CVE-2021-32731

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Between (and including) versions 13.1RC1 and 13.1, the reset password form reveals the email address of users just by giving their username. The problem has been patched on XWiki 13.2RC1. As a workaround, it is possible to manually modify the `resetpasswordinline.vm` to perform the changes made to mitigate the vulnerability.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:xwiki:xwiki:13.1:-:*:*:*:*:*:*
cpe:2.3:a:xwiki:xwiki:13.1:rc1:*:*:*:*:*:*

History

25 Oct 2022, 15:41

Type Values Removed Values Added
CWE CWE-668 CWE-200

09 Jul 2021, 14:03

Type Values Removed Values Added
CPE cpe:2.3:a:xwiki:xwiki:13.1:-:*:*:*:*:*:*
cpe:2.3:a:xwiki:xwiki:13.1:rc1:*:*:*:*:*:*
CWE CWE-668
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 5.3
References (MISC) https://jira.xwiki.org/browse/XWIKI-18400 - (MISC) https://jira.xwiki.org/browse/XWIKI-18400 - Issue Tracking, Patch, Vendor Advisory
References (MISC) https://github.com/xwiki/xwiki-platform/commit/0cf716250b3645a5974c80d8336dcdf885749dff#diff-14a3132e3986b1f5606dd13d9d8a8bb8634bec9932123c5e49e9604cfd850fc2 - (MISC) https://github.com/xwiki/xwiki-platform/commit/0cf716250b3645a5974c80d8336dcdf885749dff#diff-14a3132e3986b1f5606dd13d9d8a8bb8634bec9932123c5e49e9604cfd850fc2 - Patch, Third Party Advisory
References (CONFIRM) https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-h4m4-pgp4-whgm - (CONFIRM) https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-h4m4-pgp4-whgm - Patch, Third Party Advisory

01 Jul 2021, 19:20

Type Values Removed Values Added
New CVE

Information

Published : 2021-07-01 19:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-32731

Mitre link : CVE-2021-32731

CVE.ORG link : CVE-2021-32731


JSON object : View

Products Affected

xwiki

  • xwiki
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor