Описание
XWiki Platform is a generic wiki platform. Starting in version 5.4.4 and prior to versions 14.4.8, 14.10.4, and 15.0, a stored cross-site scripting vulnerability can be exploited by users with edit rights by adding a AppWithinMinutes.FormFieldCategoryClass class on a page and setting the payload on the page title. Then, any user visiting /xwiki/bin/view/AppWithinMinutes/ClassEditSheet executes the payload. The issue has been patched in XWiki 14.4.8, 14.10.4, and 15.0. As a workaround, update AppWithinMinutes.ClassEditSheet with a patch.
Ссылки
- PatchVendor Advisory
- Vendor Advisory
- ExploitIssue TrackingPatchVendor Advisory
- PatchVendor Advisory
- Vendor Advisory
- ExploitIssue TrackingPatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 5.4.4 (включая) до 14.4.8 (исключая)Версия от 14.10 (включая) до 14.10.4 (исключая)
Одно из
cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*
cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*
cpe:2.3:a:xwiki:xwiki:15.0:rc1:*:*:*:*:*:*
EPSS
Процентиль: 84%
0.02094
Низкий
9 Critical
CVSS3
5.4 Medium
CVSS3
Дефекты
CWE-79
CWE-79
Связанные уязвимости
CVSS3: 9
github
больше 2 лет назад
XWiki Platform vulnerable to stored cross-site scripting in ClassEditSheet page via name parameters
EPSS
Процентиль: 84%
0.02094
Низкий
9 Critical
CVSS3
5.4 Medium
CVSS3
Дефекты
CWE-79
CWE-79