ghsa-q2hm-2h45-v5g3
Vulnerability from github
Impact
We discovered that when the reset a forgotten password feature of XWiki was used, the password was then stored in plain text in database. This only concerns XWiki 13.1RC1 and next versions. Note that it only concerns the reset password feature available from the "Forgot your password" link in the login view: the features allowing a user to change their password, or for an admin to change a user password are not impacted.
This vulnerability is particularly dangerous in combination with other vulnerabilities allowing to perform data leak of personal data from users, such as https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-599v-w48h-rjrm.
Note that this vulnerability only concerns the users of the main wiki: in case of farms, the users registered on subwiki are not impacted thanks to a bug we discovered when investigating this.
Patches
The problem has been patched in version 14.6RC1, 14.4.3 and 13.10.8.
The patch involves a migration of the impacted users as well as the history of the page, to ensure no password remains in plain text in the database. This migration also involves to inform the users about the possible disclosure of their passwords: by default, two emails are automatically sent to the impacted users. A first email to inform about the possibility that their password have been leaked, and a second email using the reset password feature to ask them to set a new password. See below for the configuration options to disable the mail sending.
The first email contains by default the following text (could be translated depending on the wiki language settings): ``` Subject: Important security issue Dear user,
due to a bug your password was stored in plain text in our wiki. We cannot exclude that your plain text password was exposed in a data leak. Therefore, you might receive a second email to choose a new password.
Please contact the administrator in case of problem or for further questions.
It's possible to specify another text by creating a file at the root of the permanent directory named `140600000XWIKI19869-mail.txt`, this file should have same structure as used above:
Subject: [your custom subject]
[your custom mail content]
This mail is sent plain text and cannot contain any variable.
Note that the second mail for the reset password is using the standard feature, so you can find information about the email templates [there](https://www.xwiki.org/xwiki/bin/view/Documentation/AdminGuide/Authentication/#HMailTemplates).
Also note that if the users doesn't have any registered email address obviously no mail will be sent, so it's the administrators responsibility to find a way to contact the user (through comment on the user profile, or any other channel used for that wiki). The administrator should be particularly careful on the presence of logs such as:
WARN WIKI19869DataMigrationListener - Reset email cannot be sent for user [reference = [xwiki:XWiki.Foo]] as no email address is provided
```
It's also possible for administrators to set some properties for the migration: it's possible to decide if the user password should be reset (default) or if the passwords should be kept but only hashed. Note that in the first option, the users won't be able to login anymore until they set a new password if they were impacted. Note that in both options, mails will be sent to users to inform them and encourage them to change their passwords.
Two other properties are available to chose the behaviour regarding the mails to be sent: it's possible to chose to only send the first security email, or to only send the reset password email. It's important to note that those emails are sent after the migration during the initialization of the wiki, by reading a file creating by the migration in the permanent directory (the file is named 140600000XWIKI19869DataMigration-users.txt
): then it's possible for an administrator to chose to not sent any email when the migration is performed (by setting the properties to false), and to send them later in a future restart by then setting back the properties to true before the restart of the wiki. Also note that the file is deleted after the mails are sent.
The mentioned properties can be found in xwiki.properties
in the [Security]
section:
```
-# [Since 14.6RC1]
-# [Since 14.4.3]
-# [Since 13.10.8]
-# This option is only used when performing a migration from a wiki before the versions mentioning above.
-# This parameter defines if as part of the migration R140600000XWIKI19869 the passwords of impacted user should be
-# reset or not. It's advised to keep this value as true, now for some usecases advertised administrators might want
-# their users to keep their passwords nevertheless, then enable the configuration and set it to false before the
-# migration is executed.
security.migration.R140600000XWIKI19869.resetPassword = true
-# [Since 14.6RC1]
-# [Since 14.4.3]
-# [Since 13.10.8]
-# This option is only used when performing a migration from a wiki before the versions mentioned above.
-# This parameter defines if reset password emails should be sent as part of the migration R140600000XWIKI19869.
