Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with edit rights on a document can trigger an XAR import on a forged XAR file, leading to the ability to display the content of any file on the XWiki server host. This vulnerability has been patched in XWiki 13.10.11, 14.4.7 and 14.10-rc-1. Users are advised to upgrade. Users unable to upgrade may apply the patch `e3527b98fd` manually.
Remediation
References
https://github.com/xwiki/xwiki-platform/commit/e3527b98fdd8dc8179c24dc55e662b2c55199434
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gx4f-976g-7g6v
https://jira.xwiki.org/browse/XWIKI-20320
Related Vulnerabilities
CVE-2023-26143 Vulnerability in npm package blamer
CVE-2023-45807 Vulnerability in maven package org.opensearch.plugin:opensearch-security
CVE-2023-40340 Vulnerability in maven package org.jenkins-ci.plugins:nodejs
CVE-2021-21347 Vulnerability in maven package com.thoughtworks.xstream:xstream
CVE-2017-5645 Vulnerability in maven package org.apache.logging.log4j:log4j-core