Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with edit rights on a document can trigger an XAR import on a forged XAR file, leading to the ability to display the content of any file on the XWiki server host. This vulnerability has been patched in XWiki 13.10.11, 14.4.7 and 14.10-rc-1. Users are advised to upgrade. Users unable to upgrade may apply the patch `e3527b98fd` manually.
Remediation
References
https://github.com/xwiki/xwiki-platform/commit/e3527b98fdd8dc8179c24dc55e662b2c55199434
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gx4f-976g-7g6v
https://jira.xwiki.org/browse/XWIKI-20320
Related Vulnerabilities
CVE-2020-8137 Vulnerability in maven package org.webjars.npm:uppy
CVE-2022-42004 Vulnerability in maven package com.fasterxml.jackson.core:jackson-databind
CVE-2022-0437 Vulnerability in npm package karma
CVE-2020-17527 Vulnerability in maven package org.apache.tomcat:tomcat-coyote
CVE-2022-28355 Vulnerability in maven package org.scala-js:scalajs-library_2.13