-# By default this value is set to true, so emails will be automatically produced. Now it's possible for admin to set
-# this option to false: note that in such case a file containing the list of users for whom a reset password email
-# should be sent will still be created in the permanent directory (named 140600000XWIKI19869DataMigration-users.txt).
-# If this file exists and this property is set back to true after the migration, the file will still be consumed to
-# send the emails, so it's possible to perform the migration and send the emails only later if needed.
security.migration.R140600000XWIKI19869.sendResetPasswordEmail = true
-# [Since 14.6RC1]
-# [Since 14.4.3]
-# [Since 13.10.8]
-# This option is only used when performing a migration from a wiki before the versions mentioned above.
-
-# This parameter defines if a security email information should be sent as part of the migration R140600000XWIKI19869.
-# By default this value is set to true, so emails will be automatically produced. Now it's possible for admin to set
-# this option to false: note that in such case a file containing the list of users for whom a reset password email
-# should be sent will still be created in the permanent directory (named 140600000XWIKI19869DataMigration-users.txt).
-# If this file exists and this property is set back to true after the migration, the file will still be consumed to
-# send the emails, so it's possible to perform the migration and send the emails only later if needed.
security.migration.R140600000XWIKI19869.sendSecurityEmail = true
```
Workarounds
There is actually 2 parts of the vulnerability:
1. users who might have use the reset feature should get their password protected. We provide some instructions how to identify and fix those.
2. the next usage of the reset password feature shouldn't lead to plain text password: sadly there is no easy workaround for that, except by recompiling xwiki-platform-security-authentication-default
with that change: https://github.com/xwiki/xwiki-platform/commit/443e8398b75a1295067d74afb5898370782d863a#diff-f8a8f8ba80dfc55f044e2e60b521ce379176430ca6921b0f87b79cf682531f79L322
It's possible to identify all impacted users and to manually reset their passwords with an Admin account. For identifying the impacted users, a query such as the following is possible:
``` {{velocity}}
The statement is put on multiple lines for readability of the snippet
set ($statement = "select distinct doc.fullName from Document doc, doc.object(XWiki.XWikiUsers) objUser
where objUser.password not like 'hash:%' and objUser.password <> '' order by doc.fullName") $services.query.xwql($statement).execute() {{/velocity}} ``` Once impacted users are identified at least 2 options are possible: 1. Set a new password (manually by going to the user profile, or automatically with a groovy script for example) 4. rollback to a previous version of the user document: in such case the password will be automatically processed properly
Be aware that those workarounds won't remove the clear password entry that might remain in database due to history.
References
- Jira ticket: https://jira.xwiki.org/browse/XWIKI-19869
- Advisory of a data leak vulnerability that increases the criticality of this vulnerability: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-599v-w48h-rjrm
- Bug discovered "protecting" subwiki from this vulnerability: https://jira.xwiki.org/browse/XWIKI-19945
For more information
If you have any questions or comments about this advisory: * Open an issue in Jira * Email us at security ML
{ "affected": [ { "package": { "ecosystem": "Maven", "name": "org.xwiki.platform:xwiki-platform-security-authentication-default" }, "ranges": [ { "events": [ { "introduced": "13.1RC1" }, { "fixed": "13.10.8" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.xwiki.platform:xwiki-platform-security-authentication-default" }, "ranges": [ { "events": [ { "introduced": "14.0.0" }, { "fixed": "14.4.3" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2022-41933" ], "database_specific": { "cwe_ids": [ "CWE-312", "CWE-522" ], "github_reviewed": true, "github_reviewed_at": "2022-11-21T22:37:11Z", "nvd_published_at": "2022-11-23T21:15:00Z", "severity": "MODERATE" }, "details": "### Impact\n\nWe discovered that when the reset a forgotten password feature of XWiki was used, the password was then stored in plain text in database. This only concerns XWiki 13.1RC1 and next versions.\nNote that it only concerns the reset password feature available from the \"Forgot your password\" link in the login view: the features allowing a user to change their password, or for an admin to change a user password are not impacted.