Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cmvg-w72j-7phx

Опубликовано: 12 апр. 2023
Источник: github
Github: Прошло ревью
CVSS3: 9

Описание

org.xwiki.platform:xwiki-platform-skin-skinx vulnerable to basic Cross-site Scripting by exploiting JSX or SSX plugins

Impact

There was no check in the author of a JavaScript xobject or StyleSheet xobject added in a XWiki document, so until now it was possible for a user having only Edit Right to create such object and to craft a script allowing to perform some operations when executing by a user with appropriate rights.

Patches

This has been patched in XWiki 14.9-rc-1 by only executing the script if the author of it has Script right.

Workarounds

The only known workaround consists in applying the following patch and rebuilding and redeploying xwiki-platform-skin-skinx.

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

org.xwiki.platform:xwiki-platform-skin-skinx

maven
Затронутые версииВерсия исправления

>= 3.0-milestone-1, < 14.9-rc-1

14.9-rc-1

EPSS

Процентиль: 91%
0.06345
Низкий

9 Critical

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 9
nvd
почти 3 года назад

XWiki Commons are technical libraries common to several other top level XWiki projects. There was no check in the author of a JavaScript xobject or StyleSheet xobject added in a XWiki document, so until now it was possible for a user having only Edit Right to create such object and to craft a script allowing to perform some operations when executing by a user with appropriate rights. This has been patched in XWiki 14.9-rc-1 by only executing the script if the author of it has Script rights.

EPSS

Процентиль: 91%
0.06345
Низкий

9 Critical

CVSS3

Дефекты

CWE-79