Описание
XWiki allows Reflected XSS in two templates
Impact
Reflected XSS vulnerabilities in two templates allow an attacker to execute malicious JavaScript code in the context of the victim's session by getting the victim to visit an attacker-controlled URL. PoC URLs are /xwiki/bin/view/Main/?xpage=job_status_json&jobId=asdf&translationPrefix=<img src=1 onerror=alert(document.domain)> and /xwiki/bin/view/Main/?xpage=distribution&extensionId=%3Cimg src=x onerror=alert(document.domain)%3E&extensionVersionConstraint=%3Cimg src=x onerror=alert(document.domain)%3E. This allows the attacker to perform arbitrary actions using the permissions of the victim.
Patches
The problem has been patched in XWiki 16.4.8, 16.10.6 and 17.3.0RC1 by adding escaping in the affected templates.
Workarounds
The affected templates can be patched manually in the WAR by applying the same changes as in the patch.
Attribution
The vulnerability involving job_status_json has been reported as "Unauth Reflected XSS" vulnerability by Aleksey Solovev (Positive Technologies), and the vulnerability involving distribution has been reported as "Auth Admin Reflected XSS" vulnerability by Evgeny Kopytin (Positive Technologies). According to our analysis, both vulnerabilities can be exploited against both unauthenticated and authenticated victims (including victims with admin privileges) which is why we publish them together in this advisory.
Пакеты
org.xwiki.platform:xwiki-platform-web-templates
>= 4.2-milestone-3, < 16.4.8
16.4.8
org.xwiki.platform:xwiki-platform-web-templates
>= 16.5.0-rc-1, < 16.10.6
16.10.6
org.xwiki.platform:xwiki-platform-web-templates
>= 17.0.0-rc-1, < 17.3.0-rc-1
17.3.0-rc-1
Связанные уязвимости
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In versions 4.2-milestone-3 through 16.4.7, 16.5.0-rc-1 through 16.10.5 and 17.0.0-rc-1 through 17.2.2, two templates contain reflected XSS vulnerabilities, allowing an attacker to execute malicious JavaScript code in the context of the victim's session by getting the victim to visit an attacker-controlled URL. This permits the attacker to perform arbitrary actions using the permissions of the victim. This issue is fixed in versions 16.4.8, 16.10.6 and 17.3.0-rc-1. To workaround the issue, manually patch the WAR with the same changes as the original patch.
Уязвимость платформы создания совместных веб-приложений XWiki Platform XWiki, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю выполнить произвольный javascript-код