Vulnerability Description
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Starting with version 8.3-rc-1 and prior to versions 12.10.3 and 14.0, one can ask for any file located in the classloader using the template API and a path with ".." in it. The issue is patched in versions 14.0 and 13.10.3. There is no easy workaround for this issue.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xwiki | Xwiki | >= 8.4, < 13.10.3 |
Related Weaknesses (CWE)
References
- https://github.com/xwiki/xwiki-platform/commit/4917c8f355717bb636d763844528b1fe0PatchThird Party Advisory
- https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9qrp-h7fw-42hgThird Party Advisory
- https://jira.xwiki.org/browse/XWIKI-19349Vendor Advisory
- https://github.com/xwiki/xwiki-platform/commit/4917c8f355717bb636d763844528b1fe0PatchThird Party Advisory
- https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9qrp-h7fw-42hgThird Party Advisory
- https://jira.xwiki.org/browse/XWIKI-19349Vendor Advisory
FAQ
What is CVE-2022-29253?
CVE-2022-29253 is a vulnerability with a CVSS score of 2.7 (LOW). XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Starting with version 8.3-rc-1 and prior to versions 12.10.3 and 14.0, one can ask for any file...
How severe is CVE-2022-29253?
CVE-2022-29253 has been rated LOW with a CVSS base score of 2.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-29253?
Check the references section above for vendor advisories and patch information. Affected products include: Xwiki Xwiki.