Today > | 2 Medium vulnerabilities   -   You can now download lists of IOCs here!

CVE-2024-55663

Dec. 16, 2024, 6:15 p.m.

Product(s) Impacted

XWiki Platform

  • 11.10.6 and prior to 13.10.5
  • 11.10.6 and prior to 14.3-rc-1

Description

XWiki Platform is a generic wiki platform. Starting in version 6.3-milestone-2 and prior to versions 13.10.5 and 14.3-rc-1, in `getdocument.vm`; the ordering of the returned documents is defined from an unsanitized request parameter (request.sort) and can allow any user to inject HQL. Depending on the used database backend, the attacker may be able to not only obtain confidential information such as password hashes from the database, but also execute UPDATE/INSERT/DELETE queries. This has been patched in 13.10.5 and 14.3-rc-1. There is no known workaround, other than upgrading XWiki.

Weaknesses

CWE-116
Improper Encoding or Escaping of Output

The product prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved.

CWE ID: 116

Date

Published: Dec. 12, 2024, 7:15 p.m.

Last Modified: Dec. 16, 2024, 6:15 p.m.

Status : Awaiting Analysis

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

security-advisories@github.com

References

https://github.com/ security-advisories@github.com

https://github.com/ security-advisories@github.com

https://jira.xwiki.org/ security-advisories@github.com