First published: Mon Jan 08 2024(Updated: )
### Impact A user able to attach a file to a page can post a malformed TAR file by manipulating file modification times headers, which when parsed by Tika, could cause a denial of service issue via CPU consumption. ### Patches This vulnerability has been patched in XWiki 14.10.18, 15.5.3 and 15.8 RC1. ### Workarounds The workaround is to download [commons-compress 1.24](https://search.maven.org/remotecontent?filepath=org/apache/commons/commons-compress/1.24.0/commons-compress-1.24.0.jar) and replace the one located in XWiki `WEB-INF/lib/` folder. ### References https://jira.xwiki.org/browse/XCOMMONS-2796 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.xwiki.platform:xwiki-platform-distribution-war | >=15.6-rc-1<15.8-rc-1 | 15.8-rc-1 |
maven/org.xwiki.platform:xwiki-platform-distribution-war | >=15.0-rc-1<15.5.3 | 15.5.3 |
maven/org.xwiki.platform:xwiki-platform-distribution-war | >=14.10<14.10.18 | 14.10.18 |
Xwiki Xwiki | >=14.10<14.10.18 | |
Xwiki Xwiki | >=15.5<15.5.3 | |
Xwiki Xwiki | >=15.6<15.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.