Логотип exploitDog
bind:CVE-2022-23620
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-23620

Количество 2

Количество 2

nvd логотип

CVE-2022-23620

почти 4 года назад

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions AbstractSxExportURLFactoryActionHandler#processSx does not escape anything from SSX document references when serializing it on filesystem, it is possible to for the HTML export process to contain reference elements containing filesystem syntax like "../", "./". or "/" in general. The referenced elements are not properly escaped. This issue has been resolved in version 13.6-rc-1. This issue can be worked around by limiting or disabling document export.

CVSS3: 6.8
EPSS: Низкий
github логотип

GHSA-7ph6-5cmq-xgjq

почти 4 года назад

Path traversal in xwiki-platform-skin-skinx

CVSS3: 6.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-23620

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions AbstractSxExportURLFactoryActionHandler#processSx does not escape anything from SSX document references when serializing it on filesystem, it is possible to for the HTML export process to contain reference elements containing filesystem syntax like "../", "./". or "/" in general. The referenced elements are not properly escaped. This issue has been resolved in version 13.6-rc-1. This issue can be worked around by limiting or disabling document export.

CVSS3: 6.8
0%
Низкий
почти 4 года назад
github логотип
GHSA-7ph6-5cmq-xgjq

Path traversal in xwiki-platform-skin-skinx

CVSS3: 6.8
0%
Низкий
почти 4 года назад

Уязвимостей на страницу