Headline
GHSA-5cf8-vrr8-8hjm: XWiki Platform packages Expose Sensitive Information to an Unauthorized Actor
Impact
Users can deduce the content of the password fields by repeated call to LiveTableResults and WikisLiveTableResultsMacros.
Patches
The issue is applied on versions 14.7-rc-1, 13.4.4, and 13.10.9.
Workarounds
The issue can be fixed by upgrading to versions 14.7-rc-1, 13.4.4, and 13.10.9 and higher, or in version >= 3.2M3 by applying the patch manually on LiveTableResults and WikisLiveTableResultsMacros.
References
- Jira: https://jira.xwiki.org/browse/XWIKI-19949
- Patch: https://github.com/xwiki/xwiki-platform/commit/7f8825537c9523ccb5051abd78014d156f9791c8
For more information
If you have any questions or comments about this advisory:
- Open an issue in Jira XWiki.org
- Email us at Security Mailing List
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2023-26476
XWiki Platform packages Expose Sensitive Information to an Unauthorized Actor
High severity GitHub Reviewed Published Mar 1, 2023 in xwiki/xwiki-platform • Updated Mar 3, 2023
Package
maven org.xwiki.platform:xwiki-platform-livetable-ui (Maven)
Affected versions
>= 3.2-m3, < 13.4.4
>= 13.5.0, < 13.10.9
>= 14.0.0, < 14.7-rc-1
Patched versions
13.4.4
13.10.9
14.7-rc-1
maven org.xwiki.platform:xwiki-platform-wiki-ui-mainwiki (Maven)
>= 3.2-m3, < 13.4.4
>= 13.5.0, < 13.10.9
>= 14.0.0, < 14.7-rc-1
Published by the National Vulnerability Database
Mar 2, 2023
Published to the GitHub Advisory Database
Mar 3, 2023
Related news
XWiki Platform is a generic wiki platform. Starting in version 3.2-m3, users can deduce the content of the password fields by repeated call to `LiveTableResults` and `WikisLiveTableResultsMacros`. The issue can be fixed by upgrading to versions 14.7-rc-1, 13.4.4, or 13.10.9 and higher, or in version >= 3.2M3 by applying the patch manually on `LiveTableResults` and `WikisLiveTableResultsMacros`.