Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-26470: XWIKI-19223: Improve xobject memory storage in XWikidocument · xwiki/xwiki-platform@fdfce06

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. It’s possible to make the farm unusable by adding an object to a page with a huge number (e.g. 67108863). Most of the time this will fill the memory allocated to XWiki and make it unusable every time this document is manipulated. This issue has been patched in XWiki 14.0-rc-1.

CVE

@@ -120,12 +120,26 @@ void remove()

assertEquals(3, objects.size());

objects.remove(0);

objects.remove(2);

assertNull(objects.get(0));

assertSame(XOBJ2, objects.get(1));

assertNull(objects.get(2));

assertEquals(2, objects.size());

assertSame(XOBJ2, objects.get(0));

assertSame(XOBJ3, objects.get(1));

objects.remove(1);

assertEquals(1, objects.size());

assertSame(XOBJ2, objects.get(0));

}

@Test

void clear()

{

BaseObjects objects = new BaseObjects(Arrays.asList(XOBJ1, XOBJ2, XOBJ3));

assertEquals(3, objects.size());

objects.clear();

assertEquals(0, objects.size());

}

}

Related news

GHSA-92wp-r7hm-42g7: XWiki Platform subject to Uncontrolled Resource Consumption

### Impact It's possible to make the farm unusable by adding an object to a page with a huge number (e.g. 67108863). This will most of the time fill the memory allocated to XWiki and make it unusable every time this document is manipulated. ### Patches It has been patched in XWiki 14.0 ### Workarounds There is no workaround. ### References https://jira.xwiki.org/browse/XWIKI-19223 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki](https://jira.xwiki.org) * Email us at [our security mailing list](mailto:[email protected])

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907