Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-6gf5-c898-7rxp: Improper Neutralization of Script in Attributes in XWiki (X)HTML renderers

Impact

HTML rendering didn’t check for dangerous attributes/attribute values. This allowed cross-site scripting (XSS) attacks via attributes and link URLs, e.g., supported in XWiki syntax.

Patches

This has been patched in XWiki 14.6 RC1.

Workarounds

There are no known workarounds apart from upgrading to a fixed version.

References

  • https://github.com/xwiki/xwiki-rendering/commit/c40e2f5f9482ec6c3e71dbf1fff5ba8a5e44cdc1
  • https://jira.xwiki.org/browse/XRENDERING-663

For more information

If you have any questions or comments about this advisory:

ghsa
#xss#git#java#jira#maven

Package

maven org.xwiki.platform:xwiki-core-rendering-api (Maven)

Affected versions

<= 3.0-milestone-2

maven org.xwiki.platform:xwiki-platform-annotation-core (Maven)

maven org.xwiki.rendering:xwiki-rendering-syntax-annotatedhtml5 (Maven)

maven org.xwiki.rendering:xwiki-rendering-syntax-annotatedxhtml (Maven)

maven org.xwiki.rendering:xwiki-rendering-syntax-html (Maven)

maven org.xwiki.rendering:xwiki-rendering-syntax-html5 (Maven)

maven org.xwiki.rendering:xwiki-rendering-syntax-xhtml (Maven)

Description

Published to the GitHub Advisory Database

May 11, 2023

Related news

CVE-2023-32070: XRENDERING-663: Restrict allowed attributes in HTML rendering · xwiki/xwiki-rendering@c40e2f5

XWiki Platform is a generic wiki platform. Prior to version 14.6-rc-1, HTML rendering didn't check for dangerous attributes/attribute values. This allowed cross-site scripting (XSS) attacks via attributes and link URLs, e.g., supported in XWiki syntax. This has been patched in XWiki 14.6-rc-1. There are no known workarounds apart from upgrading to a fixed version.