Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-mxf2-4r22-5hq9: XWiki Platform Web Parent POM vulnerable to XSS in the attachment history

Impact

It’s possible to store a JavaScript which will be executed by anyone viewing the history of an attachment containing javascript in its name.

For example, attachment a file with name ><img src=1 onerror=alert(1)>.jpg will execute the alert.

Patches

This issue has been patched in XWiki 13.10.6 and 14.3RC1.

Workarounds

It is possible to replace viewattachrev.vm, the entry point for this attack, by a patched version from the patch without updating XWiki.

References

  • https://jira.xwiki.org/browse/XWIKI-19612

For more information

If you have any questions or comments about this advisory:

ghsa
#xss#vulnerability#web#git#java#jira#maven

Package

maven org.xwiki.platform:xwiki-platform-web (Maven)

Affected versions

>= 1.0, < 13.10.6

>= 14.0, < 14.3-rc-1

Patched versions

13.10.6

14.3-rc-1

Description

Impact

It’s possible to store a JavaScript which will be executed by anyone viewing the history of an attachment containing javascript in its name.

For example, attachment a file with name ><img src=1 onerror=alert(1)>.jpg will execute the alert.

Patches

This issue has been patched in XWiki 13.10.6 and 14.3RC1.

Workarounds

It is possible to replace viewattachrev.vm, the entry point for this attack, by a patched version from the patch without updating XWiki.

References

  • https://jira.xwiki.org/browse/XWIKI-19612

For more information

If you have any questions or comments about this advisory:

  • Open an issue in Jira XWiki.org
  • Email us at Security Mailing List

References

  • GHSA-mxf2-4r22-5hq9
  • https://nvd.nist.gov/vuln/detail/CVE-2022-36094
  • xwiki/xwiki-platform@047ce9f
  • https://jira.xwiki.org/browse/XWIKI-19612

surli published the maintainer security advisory

Sep 8, 2022

Severity

High

8.9

/ 10

CVSS base metrics

Attack vector

Network

Attack complexity

Low

Privileges required

Low

User interaction

Required

Scope

Changed

Confidentiality

High

Integrity

High

Availability

Low

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L

Weaknesses

CWE-79 CWE-80

CVE ID

CVE-2022-36094

GHSA ID

GHSA-mxf2-4r22-5hq9

Source code

xwiki/xwiki-platform

Checking history

See something to contribute? Suggest improvements for this vulnerability.

Related news

CVE-2022-36094: XSS in the attachment history

XWiki Platform Web Parent POM contains Web resources for the XWiki platform, a generic wiki platform. Starting with version 1.0 and prior to versions 13.10.6 and 14.30-rc-1, it's possible to store JavaScript which will be executed by anyone viewing the history of an attachment containing javascript in its name. This issue has been patched in XWiki 13.10.6 and 14.3RC1. As a workaround, it is possible to replace `viewattachrev.vm`, the entry point for this attack, by a patched version from the patch without updating XWiki.