Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Starting with the introduction of attachment move support in version 14.0-rc-1 and prior to versions 14.4.8, 14.10.4, and 15.0-rc-1, an attacker with edit access on any document (can be the user profile which is editable by default) can move any attachment of any other document to this attacker-controlled document. This allows the attacker to access and possibly publish any attachment of which the name is known, regardless if the attacker has view or edit rights on the source document of this attachment. Further, the attachment is deleted from the source document. This vulnerability has been patched in XWiki 14.4.8, 14.10.4, and 15.0 RC1. There is no workaround apart from upgrading to a fixed version.
Remediation
References
https://github.com/xwiki/xwiki-platform/commit/d7720219d60d7201c696c3196c9d4a86d0881325
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-rwwx-6572-mp29
https://jira.xwiki.org/browse/XWIKI-20334
Related Vulnerabilities
CVE-2016-6794 Vulnerability in maven package org.apache.tomcat:tomcat-util
CVE-2017-1000491 Vulnerability in npm package shiba
CVE-2023-35148 Vulnerability in maven package org.jenkins-ci.plugins:ease-plugin
CVE-2020-12265 Vulnerability in maven package org.webjars:decompress
CVE-2023-30542 Vulnerability in npm package @openzeppelin/contracts