Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-23619
HistoryFeb 09, 2022 - 9:10 p.m.

CVE-2022-23619 Information exposure in xwiki-platform

2022-02-0921:10:11
CWE-200
GitHub_M
www.cve.org
7
cve-2022-23619
information exposure
xwiki platform

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

EPSS

0.002

Percentile

52.0%

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions it’s possible to guess if a user has an account on the wiki by using the “Forgot your password” form, even if the wiki is closed to guest users. This problem has been patched on XWiki 12.10.9, 13.4.1 and 13.6RC1. Users are advised yo update. There are no known workarounds for this issue.

CNA Affected

[
  {
    "product": "xwiki-platform",
    "vendor": "xwiki",
    "versions": [
      {
        "status": "affected",
        "version": ">= 13.6.0, < 13.6RC1"
      },
      {
        "status": "affected",
        "version": ">= 13.0.0, < 13.4.1"
      },
      {
        "status": "affected",
        "version": "< 12.10.9"
      }
    ]
  }
]

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

EPSS

0.002

Percentile

52.0%

Related for CVELIST:CVE-2022-23619