Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1qOWg1LXZjZ3YtMmpmbc4AAzL4

XWiki Platform vulnerable to RXSS via editor parameter - importinline template

Impact

It's possible to execute javascript with the right of any user by leading him to a special URL on the wiki targeting a page which contains an attachment.

To reproduce:

Patches

This has been patched in XWiki 15.0-rc-1, 14.10.4 and 14.4.8.

Workarounds

The easiest is to edit file <xwiki app>/templates/importinline.vm and apply the modification described on https://github.com/xwiki/xwiki-platform/commit/28905f7f518cc6f21ea61fe37e9e1ed97ef36f01

References

https://jira.xwiki.org/browse/XWIKI-20340
https://app.intigriti.com/company/submissions/e95a7ad5-7029-4627-abf0-3e3e3ea0b4ce/XWIKI-E93DFEYK

Attribution

This vulnerability has been reported on Intigriti by René de Sain @renniepak.

Permalink: https://github.com/advisories/GHSA-j9h5-vcgv-2jfm
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1qOWg1LXZjZ3YtMmpmbc4AAzL4
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: over 1 year ago
Updated: about 1 year ago


CVSS Score: 9.1
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

Identifiers: GHSA-j9h5-vcgv-2jfm, CVE-2023-32071
References: Repository: https://github.com/xwiki/xwiki-platform
Blast Radius: 1.0

Affected Packages

maven:org.xwiki.platform:xwiki-platform-distribution-war
Affected Version Ranges: >= 14.5, < 14.10.4, >= 2.2-milestone-1, < 14.4.8
Fixed in: 14.10.4, 14.4.8