Exposure of Sensitive Information to an Unauthorized Actor Affecting org.xwiki.platform:xwiki-platform-notifications-ui package, versions [13.2-rc-1,14.10.21) [15.0-rc-1,15.5.5) [15.6-rc-1,15.10.1)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    Exploit Maturity
    Proof of concept
    EPSS
    0.05% (17th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JAVA-ORGXWIKIPLATFORM-8055766
  • published 19 Sep 2024
  • disclosed 18 Sep 2024
  • credit Metehan Kalkan

How to fix?

Upgrade org.xwiki.platform:xwiki-platform-notifications-ui to version 14.10.21, 15.5.5, 15.10.1 or higher.

Overview

Affected versions of this package are vulnerable to Exposure of Sensitive Information to an Unauthorized Actor via the NotificationFilterPreferenceLivetableResults URL parameter. An attacker can access notification filters of any user by manipulating the URL with specific user details, like <hostname>xwiki/bin/get/XWiki/Notifications/Code/NotificationFilterPreferenceLivetableResults?outputSyntax=plain&type=custom&user=<username>.

Note:

The filters do not provide much information (they mainly contain references which are public data in XWiki), though some info could be used in combination with other vulnerabilities.

CVSS Scores

version 4.0
version 3.1
Expand this section

Snyk

Recommended
6.9 medium
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Attack Requirements (AT)
    None
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Confidentiality (VC)
    Low
  • Integrity (VI)
    None
  • Availability (VA)
    None
  • Confidentiality (SC)
    None
  • Integrity (SI)
    None
  • Availability (SA)
    None