Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS12eGY3LW14MjItanIyNM4AAyu4
org.xwiki.platform:xwiki-platform-rendering-xwiki vulnerable to stored cross-site scripting via HTML and raw macro
Impact
The HTML macro does not systematically perform a proper neutralization of script-related html tags. As a result, any user able to use the html macro in XWiki, is able to introduce an XSS attack. This can be particularly dangerous since in a standard wiki, any user is able to use the html macro directly in their own user profile page.
Patches
The problem has been patched in XWiki 14.8RC1. The patch involve that the HTML macro are systematically cleaned up whenever the user does not have script right.
Workarounds
There's no workaround for this issue.
For more information
If you have any questions or comments about this advisory:
- Open an issue in Jira
- Email us at security ML
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS12eGY3LW14MjItanIyNM4AAyu4
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: about 1 year ago
Updated: about 1 year ago
CVSS Score: 10.0
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Identifiers: GHSA-vxf7-mx22-jr24, CVE-2023-29205
References:
- https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-vxf7-mx22-jr24
- https://jira.xwiki.org/browse/XWIKI-18568
- https://nvd.nist.gov/vuln/detail/CVE-2023-29205
- https://github.com/advisories/GHSA-vxf7-mx22-jr24
Blast Radius: 1.0
Affected Packages
maven:org.xwiki.platform:xwiki-platform-rendering-xwiki
Affected Version Ranges: < 14.8-rc-1Fixed in: 14.8-rc-1