First published: Thu Dec 12 2024(Updated: )
### Impact In `getdocument.vm` ; the ordering of the returned documents is defined from an unsanitized request parameter (request.sort) and can allow any user to inject HQL. Depending on the used database backend, the attacker may be able to not only obtain confidential information such as password hashes from the database, but also execute UPDATE/INSERT/DELETE queries. It's possible to employ database backend dependent techniques of breaking out of HQL query context, described, for example, here: https://www.sonarsource.com/blog/exploiting-hibernate-injections. ### Patches This has been patched in 13.10.5 and 14.3-rc-1. ### Workarounds There is no known workaround, other than upgrading XWiki. ### References https://jira.xwiki.org/browse/XWIKI-17568 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.xwiki.platform:xwiki-platform-distribution-war | >=6.3-milestone-2<13.10.5 | 13.10.5 |
maven/org.xwiki.platform:xwiki-platform-distribution-war | >=14.0-rc-1<14.3-rc-1 | 14.3-rc-1 |
Xwiki Xwiki | >=6.4<13.10.5 | |
Xwiki Xwiki | >=14.0<14.3 | |
Xwiki Xwiki | =6.3 | |
Xwiki Xwiki | =6.3-milestone2 | |
Xwiki Xwiki | =6.3-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.