On 17 Dec 2015 at 14:17:02, vinc...@massol.net 
(vinc...@massol.net(mailto:vinc...@massol.net)) wrote:

> Hi XWiki users and devs,
>  
> An important security issue in the XML-RPC module of XWiki 
> (http://extensions.xwiki.org/xwiki/bin/view/Extension/XML-RPC+Integration) 
> was brought to our attention by a community member (thanks Ruben Herold). 
> Specifically if your wiki is available on the internet, it’s possible that an 
> intruder may have had access to local files that can be read by the user 
> under which you’ve started the Servlet Container used for XWiki.  
>  
> Note 1: The issue actually comes from the version of the Apache XMLRPC module 
> we were using (https://ws.apache.org/xmlrpc/). It’s been fixed in the latest 
> version (3.1.3). We were using version 3.1.  
>  
> Note 2: ThE XWiki XMLRPC module has been deprecated for a long time now (was 
> replaced by REST) but it was still enabled till XWiki 7.3M1:  
> * In XWiki 7.3M1 we’ve turned off that feature
> * In XWiki 7.4M2 we’ve removed it altogether by default
>  
> We recommend that you either upgrade to XWiki 6.4.7, 7.1.4 or 7.3+ or that 
> you turn-off the XML-RPC feature on your wiki **especially if your wiki is 
> open on the internet**.  
>  
> Turning it off is easy: edit XWiki’s META-INF/web.xml file and comment out or 
> remove the following sections: 

Correction:

it’s WEB-INF/web.xml

Thanks
-Vincent

> ...  
>
_______________________________________________
devs mailing list
devs@xwiki.org
http://lists.xwiki.org/mailman/listinfo/devs

Reply via email to