Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9r9j-57rf-f6vj

Опубликовано: 16 сент. 2022
Источник: github
Github: Прошло ревью
CVSS3: 8.9

Описание

XWiki Platform Attachment UI vulnerable to cross-site scripting in the move attachment form

Impact

It's possible to store JavaScript in an attachment name, which will be executed by anyone trying to move the corresponding attachment.

For example, an attachment with name ><img src=1 onerror=alert(1)>.jpg will execute the alert.

Patches

This issue has been patched in XWiki 14.4RC1.

Workarounds

It is possible to fix the vulnerability by copying moveStep1.vm to webapp/xwiki/templates/moveStep1.vm and replace

#set($titleToDisplay = $services.localization.render('attachment.move.title', [$attachment.name, $escapetool.xml($doc.plainTitle), $doc.getURL()]))

by

#set($titleToDisplay = $services.localization.render('attachment.move.title', [ $escapetool.xml($attachment.name), $escapetool.xml($doc.plainTitle), $escapetool.xml($doc.getURL()) ]))

See the corresponding patch.

References

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

org.xwiki.platform:xwiki-platform-attachment-ui

maven
Затронутые версииВерсия исправления

>= 14.0-rc-1, < 14.4-rc-1

14.4-rc-1

EPSS

Процентиль: 97%
0.44185
Средний

8.9 High

CVSS3

Дефекты

CWE-79
CWE-80

Связанные уязвимости

CVSS3: 8.9
nvd
больше 3 лет назад

XWiki Platform Attachment UI provides a macro to easily upload and select attachments for XWiki Platform, a generic wiki platform. Starting with version 14.0-rc-1 and prior to 14.4-rc-1, it's possible to store JavaScript in an attachment name, which will be executed by anyone trying to move the corresponding attachment. This issue has been patched in XWiki 14.4-rc-1. As a workaround, one may copy `moveStep1.vm` to `webapp/xwiki/templates/moveStep1.vm` and replace vulnerable code with code from the patch.

EPSS

Процентиль: 97%
0.44185
Средний

8.9 High

CVSS3

Дефекты

CWE-79
CWE-80