor in org.xwiki.platform:xwiki-platform-livetable-ui
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users without the right to view documents can deduce their existence by repeated Livetable queries. The issue has been patched in XWiki 14.6RC1, 13.10.8, and 14.4.3, the response is not properly cleaned up of obfuscated entries. As a workaround, The patch for the document `XWiki.LiveTableResultsMacros` can be manually applied or a XAR archive of a patched version can be imported, on versions 12.10.11, 13.9-rc-1, and 13.4.4. There are no known workarounds for this issue.
XWiki Platform es una plataforma wiki genérica que ofrece servicios de ejecución para aplicaciones creadas sobre ella. Los usuarios sin derecho a ver documentos pueden deducir su existencia mediante consultas repetidas en Livetable. El problema se solucionó en XWiki 14.6RC1, 13.10.8 y 14.4.3, la respuesta no se limpia adecuadamente de entradas ofuscadas. Como workaround, el parche para el documento `XWiki.LiveTableResultsMacros` se puede aplicar manualmente o se puede importar un archivo XAR de una versión parcheada, en las versiones 12.10.11, 13.9-rc-1 y 13.4.4. No se conocen workarounds para este problema.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-09-30 CVE Reserved
- 2022-11-23 CVE Published
- 2024-06-15 EPSS Updated
- 2024-08-03 CVE Updated
- 2024-08-03 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (3)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-p2x4-6ghr-6vmq | 2024-08-03 | |
https://jira.xwiki.org/browse/XWIKI-19999 | 2024-08-03 |
URL | Date | SRC |
---|---|---|
https://github.com/xwiki/xwiki-platform/commit/1450b6e3c69ac7df25e5a2571186d1f43402facd#diff-5a739e5865b1f1ad9d79b724791be51b0095a0170cc078911c940478b13b949a | 2023-07-06 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Xwiki Search vendor "Xwiki" | Xwiki Search vendor "Xwiki" for product "Xwiki" | >= 12.10.11 < 13.10.8 Search vendor "Xwiki" for product "Xwiki" and version " >= 12.10.11 < 13.10.8" | - |
Affected
| ||||||
Xwiki Search vendor "Xwiki" | Xwiki Search vendor "Xwiki" for product "Xwiki" | >= 14.0.0 < 14.4.3 Search vendor "Xwiki" for product "Xwiki" and version " >= 14.0.0 < 14.4.3" | - |
Affected
| ||||||
Xwiki Search vendor "Xwiki" | Xwiki Search vendor "Xwiki" for product "Xwiki" | 14.4.4 Search vendor "Xwiki" for product "Xwiki" and version "14.4.4" | - |
Affected
| ||||||
Xwiki Search vendor "Xwiki" | Xwiki Search vendor "Xwiki" for product "Xwiki" | 14.4.5 Search vendor "Xwiki" for product "Xwiki" and version "14.4.5" | - |
Affected
|