CVE-2022-24898
Summary
| CVE | CVE-2022-24898 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-04-28 20:15:00 UTC |
| Updated | 2022-05-10 12:47:00 UTC |
| Description | org.xwiki.commons:xwiki-commons-xml is a common module used by other XWiki top level projects. Starting in version 2.7 and prior to versions 12.10.10, 13.4.4, and 13.8-rc-1, it is possible for a script to access any file accessing to the user running XWiki application server with XML External Entity Injection through the XML script service. The problem has been patched in versions 12.10.10, 13.4.4, and 13.8-rc-1. There is no easy workaround for fixing this vulnerability other than upgrading and being careful when giving Script rights. |
Risk And Classification
Problem Types: CWE-611
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| XWIKI-18946: Improve the default XML parser · xwiki/xwiki-commons@947e892 · GitHub | MISC | github.com | |
| Arbitrary file access through XML parsing · Advisory · xwiki/xwiki-commons · GitHub | CONFIRM | github.com | |
| [XWIKI-18946] XML External Entity Injection (XXE) through XML script service - XWiki.org JIRA | MISC | jira.xwiki.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.