org.xwiki.commons:xwiki-commons-xml is a common module used by other XWiki top level projects. Starting in version 2.7 and prior to versions 12.10.10, 13.4.4, and 13.8-rc-1, it is possible for a script to access any file accessing to the user running XWiki application server with XML External Entity Injection through the XML script service. The problem has been patched in versions 12.10.10, 13.4.4, and 13.8-rc-1. There is no easy workaround for fixing this vulnerability other than upgrading and being careful when giving Script rights.
References
Link | Resource |
---|---|
https://github.com/xwiki/xwiki-commons/commit/947e8921ebd95462d5a7928f397dd1b64f77c7d5 | Patch Third Party Advisory |
https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-m2r5-4w96-qxg5 | Third Party Advisory |
https://jira.xwiki.org/browse/XWIKI-18946 | Exploit Vendor Advisory |
https://github.com/xwiki/xwiki-commons/commit/947e8921ebd95462d5a7928f397dd1b64f77c7d5 | Patch Third Party Advisory |
https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-m2r5-4w96-qxg5 | Third Party Advisory |
https://jira.xwiki.org/browse/XWIKI-18946 | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/xwiki/xwiki-commons/commit/947e8921ebd95462d5a7928f397dd1b64f77c7d5 - Patch, Third Party Advisory | |
References | () https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-m2r5-4w96-qxg5 - Third Party Advisory | |
References | () https://jira.xwiki.org/browse/XWIKI-18946 - Exploit, Vendor Advisory |
Information
Published : 2022-04-28 20:15
Updated : 2024-11-21 06:51
NVD link : CVE-2022-24898
Mitre link : CVE-2022-24898
CVE.ORG link : CVE-2022-24898
JSON object : View
Products Affected
xwiki
- commons
CWE
CWE-611
Improper Restriction of XML External Entity Reference