We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-46978

Missing checks for notification filter preferences editions in XWiki Platform



Description

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. It's possible for any user knowing the ID of a notification filter preference of another user, to enable/disable it or even delete it. The impact is that the target user might start loosing notifications on some pages because of this. This vulnerability is present in XWiki since 13.2-rc-1. This vulnerability has been patched in XWiki 14.10.21, 15.5.5, 15.10.1, 16.0-rc-1. The patch consists in checking properly the rights of the user before performing any action on the filters. Users are advised to upgrade. It's possible to fix manually the vulnerability by editing the document `XWiki.Notifications.Code.NotificationPreferenceService` to apply the changes performed in commit e8acc9d8e6af7dfbfe70716ded431642ae4a6dd4.

Reserved 2024-09-16 | Published 2024-09-18 | Updated 2024-09-20 | Assigner GitHub_M


MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

Problem types

CWE-648: Incorrect Use of Privileged APIs

Product status

>= 13.2-rc-1, < 14.10.21
affected

>= 15.0.0, < 15.5.5
affected

>= 15.6.0, < 15.10.1
affected

References

github.com/...atform/security/advisories/GHSA-r95w-889q-x2gx

github.com/...ommit/e8acc9d8e6af7dfbfe70716ded431642ae4a6dd4

jira.xwiki.org/browse/XWIKI-20337

cve.org (CVE-2024-46978)

nvd.nist.gov (CVE-2024-46978)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-46978

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.