First published: Wed May 25 2022(Updated: )
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Starting with version 8.3-rc-1 and prior to versions 12.10.3 and 14.0, one can ask for any file located in the classloader using the template API and a path with ".." in it. The issue is patched in versions 14.0 and 13.10.3. There is no easy workaround for this issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xwiki | >=8.4<13.10.3 | |
Xwiki | =8.3-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-29253 is rated as a high severity vulnerability due to its potential for unauthorized file access.
To fix CVE-2022-29253, upgrade to XWiki version 12.10.3 or 14.0 or later.
CVE-2022-29253 affects all XWiki Platform versions from 8.4 to 13.10.3, including 8.3-rc-1.
The attack vector for CVE-2022-29253 involves exploiting the template API to traverse directories and access restricted files.
No, CVE-2022-29253 can be exploited without user authentication, making it particularly dangerous.