Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-34464: XWIKI-20290: Set correct content type in rendercontent.vm · xwiki/xwiki-platform@53e8292

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Starting in version 2.2.1 until versions 14.4.8, 14.10.5, and 15.1RC1 of org.xwiki.platform:xwiki-platform-web and any version prior to 14.4.8, 14.10.5, and 15.1.RC1 of org.xwiki.platform:xwiki-platform-web-templates, any user who can edit a document in a wiki like the user profile can create a stored cross-site scripting attack. The attack occurs by putting plain HTML code into that document and then tricking another user to visit that document with the displaycontent or rendercontent template and plain output syntax. If a user with programming rights is tricked into visiting such a URL, arbitrary actions be performed with this user’s rights, impacting the confidentiality, integrity, and availability of the whole XWiki installation. This has been patched in XWiki 14.4.8, 14.10.5 and 15.1RC1 by setting the content type of the response to plain text when the output syntax is not an HTML syntax.

CVE
#xss#web#redis#js#java

@@ -0,0 +1,131 @@ /* * See the NOTICE file distributed with this work for additional * information regarding copyright ownership. * * This is free software; you can redistribute it and/or modify it * under the terms of the GNU Lesser General Public License as * published by the Free Software Foundation; either version 2.1 of * the License, or (at your option) any later version. * * This software is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this software; if not, write to the Free * Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA * 02110-1301 USA, or see the FSF site: http://www.fsf.org. */ package org.xwiki.web;
import javax.inject.Inject;
import org.junit.jupiter.api.BeforeEach; import org.junit.jupiter.api.Test; import org.xwiki.job.script.ProgressScripService; import org.xwiki.model.reference.DocumentReference; import org.xwiki.rendering.syntax.Syntax; import org.xwiki.template.TemplateManager; import org.xwiki.template.script.TemplateScriptService; import org.xwiki.test.annotation.ComponentList; import org.xwiki.test.page.HTML50ComponentList; import org.xwiki.test.page.PageTest; import org.xwiki.test.page.XWikiSyntax21ComponentList;
import com.xpn.xwiki.XWikiException; import com.xpn.xwiki.doc.XWikiDocument; import com.xpn.xwiki.web.XWikiServletResponseStub;
import static org.junit.jupiter.api.Assertions.assertEquals;
/** * Tests the {@code displaycontent.vm} template. * * @version $Id$ */ @HTML50ComponentList @XWikiSyntax21ComponentList @ComponentList({ TemplateScriptService.class, ProgressScripService.class }) class DisplaycontentPageTest extends PageTest { private static final DocumentReference TEST_REFERENCE = new DocumentReference("xwiki", "space", “page”);
private static final String TEMPLATE_NAME = "displaycontent.vm";
private static final String HTML_CONTENT_TYPE = "text/html; charset=utf-8";
private XWikiDocument document;
@Inject private TemplateManager templateManager;
@BeforeEach void setUp() throws XWikiException { this.document = new XWikiDocument(TEST_REFERENCE); this.document.setSyntax(Syntax.XWIKI_2_1); this.xwiki.saveDocument(this.document, this.context); this.context.setDoc(this.document);
// Allow setting the content type in the response, so we can assert it later. The default is consistent with // Utils#parseTemplate(String, boolean, XWikiContext). this.response = new XWikiServletResponseStub() { private String contentType = HTML_CONTENT_TYPE;
@Override public String getContentType() { return this.contentType; }
@Override public void setContentType(String type) { this.contentType = type; } }; this.context.setResponse(this.response); }
@Test void renderHTML() throws Exception { this.document.setContent(“Hello World”); this.xwiki.saveDocument(this.document, this.context);
String result = this.templateManager.render(TEMPLATE_NAME).trim(); assertEquals("<p>Hello World</p>", result); assertEquals(HTML_CONTENT_TYPE, this.response.getContentType()); }
@Test void renderJSON() throws Exception { String json = “{\"hello\": \"world\"}"; this.document.setContent(json + " {{velocity}}#set ($discard = $response.setContentType(‘application/json’)){{/velocity}}”); this.xwiki.saveDocument(this.document, this.context); this.request.put("outputSyntax", “plain”);
String result = this.templateManager.render(TEMPLATE_NAME).trim(); assertEquals(json, result); assertEquals("application/json", this.response.getContentType()); }
@Test void renderPlain() throws Exception { this.document.setContent(“<strong>Some HTML</strong>”); this.xwiki.saveDocument(this.document, this.context); this.request.put("outputSyntax", “plain”);
String result = this.templateManager.render(TEMPLATE_NAME).trim(); assertEquals(this.document.getContent(), result); assertEquals("text/plain", this.response.getContentType()); } }

Related news

GHSA-fp7h-f9f5-x4q7: XWiki vulnerable to stored cross-site scripting via any wiki document and the displaycontent/rendercontent template

### Impact Any user who can edit a document in a wiki like the user profile can create a stored XSS attack by putting plain HTML code into that document and then tricking another user to visit that document with the `displaycontent` or `rendercontent` template and plain output syntax. For example, edit any document with the wiki editor and set the content to `<script>alert(1)</script>` , save and then append the parameters `?viewer=displaycontent&sheet=&outputSyntax=plain`. If this displays an alert, the installation is vulnerable. If a user with programming rights is tricked into visiting such a URL, arbitrary actions be performed with this user's rights, impacting the confidentiality, integrity, and availability of the whole XWiki installation. ### Patches This has been patched in XWiki 14.4.8, 14.10.5 and 15.1RC1 by setting the content type of the response to plain text when the output syntax is not an HTML syntax. ### Workarounds The [patch](https://github.com/xwiki/xwiki-platfo...

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907