A user able to attach a file to a page can post a malformed TAR file by manipulating file modification times headers, which when parsed by Tika, could cause a denial of service issue via CPU consumption.
This vulnerability has been patched in XWiki 14.10.18, 15.5.3 and 15.8 RC1.
The workaround is to download commons-compress 1.24 and replace the one located in XWiki WEB-INF/lib/
folder.
https://jira.xwiki.org/browse/XCOMMONS-2796
If you have any questions or comments about this advisory: * Open an issue in Jira XWiki.org * Email us at Security Mailing List
{ "nvd_published_at": "2024-01-09T00:15:44Z", "cwe_ids": [ "CWE-400" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2024-01-08T16:39:47Z" }