First published: Wed Sep 18 2024(Updated: )
### Impact It's possible to get access to notification filters of any user by using a URL such as `<hostname>xwiki/bin/get/XWiki/Notifications/Code/NotificationFilterPreferenceLivetableResults?outputSyntax=plain&type=custom&user=<username>`. This vulnerability impacts all versions of XWiki since 13.2-rc-1. The filters do not provide much information (they mainly contain references which are public data in XWiki), though some info could be used in combination with other vulnerabilities. ### Patches The vulnerability has been patched in XWiki 14.10.21, 15.5.5, 15.10.1, 16.0RC1. The patch consists in checking the rights of the user when sending the data. ### Workarounds It's possible to workaround the vulnerability by applying manually the patch: it's possible for an administrator to edit directly the document `XWiki.Notifications.Code.NotificationFilterPreferenceLivetableResults` to apply the same changes as in the patch. See c8c6545f9bde6f5aade994aa5b5903a67b5c2582. ### References * Jira ticket: https://jira.xwiki.org/browse/XWIKI-20336 * Commit: c8c6545f9bde6f5aade994aa5b5903a67b5c2582 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org) ### Attribution This vulnerability has been reported on Intigriti by [Mete](https://www.linkedin.com/in/metehan-kalkan-5a3201199).
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.xwiki.platform:xwiki-platform-notifications-ui | >=15.6-rc-1<15.10.1 | 15.10.1 |
maven/org.xwiki.platform:xwiki-platform-notifications-ui | >=15.0-rc-1<15.5.5 | 15.5.5 |
maven/org.xwiki.platform:xwiki-platform-notifications-ui | >=13.2-rc-1<14.10.21 | 14.10.21 |
XWiki | >=13.2<14.10.21 | |
XWiki | >=15.0<15.5.5 | |
XWiki | >=15.6<15.10.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-46979 has a high severity level due to unauthorized access to user notification filters.
To fix CVE-2024-46979, upgrade to version 15.10.1, 15.5.5, or 14.10.21 of the affected package.
CVE-2024-46979 affects versions from 15.6-rc-1 to 15.10.1, 15.0-rc-1 to 15.5.5, and 13.2-rc-1 to 14.10.21.
CVE-2024-46979 is classified as an authorization issue leading to information disclosure.
Yes, CVE-2024-46979 can be exploited through a specific URL allowing access to any user's notification filters.