\n\nThis vulnerability is particularly dangerous in combination with other vulnerabilities allowing to perform data leak of personal data from users, such as https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-599v-w48h-rjrm. \n\nNote that this vulnerability only concerns the users of the main wiki: in case of farms, the users registered on subwiki are not impacted thanks to a bug we discovered when investigating this.\n\n### Patches\n\nThe problem has been patched in version 14.6RC1, 14.4.3 and 13.10.8.\n\nThe patch involves a migration of the impacted users as well as the history of the page, to ensure no password remains in plain text in the database. This migration also involves to inform the users about the possible disclosure of their passwords: by default, two emails are automatically sent to the impacted users. A first email to inform about the possibility that their password have been leaked, and a second email using the reset password feature to ask them to set a new password. See below for the configuration options to disable the mail sending.\n\nThe first email contains by default the following text (could be translated depending on the wiki language settings):\n```\nSubject: Important security issue\nDear user,\n\ndue to a bug your password was stored in plain text in our wiki. We cannot exclude that your plain text password was exposed in a data leak. Therefore, you might receive a second email to choose a new password. \nPlease contact the administrator in case of problem or for further questions.\n```\nIt\u0027s possible to specify another text by creating a file at the root of the permanent directory named `140600000XWIKI19869-mail.txt`, this file should have same structure as used above:\n```\nSubject: [your custom subject]\n[your custom mail content]\n```\nThis mail is sent plain text and cannot contain any variable. \nNote that the second mail for the reset password is using the standard feature, so you can find information about the email templates [there](https://www.xwiki.org/xwiki/bin/view/Documentation/AdminGuide/Authentication/#HMailTemplates).\nAlso note that if the users doesn\u0027t have any registered email address obviously no mail will be sent, so it\u0027s the administrators responsibility to find a way to contact the user (through comment on the user profile, or any other channel used for that wiki). The administrator should be particularly careful on the presence of logs such as: \n```\nWARN WIKI19869DataMigrationListener - Reset email cannot be sent for user [reference = [xwiki:XWiki.Foo]] as no email address is provided\n```\n\nIt\u0027s also possible for administrators to set some properties for the migration: it\u0027s possible to decide if the user password should be reset (default) or if the passwords should be kept but only hashed. Note that in the first option, the users won\u0027t be able to login anymore until they set a new password if they were impacted. Note that in both options, mails will be sent to users to inform them and encourage them to change their passwords.\n\nTwo other properties are available to chose the behaviour regarding the mails to be sent: it\u0027s possible to chose to only send the first security email, or to only send the reset password email. It\u0027s important to note that those emails are sent after the migration during the initialization of the wiki, by reading a file creating by the migration in the permanent directory (the file is named `140600000XWIKI19869DataMigration-users.txt`): then it\u0027s possible for an administrator to chose to not sent any email when the migration is performed (by setting the properties to false), and to send them later in a future restart by then setting back the properties to true before the restart of the wiki. Also note that the file is deleted after the mails are sent. \n\nThe mentioned properties can be found in `xwiki.properties` in the `[Security]` section:\n```\n#-# [Since 14.6RC1]\n#-# [Since 14.4.3]\n#-# [Since 13.10.8]\n#-# This option is only used when performing a migration from a wiki before the versions mentioning above.\n#-# This parameter defines if as part of the migration R140600000XWIKI19869 the passwords of impacted user should be\n#-# reset or not. It\u0027s advised to keep this value as true, now for some usecases advertised administrators might want\n#-# their users to keep their passwords nevertheless, then enable the configuration and set it to false before the\n#-# migration is executed.\n# security.migration.R140600000XWIKI19869.resetPassword = true\n\n#-# [Since 14.6RC1]\n#-# [Since 14.4.3]\n#-# [Since 13.10.8]\n#-# This option is only used when performing a migration from a wiki before the versions mentioned above.\n\n#-# This parameter defines if reset password emails should be sent as part of the migration R140600000XWIKI19869.