CVE-2021-32732
CVSS V2 Medium 4.3
CVSS V3 Medium 6.5
Description
### Impact It's possible to know if a user has or not an account in a wiki related to an email address, and which username(s) is actually tied to that email by forging a request to the Forgot username page. Note that since this page does not have a CSRF check it's quite easy to perform a lot of those requests. ### Patches This issue has been patched in XWiki 12.10.5 and 13.2RC1. Two different patches are provided: - a first one to fix the CSRF problem - a more complex one that now relies on sending an email for the Forgot username process. ### Workarounds It's possible to fix the problem without uprading by editing the ForgotUsername page in version below 13.x, to use the following code: https://github.com/xwiki/xwiki-platform/blob/69548c0320cbd772540cf4668743e69f879812cf/xwiki-platform-core/xwiki-platform-administration/xwiki-platform-administration-ui/src/main/resources/XWiki/ForgotUsername.xml#L39-L123 In version after 13.x it's also possible to edit manually the forgotusername.vm file, but it's really encouraged to upgrade the version here. ### References * https://jira.xwiki.org/browse/XWIKI-18384 * https://jira.xwiki.org/browse/XWIKI-18408 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki](https://jira.xwiki.org) * Email us at [security ML](mailto:security@xwiki.org)
Overview
- CVE ID
- CVE-2021-32732
- Assigner
- security-advisories@github.com
- Vulnerability Status
- Analyzed
- Published Version
- 2022-02-04T23:15:11
- Last Modified Date
- 2022-02-10T18:39:12
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:* | 1 | OR | 12.10.5 | |
cpe:2.3:a:xwiki:xwiki:13.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:xwiki:xwiki:13.1:-:*:*:*:*:*:* | 1 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:M/Au:N/C:P/I:N/A:N
- Access Vector
- NETWORK
- Access Compatibility
- MEDIUM
- Authentication
- NONE
- Confidentiality Impact
- PARTIAL
- Integrity Impact
- NONE
- Availability Impact
- NONE
- Base Score
- 4.3
- Severity
- MEDIUM
- Exploitability Score
- 8.6
- Impact Score
- 2.9
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
- Attack Vector
- NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- NONE
- User Interaction
- REQUIRED
- Scope
- UNCHANGED
- Confidentiality Impact
- HIGH
- Availability Impact
- NONE
- Base Score
- 6.5
- Base Severity
- MEDIUM
- Exploitability Score
- 2.8
- Impact Score
- 3.6
References
Reference URL | Reference Tags |
---|---|
https://jira.xwiki.org/browse/XWIKI-18408 | Exploit Patch Vendor Advisory |
https://jira.xwiki.org/browse/XWIKI-18384 | Exploit Patch Vendor Advisory |
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-vh5c-jqfg-mhrh | Mitigation Third Party Advisory |
https://github.com/xwiki/xwiki-platform/commit/69548c0320cbd772540cf4668743e69f879812cf | Patch Third Party Advisory |
https://github.com/xwiki/xwiki-platform/commit/f0440dfcbba705e03f7565cd88893dde57ca3fa8 | Patch Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2021-32732 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32732 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 06:33:08 | Added to TrackCVE | |||
2022-12-06 08:36:58 | 2022-02-04T23:15Z | 2022-02-04T23:15:11 | CVE Published Date | updated |
2022-12-06 08:36:58 | 2022-02-10T18:39:12 | CVE Modified Date | updated | |
2022-12-06 08:36:58 | Analyzed | Vulnerability Status | updated |