Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1jbXZnLXc3MmotN3BoeM4AAyu3

org.xwiki.platform:xwiki-platform-skin-skinx vulnerable to basic Cross-site Scripting by exploiting JSX or SSX plugins

Impact

There was no check in the author of a JavaScript xobject or StyleSheet xobject added in a XWiki document, so until now it was possible for a user having only Edit Right to create such object and to craft a script allowing to perform some operations when executing by a user with appropriate rights.

Patches

This has been patched in XWiki 14.9-rc-1 by only executing the script if the author of it has Script right.

Workarounds

The only known workaround consists in applying the following patch and rebuilding and redeploying xwiki-platform-skin-skinx.

For more information

If you have any questions or comments about this advisory:

Permalink: https://github.com/advisories/GHSA-cmvg-w72j-7phx
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1jbXZnLXc3MmotN3BoeM4AAyu3
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: about 1 year ago
Updated: about 1 year ago


CVSS Score: 9.1
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

Identifiers: GHSA-cmvg-w72j-7phx, CVE-2023-29206
References: Repository: https://github.com/xwiki/xwiki-platform
Blast Radius: 1.0

Affected Packages

maven:org.xwiki.platform:xwiki-platform-skin-skinx
Affected Version Ranges: >= 3.0-milestone-1, < 14.9-rc-1
Fixed in: 14.9-rc-1