Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mxf2-4r22-5hq9

Опубликовано: 16 сент. 2022
Источник: github
Github: Прошло ревью
CVSS3: 8.9

Описание

XWiki Platform Web Parent POM vulnerable to XSS in the attachment history

Impact

It's possible to store a JavaScript which will be executed by anyone viewing the history of an attachment containing javascript in its name.

For example, attachment a file with name ><img src=1 onerror=alert(1)>.jpg will execute the alert.

Patches

This issue has been patched in XWiki 13.10.6 and 14.3RC1.

Workarounds

It is possible to replace viewattachrev.vm, the entry point for this attack, by a patched version from the patch without updating XWiki.

References

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

org.xwiki.platform:xwiki-platform-web

maven
Затронутые версииВерсия исправления

>= 1.0, < 13.10.6

13.10.6

Наименование

org.xwiki.platform:xwiki-platform-web

maven
Затронутые версииВерсия исправления

>= 14.0, < 14.3-rc-1

14.3-rc-1

EPSS

Процентиль: 98%
0.49213
Средний

8.9 High

CVSS3

Дефекты

CWE-79
CWE-80

Связанные уязвимости

CVSS3: 8.9
nvd
больше 3 лет назад

XWiki Platform Web Parent POM contains Web resources for the XWiki platform, a generic wiki platform. Starting with version 1.0 and prior to versions 13.10.6 and 14.30-rc-1, it's possible to store JavaScript which will be executed by anyone viewing the history of an attachment containing javascript in its name. This issue has been patched in XWiki 13.10.6 and 14.3RC1. As a workaround, it is possible to replace `viewattachrev.vm`, the entry point for this attack, by a patched version from the patch without updating XWiki.

EPSS

Процентиль: 98%
0.49213
Средний

8.9 High

CVSS3

Дефекты

CWE-79
CWE-80