XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. The content of a document included using `{{include reference="targetdocument"/}}` is executed with the right of the includer and not with the right of its author. This means that any user able to modify the target document can impersonate the author of the content which used the `include` macro. This vulnerability has been patched in XWiki 15.0 RC1 by making the default behavior safe.
References
Link | Resource |
---|---|
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-qcj3-wpgm-qpxh | Vendor Advisory |
Configurations
History
26 Jun 2024, 14:47
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
First Time |
Xwiki
Xwiki xwiki |
|
References | () https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-qcj3-wpgm-qpxh - Vendor Advisory | |
CPE | cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:* | |
Summary |
|
24 Jun 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-24 17:15
Updated : 2024-06-26 14:47
NVD link : CVE-2024-38369
Mitre link : CVE-2024-38369
CVE.ORG link : CVE-2024-38369
JSON object : View
Products Affected
xwiki
- xwiki
CWE
CWE-863
Incorrect Authorization