Headline
CVE-2022-41936: Exposure of Private Personal Information to an Unauthorized Actor in org.xwiki.platform:xwiki-platform-rest-server
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. The modifications
rest endpoint does not filter out entries according to the user’s rights. Therefore, information hidden from unauthorized users are exposed though the modifications
rest endpoint (comments and page names etc). Users should upgrade to XWiki 14.6+, 14.4.3+, or 13.10.8+. Older versions have not been patched. There are no known workarounds.
Impact
The modifications rest endpoint does not filter out entries according to the user’s rights.
Therefore, information hidden from unauthorized users are exposed though the modifications rest endpoint (e.g., comments, page names…).
Patches
Users should upgrade to XWiki 14.6+, 14.4.3+, or13.10.8+. Older versions have not been patched.
Workarounds
No known workaround.
References
- Patch: 38dc1aa
- Jira issue: https://jira.xwiki.org/browse/XWIKI-19997
For more information
If you have any questions or comments about this advisory:
- Open an issue in Jira XWiki.org
- Email us at Security Mailing List
Related news
### Impact The `modifications` rest endpoint does not filter out entries according to the user's rights. Therefore, information hidden from unauthorized users are exposed though the `modifications` rest endpoint (e.g., comments, page names...). ### Patches Users should upgrade to XWiki 14.6+, 14.4.3+, or13.10.8+. Older versions have not been patched. ### Workarounds No known workaround. ### References - Patch: https://github.com/xwiki/xwiki-platform/commit/38dc1aa1a4435f24d58f5b8e4566cbcb0971f8ff - Jira issue: https://jira.xwiki.org/browse/XWIKI-19997 ### For more information If you have any questions or comments about this advisory: - Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) - Email us at [Security Mailing List](mailto:[email protected])