Learn about CVE-2022-41929, a vulnerability in User#setDisabledStatus in the xwiki-platform that allows unauthorized users to enable or disable users. Find out the impact, affected versions, and mitigation steps.
This CVE involves a missing authorization issue in org.xwiki.platform:xwiki-platform-oldcore that allows an incorrectly authorized user to enable or disable a user. The vulnerability has been patched in XWiki versions 13.10.7, 14.4.2, and 14.5RC1.
Understanding CVE-2022-41929
This section will provide insights into the nature of the vulnerability, its impact, technical details, and mitigation strategies.
What is CVE-2022-41929?
CVE-2022-41929 describes a missing authorization vulnerability in User#setDisabledStatus within org.xwiki.platform:xwiki-platform-oldcore, enabling unauthorized users to perform admin tasks.
The Impact of CVE-2022-41929
The impact of this vulnerability is rated as medium severity. It allows users with only Script rights to enable or disable other users when this should be restricted to admin users only.
Technical Details of CVE-2022-41929
This section will delve into the specifics of the vulnerability, including the description, affected systems, and exploitation mechanism.
Vulnerability Description
The vulnerability arises from missing authorization checks in the User#setDisabledStatus function, leading to unauthorized access to critical user management functions.
Affected Systems and Versions
The affected system is xwiki-platform by xwiki. Versions >= 11.7RC1 and < 13.10.7, as well as >= 14.0.0 and < 14.4.2, are confirmed to be vulnerable.
Exploitation Mechanism
This vulnerability can be exploited by incorrectly authorized users with Script rights, allowing them to perform actions restricted to admin users.
Mitigation and Prevention
This section focuses on steps to mitigate the immediate risk posed by CVE-2022-41929 and establish long-term security practices.
Immediate Steps to Take
Users are advised to update their XWiki instances to patched versions 13.10.7, 14.4.2, or 14.5RC1 to prevent unauthorized user actions.
Long-Term Security Practices
Implement strict permission checks and minimize the use of Script rights to reduce the risk of unauthorized access to critical functions.
Patching and Updates
Regularly update XWiki to the latest versions and apply security patches promptly to address vulnerabilities and enhance system security.