Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS00d2M2LWhxdjktcWM5N84AAz9s

XWiki Platform vulnerable to stored cross-site scripting in ClassEditSheet page via name parameters

Impact

A stored XSS can be exploited by users with edit rights by adding a AppWithinMinutes.FormFieldCategoryClass class on a page and setting the payload on the page title.
Then, any user visiting /xwiki/bin/view/AppWithinMinutes/ClassEditSheet executes the payload.

See https://jira.xwiki.org/browse/XWIKI-20365 for me details.

Patches

The issue has been patched on XWiki 14.4.8, 14.10.4, and 15.0 ?

Workarounds

The issue can be fixed by updating AppWithinMinutes.ClassEditSheet with this patch.

References

For more information

If you have any questions or comments about this advisory:

Attribution

This vulnerability has been reported on Intigriti by René de Sain @renniepak.

Permalink: https://github.com/advisories/GHSA-4wc6-hqv9-qc97
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS00d2M2LWhxdjktcWM5N84AAz9s
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: over 1 year ago
Updated: about 1 year ago


CVSS Score: 9.1
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

Identifiers: GHSA-4wc6-hqv9-qc97, CVE-2023-35153
References: Repository: https://github.com/xwiki/xwiki-platform
Blast Radius: 1.0

Affected Packages

maven:org.xwiki.platform:xwiki-platform-appwithinminutes-ui
Affected Version Ranges: >= 15.0-rc-1, < 15.0, >= 14.5, < 14.10.4, >= 5.4.4, < 14.4.8
Fixed in: 15.0, 14.10.4, 14.4.8