Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Between (and including) versions 13.1RC1 and 13.1, the reset password form reveals the email address of users just by giving their username. The problem has been patched on XWiki 13.2RC1. As a workaround, it is possible to manually modify the `resetpasswordinline.vm` to perform the changes made to mitigate the vulnerability.
Remediation
References
https://github.com/xwiki/xwiki-platform/commit/0cf716250b3645a5974c80d8336dcdf885749dff#diff-14a3132e3986b1f5606dd13d9d8a8bb8634bec9932123c5e49e9604cfd850fc2
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-h4m4-pgp4-whgm
https://jira.xwiki.org/browse/XWIKI-18400
Related Vulnerabilities
CVE-2022-41777 Vulnerability in npm package nadesiko3
CVE-2022-24728 Vulnerability in maven package org.webjars.npm:ckeditor4
CVE-2020-22864 Vulnerability in npm package froala-editor
CVE-2021-22135 Vulnerability in maven package org.elasticsearch:elasticsearch
CVE-2017-5657 Vulnerability in maven package org.apache.archiva:archiva