CVE | CVE-2022-41935 |
CVE Title | |
Published Date | 2022-11-23T20:15Z |
Modified Date | 2022-11-30T17:34Z |
CWE Type | CWE-200 |
CVSS 3.x | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N |
Description | XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users without the right to view documents can deduce their existence by repeated Livetable queries. The issue has been patched in XWiki 14.6RC1, 13.10.8, and 14.4.3, the response is not properly cleaned up of obfuscated entries. As a workaround, The patch for the document `XWiki.LiveTableResultsMacros` can be manually applied or a XAR archive of a patched version can be imported, on versions 12.10.11, 13.9-rc-1, and 13.4.4. There are no known workarounds for this issue. |
References | |
By clicking these links you will leave this website. We do not endorse and will not be held accountable for any activity on external sites. | |
Reference URL | https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-p2x4-6ghr-6vmq |
Reference Description | CONFIRM https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-p2x4-6ghr-6vmq |
Reference URL | https://jira.xwiki.org/browse/XWIKI-19999 |
Reference Description | MISC https://jira.xwiki.org/browse/XWIKI-19999 |
Reference URL | https://github.com/xwiki/xwiki-platform/commit/1450b6e3c69ac7df25e5a2571186d1f43402facd#diff-5a739e5865b1f1ad9d79b724791be51b0095a0170cc078911c940478b13b949a |
Reference Description | MISC https://github.com/xwiki/xwiki-platform/commit/1450b6e3c69ac7df25e5a2571186d1f43402facd#diff-5a739e5865b1f1ad9d79b724791be51b0095a0170cc078911c940478b13b949a |
Tags | Exploit Patch Third Party Advisory |
Sources | NIST MITRE |