Headline
GHSA-5cf8-vrr8-8hjm: XWiki Platform packages Expose Sensitive Information to an Unauthorized Actor
Impact
Users can deduce the content of the password fields by repeated call to LiveTableResults
and WikisLiveTableResultsMacros
.
Patches
The issue is applied on versions 14.7-rc-1, 13.4.4, and 13.10.9.
Workarounds
The issue can be fixed by upgrading to versions 14.7-rc-1, 13.4.4, and 13.10.9 and higher, or in version >= 3.2M3 by applying the patch manually on LiveTableResults
and WikisLiveTableResultsMacros
.
References
- Jira: https://jira.xwiki.org/browse/XWIKI-19949
- Patch: https://github.com/xwiki/xwiki-platform/commit/7f8825537c9523ccb5051abd78014d156f9791c8
For more information
If you have any questions or comments about this advisory:
- Open an issue in Jira XWiki.org
- Email us at Security Mailing List
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2023-26476
XWiki Platform packages Expose Sensitive Information to an Unauthorized Actor
High severity GitHub Reviewed Published Mar 1, 2023 in xwiki/xwiki-platform • Updated Mar 3, 2023
Package
maven org.xwiki.platform:xwiki-platform-livetable-ui (Maven)
Affected versions
>= 3.2-m3, < 13.4.4
>= 13.5.0, < 13.10.9
>= 14.0.0, < 14.7-rc-1
Patched versions
13.4.4
13.10.9
14.7-rc-1
maven org.xwiki.platform:xwiki-platform-wiki-ui-mainwiki (Maven)
>= 3.2-m3, < 13.4.4
>= 13.5.0, < 13.10.9
>= 14.0.0, < 14.7-rc-1
Published by the National Vulnerability Database
Mar 2, 2023
Published to the GitHub Advisory Database
Mar 3, 2023
Related news
XWiki Platform is a generic wiki platform. Starting in version 3.2-m3, users can deduce the content of the password fields by repeated call to `LiveTableResults` and `WikisLiveTableResultsMacros`. The issue can be fixed by upgrading to versions 14.7-rc-1, 13.4.4, or 13.10.9 and higher, or in version >= 3.2M3 by applying the patch manually on `LiveTableResults` and `WikisLiveTableResultsMacros`.