Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS05anE5LWMyY3YtcGNyas0pfw

Cross-site Scripting by SVG upload in xwiki-platform

Impact

When using default XWiki configuration, it's possible for an attacker to upload an SVG containing a script executed when executing the download action on the file.

Patches

This problem has been patched so that the default configuration doesn't allow to display the SVG files in the browser.

Workarounds

This issue can be fixed without the patch by setting properly the configuration to download or display files, see: https://www.xwiki.org/xwiki/bin/view/Documentation/AdminGuide/Attachments#HAttachmentdisplayordownload

References

https://jira.xwiki.org/browse/XWIKI-18368

For more information

If you have any questions or comments about this advisory:

Permalink: https://github.com/advisories/GHSA-9jq9-c2cv-pcrj
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS05anE5LWMyY3YtcGNyas0pfw
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 3 years ago
Updated: about 1 year ago


CVSS Score: 4.1
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N

EPSS Percentage: 0.00105
EPSS Percentile: 0.43635

Identifiers: GHSA-9jq9-c2cv-pcrj, CVE-2021-43841
References: Repository: https://github.com/xwiki/xwiki-platform
Blast Radius: 1.0

Affected Packages

maven:org.xwiki.platform:xwiki-platform-tool-configuration-resources
Affected Version Ranges: < 12.10.6, >= 13.0, <= 13.2
Fixed in: 12.10.6, 13.3RC1
maven:org.xwiki.platform:xwiki-platform-oldcore
Affected Version Ranges: >= 13.0, <= 13.2, < 12.10.6
Fixed in: 13.3RC1, 12.10.6