CVE-2023-34465
XWiki Platform is a generic wiki platform. Starting in version 11.8-rc-1 and prior to versions 14.4.8, 14.10.6, and 15.2, `Mail.MailConfig` can be edited by any logged-in user by default. Consequently, they can change the mail obfuscation configuration and view and edit the mail sending configuration, including the smtp domain name and credentials. The problem has been patched in XWiki 14.4.8, 14.10.6, and 15.1. As a workaround, the rights of the `Mail.MailConfig` page can be manually updated so that only a set of trusted users can view, edit and delete it (e.g., the `XWiki.XWikiAdminGroup` group).
Published
2023-06-23T16:15:09.303
Last Modified
2024-11-21T08:07:18.760
Status
Modified
Source
[email protected]
Severity
CVSSv3.1: 9.9 (CRITICAL)
Weaknesses
Affected Vendors & Products
References
-
https://github.com/xwiki/xwiki-platform/commit/8910b8857d3442d2e8142f655fdc0512930354d1
Patch, Vendor Advisory
([email protected])
-
https://github.com/xwiki/xwiki-platform/commit/d28d7739089e1ae8961257d9da7135d1a01cb7d4
Patch, Vendor Advisory
([email protected])
-
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-g75c-cjr6-39mc
Vendor Advisory
([email protected])
-
https://jira.xwiki.org/browse/XWIKI-20519
Issue Tracking, Patch, Vendor Advisory
([email protected])
-
https://jira.xwiki.org/browse/XWIKI-20671
Exploit, Issue Tracking, Patch, Vendor Advisory
([email protected])
-
https://github.com/xwiki/xwiki-platform/commit/8910b8857d3442d2e8142f655fdc0512930354d1
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/xwiki/xwiki-platform/commit/d28d7739089e1ae8961257d9da7135d1a01cb7d4
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-g75c-cjr6-39mc
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://jira.xwiki.org/browse/XWIKI-20519
Issue Tracking, Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://jira.xwiki.org/browse/XWIKI-20671
Exploit, Issue Tracking, Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)