CVE-2023-37911
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Starting in version 9.4-rc-1 and prior to versions 14.10.8 and 15.3-rc-1, when a document has been deleted and re-created, it is possible for users with view right on the re-created document but not on the deleted document to view the contents of the deleted document. Such a situation might arise when rights were added to the deleted document. This can be exploited through the diff feature and, partially, through the REST API by using versions such as `deleted:1` (where the number counts the deletions in the wiki and is thus guessable). Given sufficient rights, the attacker can also re-create the deleted document, thus extending the scope to any deleted document as long as the attacker has edit right in the location of the deleted document. This vulnerability has been patched in XWiki 14.10.8 and 15.3 RC1 by properly checking rights when deleted revisions of a document are accessed. The only workaround is to regularly clean deleted documents to minimize the potential exposure. Extra care should be taken when deleting sensitive documents that are protected individually (and not, e.g., by being placed in a protected space) or deleting a protected space as a whole.
Published
2023-10-25T18:17:28.543
Last Modified
2024-11-21T08:12:27.183
Status
Modified
Source
[email protected]
Severity
CVSSv3.1: 6.5 (MEDIUM)
Weaknesses
-
Type: Secondary
CWE-668
-
Type: Primary
CWE-668
Affected Vendors & Products
| Type |
Vendor |
Product |
Version/Range |
Vulnerable? |
| Application |
xwiki
|
xwiki
|
≤ 14.10.8 |
Yes
|
| Application |
xwiki
|
xwiki
|
9.4 |
Yes
|
References
-
https://extensions.xwiki.org/xwiki/bin/view/Extension/Index%20Application#HPermanentlydeleteallpages
Product
([email protected])
-
https://github.com/xwiki/xwiki-platform/commit/f471f2a392aeeb9e51d59fdfe1d76fccf532523f
Patch
([email protected])
-
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gh64-qxh5-4m33
Patch, Vendor Advisory
([email protected])
-
https://jira.xwiki.org/browse/XWIKI-20684
Exploit, Issue Tracking, Patch, Vendor Advisory
([email protected])
-
https://jira.xwiki.org/browse/XWIKI-20685
Exploit, Issue Tracking, Patch, Vendor Advisory
([email protected])
-
https://jira.xwiki.org/browse/XWIKI-20817
Exploit, Issue Tracking, Patch, Vendor Advisory
([email protected])
-
https://extensions.xwiki.org/xwiki/bin/view/Extension/Index%20Application#HPermanentlydeleteallpages
Product
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/xwiki/xwiki-platform/commit/f471f2a392aeeb9e51d59fdfe1d76fccf532523f
Patch
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gh64-qxh5-4m33
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://jira.xwiki.org/browse/XWIKI-20684
Exploit, Issue Tracking, Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://jira.xwiki.org/browse/XWIKI-20685
Exploit, Issue Tracking, Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://jira.xwiki.org/browse/XWIKI-20817
Exploit, Issue Tracking, Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)