\n#-# By default this value is set to true, so emails will be automatically produced. Now it\u0027s possible for admin to set\n#-# this option to false: note that in such case a file containing the list of users for whom a reset password email\n#-# should be sent will still be created in the permanent directory (named 140600000XWIKI19869DataMigration-users.txt).\n#-# If this file exists and this property is set back to true after the migration, the file will still be consumed to\n#-# send the emails, so it\u0027s possible to perform the migration and send the emails only later if needed.\n# security.migration.R140600000XWIKI19869.sendResetPasswordEmail = true\n\n#-# [Since 14.6RC1]\n#-# [Since 14.4.3]\n#-# [Since 13.10.8]\n#-# This option is only used when performing a migration from a wiki before the versions mentioned above.\n#-#\n#-# This parameter defines if a security email information should be sent as part of the migration R140600000XWIKI19869.\n#-# By default this value is set to true, so emails will be automatically produced. Now it\u0027s possible for admin to set\n#-# this option to false: note that in such case a file containing the list of users for whom a reset password email\n#-# should be sent will still be created in the permanent directory (named 140600000XWIKI19869DataMigration-users.txt).\n#-# If this file exists and this property is set back to true after the migration, the file will still be consumed to\n#-# send the emails, so it\u0027s possible to perform the migration and send the emails only later if needed.\n# security.migration.R140600000XWIKI19869.sendSecurityEmail = true\n```\n\n\n### Workarounds\n\nThere is actually 2 parts of the vulnerability:\n 1. users who might have use the reset feature should get their password protected. We provide some instructions how to identify and fix those. \n 2. the next usage of the reset password feature shouldn\u0027t lead to plain text password: sadly there is no easy workaround for that, except by recompiling `xwiki-platform-security-authentication-default` with that change: https://github.com/xwiki/xwiki-platform/commit/443e8398b75a1295067d74afb5898370782d863a#diff-f8a8f8ba80dfc55f044e2e60b521ce379176430ca6921b0f87b79cf682531f79L322\n \nIt\u0027s possible to identify all impacted users and to manually reset their passwords with an Admin account. For identifying the impacted users, a query such as the following is possible:\n\n```\n{{velocity}}\n## The statement is put on multiple lines for readability of the snippet\n#set ($statement = \"select distinct doc.fullName from Document doc, doc.object(XWiki.XWikiUsers) objUser \nwhere objUser.password not like \u0027hash:%\u0027 and objUser.password \u003c\u003e \u0027\u0027 \norder by doc.fullName\")\n$services.query.xwql($statement).execute()\n{{/velocity}}\n```\nOnce impacted users are identified at least 2 options are possible:\n 1. Set a new password (manually by going to the user profile, or automatically with a groovy script for example)\n 4. rollback to a previous version of the user document: in such case the password will be automatically processed properly\n\nBe aware that those workarounds won\u0027t remove the clear password entry that might remain in database due to history.\n\n### References\n\n * Jira ticket: https://jira.xwiki.org/browse/XWIKI-19869\n * Advisory of a data leak vulnerability that increases the criticality of this vulnerability: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-599v-w48h-rjrm\n * Bug discovered \"protecting\" subwiki from this vulnerability: https://jira.xwiki.org/browse/XWIKI-19945\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Open an issue in [Jira](https://jira.xwiki.org)\n* Email us at [security ML](mailto:security@xwiki.org)\n", "id": "GHSA-q2hm-2h45-v5g3", "modified": "2022-12-03T04:09:18Z", "published": "2022-11-21T22:37:11Z", "references": [ { "type": "WEB", "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-599v-w48h-rjrm" }, { "type": "WEB", "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-q2hm-2h45-v5g3" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41933" }, { "type": "WEB", "url": "https://github.com/xwiki/xwiki-platform/commit/443e8398b75a1295067d74afb5898370782d863a#diff-f8a8f8ba80dfc55f044e2e60b521ce379176430ca6921b0f87b79cf682531f79L322" }, { "type": "PACKAGE", "url": "https://github.com/xwiki/xwiki-platform" }, { "type": "WEB", "url": "https://jira.xwiki.org/browse/XWIKI-19869" }, { "type": "WEB", "url": "https://jira.xwiki.org/browse/XWIKI-19945" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N", "type": "CVSS_V3" } ], "summary": "Plaintext storage of password after a reset in org.xwiki.platform:xwiki-platform-security-authentication-default" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.