First published: Thu Jul 27 2023(Updated: )
## Impact The mail obfuscation configuration was not fully taken into account and is was still possible by obfuscated emails. See https://jira.xwiki.org/browse/XWIKI-20601 for the reproduction steps. ## Patches This has been patched in XWiki 14.10.9, and XWiki 15.3-rc-1. ## Workarounds The workaround is to modify the page XWiki.LiveTableResultsMacros following this [patch](https://github.com/xwiki/xwiki-platform/commit/1dfb6804d4d412794cbe0098d4972b8ac263df0c). ## References - https://jira.xwiki.org/browse/XWIKI-20601 - https://github.com/xwiki/xwiki-platform/commit/1dfb6804d4d412794cbe0098d4972b8ac263df0c ## For more information If you have any questions or comments about this advisory: - Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) - Email us at [Security Mailing List](mailto:security@xwiki.org)
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.xwiki.platform:xwiki-platform-livetable-ui | >=15.0<15.3-rc-1 | 15.3-rc-1 |
maven/org.xwiki.platform:xwiki-platform-livetable-ui | >=3.5-milestone-1<14.10.9 | 14.10.9 |
Xwiki Xwiki | >=3.5<14.10.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The mail obfuscation configuration was not fully taken into account and it was still possible to obfuscate emails.
You can patch CVE-2023-38509 by updating to XWiki 14.10.9 or XWiki 15.3-rc-1.
No, there are no known workarounds for CVE-2023-38509.
The severity of CVE-2023-38509 is medium (4.3).
You can find more information about CVE-2023-38509 at the following references: [GitHub Advisory](https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-g9w4-prf3-m25g), [GitHub Commit](https://github.com/xwiki/xwiki-platform/commit/1dfb6804d4d412794cbe0098d4972b8ac263df0c), [XWiki Issue](https://jira.xwiki.org/browse/XWIKI-20601).