First published: Wed Nov 23 2022(Updated: )
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users without the right to view documents can deduce their existence by repeated Livetable queries. The issue has been patched in XWiki 14.6RC1, 13.10.8, and 14.4.3, the response is not properly cleaned up of obfuscated entries. As a workaround, The patch for the document `XWiki.LiveTableResultsMacros` can be manually applied or a XAR archive of a patched version can be imported, on versions 12.10.11, 13.9-rc-1, and 13.4.4. There are no known workarounds for this issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xwiki | >=12.10.11<13.10.8 | |
Xwiki | >=14.0.0<14.4.3 | |
Xwiki | =14.4.4 | |
Xwiki | =14.4.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41935 has been classified as a moderate severity vulnerability due to the potential information disclosure it allows.
To fix CVE-2022-41935, update your XWiki installation to version 14.6RC1, 13.10.8, or 14.4.3 or later.
CVE-2022-41935 is an information disclosure vulnerability that affects users who lack proper access permissions.
CVE-2022-41935 affects XWiki versions prior to 14.6RC1, 13.10.8, and 14.4.3.
Yes, users without access rights can exploit CVE-2022-41935 to deduce the existence of documents through repeated Livetable queries.