First published: Sat Apr 15 2023(Updated: )
XWiki Commons are technical libraries common to several other top level XWiki projects. It is possible to bypass the existing security measures put in place to avoid open redirect by using a redirect such as `//mydomain.com` (i.e. omitting the `http:`). It was also possible to bypass it when using URL such as `http:/mydomain.com`. The problem has been patched on XWiki 13.10.10, 14.4.4 and 14.8RC1.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xwiki | >=6.0<13.10.10 | |
Xwiki | >=14.4.0<14.4.4 | |
Xwiki | >=14.5<=14.7 | |
Xwiki | =6.0-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-29204 is considered to be a high severity vulnerability due to the potential for security measures to be bypassed.
CVE-2023-29204 affects multiple versions of XWiki, particularly those between versions 6.0 and 14.4.4, enabling open redirect vulnerabilities.
CVE-2023-29204 could be exploited to redirect users to malicious sites, potentially leading to phishing attacks or malware distribution.
To mitigate CVE-2023-29204, upgrade to the latest version of XWiki that has addressed this vulnerability.
If you are using XWiki versions 6.0-rc1, 14.4.0 to 14.4.4, or between 14.5 and 14.7, your version is affected by CVE-2023-29204.