// For flags

CVE-2023-37910

org.xwiki.platform:xwiki-platform-attachment-api vulnerable to Missing Authorization on Attachment Move

Severity Score

8.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Starting with the introduction of attachment move support in version 14.0-rc-1 and prior to versions 14.4.8, 14.10.4, and 15.0-rc-1, an attacker with edit access on any document (can be the user profile which is editable by default) can move any attachment of any other document to this attacker-controlled document. This allows the attacker to access and possibly publish any attachment of which the name is known, regardless if the attacker has view or edit rights on the source document of this attachment. Further, the attachment is deleted from the source document. This vulnerability has been patched in XWiki 14.4.8, 14.10.4, and 15.0 RC1. There is no workaround apart from upgrading to a fixed version.

XWiki Platform es una plataforma wiki genérica que ofrece servicios de ejecución para aplicaciones creadas sobre ella. A partir de la introducción de la compatibilidad con el movimiento de archivos adjuntos en la versión 14.0-rc-1 y antes de las versiones 14.4.8, 14.10.4 y 15.0-rc-1, un atacante con acceso de edición a cualquier documento (puede ser el perfil de usuario que está editable de forma predeterminada) puede mover cualquier archivo adjunto de cualquier otro documento a este documento controlado por el atacante. Esto permite al atacante acceder y posiblemente publicar cualquier archivo adjunto cuyo nombre se conozca, independientemente de si el atacante tiene derechos de visualización o edición sobre el documento fuente de este archivo adjunto. Además, el archivo adjunto se elimina del documento fuente. Esta vulnerabilidad ha sido parcheada en XWiki 14.4.8, 14.10.4 y 15.0 RC1. No existe otro workaround aparte de actualizar a una versión fija.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
Poc
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2023-07-10 CVE Reserved
  • 2023-10-25 CVE Published
  • 2024-09-17 CVE Updated
  • 2024-09-17 First Exploit
  • 2024-09-24 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-862: Missing Authorization
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Xwiki
Search vendor "Xwiki"
Xwiki
Search vendor "Xwiki" for product "Xwiki"
>= 14.0 < 14.4.8
Search vendor "Xwiki" for product "Xwiki" and version " >= 14.0 < 14.4.8"
-
Affected
Xwiki
Search vendor "Xwiki"
Xwiki
Search vendor "Xwiki" for product "Xwiki"
>= 14.5 < 14.10.4
Search vendor "Xwiki" for product "Xwiki" and version " >= 14.5 < 14.10.4"
-
Affected