XWiki Platform is a generic wiki platform. Starting in version 3.5-milestone-1 and prior to versions 14.4.8, 14.10.4, and 15.0-rc-1, the mail obfuscation configuration was not fully taken into account. While the mail displayed to the end user was obfuscated, the rest response was also containing the mail unobfuscated and users were able to filter and sort on the unobfuscated, allowing them to infer the mail content. The consequence was the possibility to retrieve the email addresses of all users even when obfuscated. This has been patched in XWiki 14.4.8, 14.10.4, and 15.0-rc-1.
References
Link | Resource |
---|---|
https://github.com/xwiki/xwiki-platform/commit/71f889db9962df2d385f4298e29cfbc9050b828a#diff-5a739e5865b1f1ad9d79b724791be51b0095a0170cc078911c940478b13b949a | Patch Vendor Advisory |
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-7vr7-cghh-ch63 | Vendor Advisory |
https://jira.xwiki.org/browse/XWIKI-20333 | Exploit Issue Tracking Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
30 Jun 2023, 13:13
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
First Time |
Xwiki
Xwiki xwiki |
|
CWE | CWE-668 | |
CPE | cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:* cpe:2.3:a:xwiki:xwiki:3.5:milestone1:*:*:*:*:*:* |
|
References | (MISC) https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-7vr7-cghh-ch63 - Vendor Advisory | |
References | (MISC) https://jira.xwiki.org/browse/XWIKI-20333 - Exploit, Issue Tracking, Patch, Vendor Advisory | |
References | (MISC) https://github.com/xwiki/xwiki-platform/commit/71f889db9962df2d385f4298e29cfbc9050b828a#diff-5a739e5865b1f1ad9d79b724791be51b0095a0170cc078911c940478b13b949a - Patch, Vendor Advisory |
23 Jun 2023, 17:21
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-23 17:15
Updated : 2024-02-28 20:13
NVD link : CVE-2023-34467
Mitre link : CVE-2023-34467
CVE.ORG link : CVE-2023-34467
JSON object : View
Products Affected
xwiki
- xwiki