CVE-2024-56158:
XWiki allows SQL injection in query endpoint of REST API with Oracle
N/A
CVSS ScoreBasic Information
Technical Details
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.xwiki.platform:xwiki-platform-oldcore | maven | >= 1.0, < 15.10.16 | 15.10.16 |
org.xwiki.platform:xwiki-platform-oldcore | maven | >= 16.0.0-rc-1, < 16.4.7 | 16.4.7 |
org.xwiki.platform:xwiki-platform-oldcore | maven | >= 16.5.0-rc-1, < 16.10.2 | 16.10.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The provided commit information consists only of version bump and SCM tag updates in pom.xml
files for the release versions 15.10.16, 16.4.7, and 16.10.2. These commits do not contain the actual code changes that patched the SQL injection vulnerability (XWIKI-22734). The Jira issue XWIKI-22734, which describes the vulnerability, does not link to specific commits. The advisory states that the vulnerability lies in the XWiki query validator not sanitizing functions like DBMS_XMLGEN
or DBMS_XMLQUERY
when used with Oracle, and Hibernate allowing native functions in HQL. While the affected package is org.xwiki.platform:xwiki-platform-oldcore
, without the actual patch diffs, it's impossible to pinpoint the exact vulnerable functions, their file paths, and provide concrete patch evidence. The Jira ticket XWIKI-22734 also references XWIKI-22691, suggesting the fix might be in a related area, but without commit details for either, a precise analysis is not possible. Therefore, no vulnerable functions can be identified with the required level of confidence and evidence.
evidence.
.evidence. confidence and evidence