CVE Vulnerabilities

CVE-2023-26476

Improper Restriction of Excessive Authentication Attempts

Published: Mar 02, 2023 | Modified: Mar 14, 2023
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

XWiki Platform is a generic wiki platform. Starting in version 3.2-m3, users can deduce the content of the password fields by repeated call to LiveTableResults and WikisLiveTableResultsMacros. The issue can be fixed by upgrading to versions 14.7-rc-1, 13.4.4, or 13.10.9 and higher, or in version >= 3.2M3 by applying the patch manually on LiveTableResults and WikisLiveTableResultsMacros.

Weakness

The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it more susceptible to brute force attacks.

Affected Software

Name Vendor Start Version End Version
Xwiki Xwiki 3.3 (including) 13.4.4 (excluding)
Xwiki Xwiki 13.5.0 (including) 13.10.9 (excluding)
Xwiki Xwiki 14.0 (including) 14.7 (excluding)
Xwiki Xwiki 3.2-milestone3 (including) 3.2-milestone3 (including)
Xwiki Xwiki 14.7-rc1 (including) 14.7-rc1 (including)

Potential Mitigations

  • Common protection mechanisms include:

  • Use a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.

  • Consider using libraries with authentication capabilities such as OpenSSL or the ESAPI Authenticator. [REF-45]

References