Description
XWiki Commons are technical libraries common to several other top level XWiki projects. It is possible to bypass the existing security measures put in place to avoid open redirect by using a redirect such as `//mydomain.com` (i.e. omitting the `http:`). It was also possible to bypass it when using URL such as `http:/mydomain.com`. The problem has been patched on XWiki 13.10.10, 14.4.4 and 14.8RC1.
Remediation
References
https://github.com/xwiki/xwiki-platform/commit/e4f7f68e93cb08c25632c126356d218abf192d1e#diff-c445f288d5d63424f56ef13f65514ab4e174a72e979b53b88197c2b7def267cf
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-xwph-x6xj-wggv
https://jira.xwiki.org/browse/XWIKI-10309
https://jira.xwiki.org/browse/XWIKI-19994
Related Vulnerabilities
CVE-2023-34093 Vulnerability in npm package @strapi/database
CVE-2019-10795 Vulnerability in npm package undefsafe
CVE-2023-26049 Vulnerability in maven package org.eclipse.jetty:jetty-server
CVE-2022-24881 Vulnerability in maven package com.hccake:ballcat-codegen
CVE-2023-39522 Vulnerability in npm package @goauthentik/api