CVE-2022-23620

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions AbstractSxExportURLFactoryActionHandler#processSx does not escape anything from SSX document references when serializing it on filesystem, it is possible to for the HTML export process to contain reference elements containing filesystem syntax like "../", "./". or "/" in general. The referenced elements are not properly escaped. This issue has been resolved in version 13.6-rc-1. This issue can be worked around by limiting or disabling document export.
Configurations

Configuration 1 (hide)

cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*

History

27 Jun 2023, 02:43

Type Values Removed Values Added
CWE CWE-22 CWE-116

16 Feb 2022, 15:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 5.8
v3 : 5.4
First Time Xwiki xwiki
Xwiki
References (MISC) https://jira.xwiki.org/browse/XWIKI-18819 - (MISC) https://jira.xwiki.org/browse/XWIKI-18819 - Patch, Vendor Advisory
References (MISC) https://github.com/xwiki/xwiki-platform/commit/ab778254fb8f71c774e1c1239368c44fe3b6bba5 - (MISC) https://github.com/xwiki/xwiki-platform/commit/ab778254fb8f71c774e1c1239368c44fe3b6bba5 - Patch, Third Party Advisory
References (CONFIRM) https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-7ph6-5cmq-xgjq - (CONFIRM) https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-7ph6-5cmq-xgjq - Third Party Advisory
CPE cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*

09 Feb 2022, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-02-09 22:15

Updated : 2023-12-10 14:22


NVD link : CVE-2022-23620

Mitre link : CVE-2022-23620

CVE.ORG link : CVE-2022-23620


JSON object : View

Products Affected

xwiki

  • xwiki
CWE
CWE-116

Improper Encoding or Escaping of Output

CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')