Описание
XWiki Platform Web Parent POM contains Web resources for the XWiki platform, a generic wiki platform. Starting with version 1.0 and prior to versions 13.10.6 and 14.30-rc-1, it's possible to store JavaScript which will be executed by anyone viewing the history of an attachment containing javascript in its name. This issue has been patched in XWiki 13.10.6 and 14.3RC1. As a workaround, it is possible to replace viewattachrev.vm, the entry point for this attack, by a patched version from the patch without updating XWiki.
Ссылки
- PatchThird Party Advisory
- Third Party Advisory
- ExploitVendor Advisory
- PatchThird Party Advisory
- Third Party Advisory
- ExploitVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 1.0 (включая) до 13.10.6 (исключая)Версия от 14.0 (включая) до 14.3 (исключая)
Одно из
cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*
cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*
EPSS
Процентиль: 98%
0.49213
Средний
8.9 High
CVSS3
9 Critical
CVSS3
Дефекты
CWE-79
CWE-79
Связанные уязвимости
CVSS3: 8.9
github
больше 3 лет назад
XWiki Platform Web Parent POM vulnerable to XSS in the attachment history
EPSS
Процентиль: 98%
0.49213
Средний
8.9 High
CVSS3
9 Critical
CVSS3
Дефекты
CWE-79
CWE-79