Arbitrary file access through XML parsing in org.xwiki.commons:xwiki-commons-xml
Moderate severity
GitHub Reviewed
Published
Apr 28, 2022
in
xwiki/xwiki-commons
•
Updated Jan 30, 2023
Package
Affected versions
>= 2.7, < 12.10.10
>= 13.0.0, < 13.4.4
>= 13.5-rc-1, <= 13.7
Patched versions
12.10.10
13.4.4
13.8-rc-1
Description
Published to the GitHub Advisory Database
Apr 28, 2022
Reviewed
Apr 28, 2022
Published by the National Vulnerability Database
Apr 28, 2022
Last updated
Jan 30, 2023
Impact
It's possible in a script to access any file accessing to the user running XWiki application server with XML External Entity Injection through the XML script service.
For example:
Patches
The problem has been patched on versions 12.10.10, 13.4.4 and 13.8RC1.
Workarounds
There's no easy workaround for fixing this vulnerability other than upgrading and being careful when giving Script rights.
References
https://jira.xwiki.org/browse/XWIKI-18946
For more information
If you have any questions or comments about this advisory:
References