CVE-2023-45138 – org.xwiki.contrib.changerequest:application-changerequest-ui
Package
Manager: maven
Name: org.xwiki.contrib.changerequest:application-changerequest-ui
Vulnerable Version: >=0.11 <1.9.2
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
EPSS: 0.78432 pctl0.98997
Details
XWiki Change Request Application UI XSS and remote code execution through change request title ### Impact It's possible for a user without any specific right to perform script injection and remote code execution just by inserting an appropriate title when creating a new Change Request. This vulnerability is particularly critical as Change Request aims at being created by user without any particular rights. ### Patches The vulnerability has been fixed in Change Request 1.9.2. ### Workarounds It's possible to workaround the issue without upgrading by editing the document `ChangeRequest.Code.ChangeRequestSheet` and by performing the same change as in the commit: https://github.com/xwiki-contrib/application-changerequest/commit/7565e720117f73102f5a276239eabfe85e15cff4. ### References * JIRA ticket: https://jira.xwiki.org/browse/CRAPP-298 * Commit of the fix: https://github.com/xwiki-contrib/application-changerequest/commit/7565e720117f73102f5a276239eabfe85e15cff4 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org) ### Attribution Thanks Michael Hamann for the report.
Metadata
Created: 2023-10-17T02:19:16Z
Modified: 2023-10-17T02:19:16Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/10/GHSA-f776-w9v2-7vfj/GHSA-f776-w9v2-7vfj.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-f776-w9v2-7vfj
Finding: F425
Auto approve: 1