CVE-2021-32731
Summary
| CVE | CVE-2021-32731 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-07-01 19:15:00 UTC |
| Updated | 2022-10-25 15:41:00 UTC |
| Description | XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Between (and including) versions 13.1RC1 and 13.1, the reset password form reveals the email address of users just by giving their username. The problem has been patched on XWiki 13.2RC1. As a workaround, it is possible to manually modify the `resetpasswordinline.vm` to perform the changes made to mitigate the vulnerability. |
Risk And Classification
Problem Types: CWE-200
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| [XWIKI-18400] The ResetPassword form reveal users email address - XWiki.org JIRA | MISC | jira.xwiki.org | |
| XWIKI-18400: Wrong message after reset password · xwiki/xwiki-platform@0cf7162 · GitHub | MISC | github.com | |
| The reset password form reveal users email address · Advisory · xwiki/xwiki-platform · GitHub | CONFIRM | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 983807 Java (maven) Security Update for org.xwiki.platform:xwiki-platform-web (GHSA-h4m4-pgp4-whgm)