Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1teGYyLTRyMjItNWhxOc4AAu1J

XWiki Platform Web Parent POM vulnerable to XSS in the attachment history

Impact

It's possible to store a JavaScript which will be executed by anyone viewing the history of an attachment containing javascript in its name.

For example, attachment a file with name ><img src=1 onerror=alert(1)>.jpg will execute the alert.

Patches

This issue has been patched in XWiki 13.10.6 and 14.3RC1.

Workarounds

It is possible to replace viewattachrev.vm, the entry point for this attack, by a patched version from the patch without updating XWiki.

References

For more information

If you have any questions or comments about this advisory:

Permalink: https://github.com/advisories/GHSA-mxf2-4r22-5hq9
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1teGYyLTRyMjItNWhxOc4AAu1J
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 1 year ago
Updated: about 1 year ago


CVSS Score: 8.9
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L

Identifiers: GHSA-mxf2-4r22-5hq9, CVE-2022-36094
References: Repository: https://github.com/xwiki/xwiki-platform
Blast Radius: 1.0

Affected Packages

maven:org.xwiki.platform:xwiki-platform-web
Affected Version Ranges: >= 14.0, < 14.3-rc-1, >= 1.0, < 13.10.6
Fixed in: 14.3-rc-1, 13.10.6