Impact
It's possible with a simple request to perform deletion or renaming of tags without needing any confirmation, by using a CSRF attack.
Patches
The problem has been patched in XWiki 13.10.7, 14.4.1 and 14.5RC1.
Workarounds
It's possible to patch existing instances directly by editing the page Main.Tags and add this kind of check, in the code for renaming and for deleting:
#if (!$services.csrf.isTokenValid($request.get('form_token')))
#set ($discard = $response.sendError(401, "Wrong CSRF token"))
#end
See the commit with the fix for more information about patching the page: 7fd4cda
References
For more information
If you have any questions or comments about this advisory:
Impact
It's possible with a simple request to perform deletion or renaming of tags without needing any confirmation, by using a CSRF attack.
Patches
The problem has been patched in XWiki 13.10.7, 14.4.1 and 14.5RC1.
Workarounds
It's possible to patch existing instances directly by editing the page Main.Tags and add this kind of check, in the code for renaming and for deleting:
See the commit with the fix for more information about patching the page: 7fd4cda
References
For more information
If you have any questions or comments about this advisory: