Description
XWiki Commons are technical libraries common to several other top level XWiki projects. It is possible to bypass the existing security measures put in place to avoid open redirect by using a redirect such as `//mydomain.com` (i.e. omitting the `http:`). It was also possible to bypass it when using URL such as `http:/mydomain.com`. The problem has been patched on XWiki 13.10.10, 14.4.4 and 14.8RC1.
Remediation
References
https://github.com/xwiki/xwiki-platform/commit/e4f7f68e93cb08c25632c126356d218abf192d1e#diff-c445f288d5d63424f56ef13f65514ab4e174a72e979b53b88197c2b7def267cf
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-xwph-x6xj-wggv
https://jira.xwiki.org/browse/XWIKI-10309
https://jira.xwiki.org/browse/XWIKI-19994
Related Vulnerabilities
CVE-2022-2564 Vulnerability in npm package mongoose
CVE-2021-35065 Vulnerability in npm package glob-parent
CVE-2023-28158 Vulnerability in maven package org.apache.archiva:archiva-web-common
CVE-2023-44487 Vulnerability in maven package io.netty:netty-codec-http2
CVE-2020-4051 Vulnerability in maven package org.webjars.bower:dijit