First published: Mon Jan 08 2024(Updated: )
### Impact A user able to attach a file to a page can post a malformed TAR file by manipulating file modification times headers, which when parsed by Tika, could cause a denial of service issue via CPU consumption. ### Patches This vulnerability has been patched in XWiki 14.10.18, 15.5.3 and 15.8 RC1. ### Workarounds The workaround is to download [commons-compress 1.24](https://search.maven.org/remotecontent?filepath=org/apache/commons/commons-compress/1.24.0/commons-compress-1.24.0.jar) and replace the one located in XWiki `WEB-INF/lib/` folder. ### References https://jira.xwiki.org/browse/XCOMMONS-2796 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.xwiki.platform:xwiki-platform-distribution-war | >=15.6-rc-1<15.8-rc-1 | 15.8-rc-1 |
maven/org.xwiki.platform:xwiki-platform-distribution-war | >=15.0-rc-1<15.5.3 | 15.5.3 |
maven/org.xwiki.platform:xwiki-platform-distribution-war | >=14.10<14.10.18 | 14.10.18 |
Xwiki | >=14.10<14.10.18 | |
Xwiki | >=15.5<15.5.3 | |
Xwiki | >=15.6<15.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21651 is classified as a denial of service vulnerability due to potential CPU consumption from malformed TAR file processing.
To mitigate CVE-2024-21651, upgrade to XWiki version 14.10.18, 15.5.3, or 15.8-rc-1.
CVE-2024-21651 affects XWiki versions between 14.10.0 and 14.10.18, and 15.0-rc-1 to 15.5.3.
CVE-2024-21651 impacts XWiki installations that allow users to upload and attach files to pages.
CVE-2024-21651 enables a denial of service attack that could lead to excessive CPU usage.