The script service method used to reset the authentication failures record can be executed by any user with Script rights and does not require Programming rights as it should have. Note that being able to reset the authentication failure record mean that an attacker with script right might use it to try performing a bruteforce attack since she'd been able to virtually deactivate the mechanism introduced to mitigate those attacks.
The problem has been patched in version 12.6.8, 12.10.4 and 13.0.
There's no workaround besides upgrading and being careful on which user should have Script right access. Note that any bruteforce attack on the authentication should be visible in the logs since the authentication failures are logged.
https://jira.xwiki.org/browse/XWIKI-18276
If you have any questions or comments about this advisory: * Open an issue in Jira * Email us at the security mailing-list
{ "nvd_published_at": "2021-07-01T17:15:00Z", "github_reviewed_at": "2021-07-02T16:44:24Z", "severity": "LOW", "github_reviewed": true, "cwe_ids": [ "CWE-287", "CWE-693", "CWE-732" ] }