A user able to attach a file to a page can post a malformed TAR file by manipulating file modification times headers, which when parsed by Tika, could cause a denial of service issue via CPU consumption.
This vulnerability has been patched in XWiki 14.10.18, 15.5.3 and 15.8 RC1.
The workaround is to download commons-compress 1.24 and replace the one located in XWiki WEB-INF/lib/ folder.
https://jira.xwiki.org/browse/XCOMMONS-2796
If you have any questions or comments about this advisory: * Open an issue in Jira XWiki.org * Email us at Security Mailing List
{
"nvd_published_at": "2024-01-09T00:15:44Z",
"github_reviewed": true,
"github_reviewed_at": "2024-01-08T16:39:47Z",
"severity": "HIGH",
"cwe_ids": [
"CWE-400"
]
}