CVE-2022-29253

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-29253
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-29253.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-29253
Aliases
Published
2022-05-25T20:55:10Z
Modified
2025-11-20T15:11:25.689580Z
Severity
  • 2.7 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
Path Traversal in XWiki Platform
Details

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Starting with version 8.3-rc-1 and prior to versions 12.10.3 and 14.0, one can ask for any file located in the classloader using the template API and a path with ".." in it. The issue is patched in versions 14.0 and 13.10.3. There is no easy workaround for this issue.

Database specific
{
    "cwe_ids": [
        "CWE-22",
        "CWE-24"
    ]
}
References

Affected packages

Git / github.com/xwiki/xwiki-commons

Affected ranges

Type
GIT
Repo
https://github.com/xwiki/xwiki-commons
Events

Git / github.com/xwiki/xwiki-platform

Affected ranges

Type
GIT
Repo
https://github.com/xwiki/xwiki-platform
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

xwiki-application-calendar-1.*

xwiki-application-calendar-1.0

xwiki-platform-7.*

xwiki-platform-7.3-milestone-2
xwiki-platform-7.4-milestone-1
xwiki-platform-7.4-milestone-2

xwiki-platform-8.*

xwiki-platform-8.0-milestone-1
xwiki-platform-8.0-milestone-2
xwiki-platform-8.1-milestone-1
xwiki-platform-8.1-milestone-2
xwiki-platform-8.2-milestone-1
xwiki-platform-8.2-milestone-2
xwiki-platform-8.3-milestone-1

xwiki-platform-9.*

xwiki-platform-9.9-rc-2

xwiki-plugin-tag-1.*

xwiki-plugin-tag-1.1

Database specific

vanir_signatures

[
    {
        "signature_version": "v1",
        "source": "https://github.com/xwiki/xwiki-platform/commit/4917c8f355717bb636d763844528b1fe0f95e8e2",
        "signature_type": "Line",
        "target": {
            "file": "xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/internal/template/InternalTemplateManager.java"
        },
        "id": "CVE-2022-29253-0dd9b170",
        "digest": {
            "line_hashes": [
                "141510995773231921586517245806726854520",
                "50345617348967716498041345617282398072",
                "101164705463872371230406850947434765552",
                "262566173236980365268353137761763944370",
                "337138235637122920893389665944486862044",
                "241236078245565711063576426788198843923",
                "42318508689152326257825455049124063504",
                "200740886141113052504116480486383667914",
                "271818236786145048478327459955520695048",
                "270184599744097691386379516019336152965",
                "261243293885178628867302851680284964027",
                "152247574327077293883080496001374261032",
                "166769925119246320480436363673184731399",
                "174717054897845413540587179171475914881"
            ],
            "threshold": 0.9
        },
        "deprecated": false
    },
    {
        "signature_version": "v1",
        "source": "https://github.com/xwiki/xwiki-platform/commit/4917c8f355717bb636d763844528b1fe0f95e8e2",
        "signature_type": "Function",
        "target": {
            "function": "getClassloaderTemplate",
            "file": "xwiki-platform-core/xwiki-platform-oldcore/src/main/java/com/xpn/xwiki/internal/template/InternalTemplateManager.java"
        },
        "id": "CVE-2022-29253-f2f3ac56",
        "digest": {
            "length": 205.0,
            "function_hash": "327550995310815182575211122804994825554"
        },
        "deprecated": false
    }
]