Path Traversal in XWiki Platform
Package
Affected versions
>= 8.3-rc-1, < 13.10.3
Patched versions
13.10.3
Description
Published by the National Vulnerability Database
May 25, 2022
Published to the GitHub Advisory Database
Jun 1, 2022
Reviewed
Jun 1, 2022
Last updated
Jan 27, 2023
Impact
One can ask for any file located in the classloader using the template API and a path with ".." in it. For example
To our knownledge none of the available files of the classloader in XWiki Standard contain any strong confidential data, hence the low confidentiality value of this advisory.
Patches
The issue is patched in versions 14.0 and 13.10.3.
Workarounds
There's no easy workaround for this issue, administrators should upgrade their wiki.
References
For more information
If you have any questions or comments about this advisory:
References