logo

CVE-2023-32071 org.xwiki.platform:xwiki-platform-distribution-war

Package

Manager: maven
Name: org.xwiki.platform:xwiki-platform-distribution-war
Vulnerable Version: >=2.2-milestone-1 <14.4.8 || >=14.5 <14.10.4

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

EPSS: 0.52989 pctl0.9788

Details

XWiki Platform vulnerable to RXSS via editor parameter - importinline template ### Impact It's possible to execute javascript with the right of any user by leading him to a special URL on the wiki targeting a page which contains an attachment. To reproduce: * add an attachment to a page (for example, your user profile) * add `?xpage=importinline&editor=%22%3E%3Cimg%20src%20onerror=alert(document.domain)%3E` to the page view URL as in `https://myhost/xwiki/bin/view/XWiki/MyUser?xpage=importinline&editor=%22%3E%3Cimg%20src%20onerror=alert(document.domain)%3E` ### Patches This has been patched in XWiki 15.0-rc-1, 14.10.4 and 14.4.8. ### Workarounds The easiest is to edit file `<xwiki app>/templates/importinline.vm` and apply the modification described on https://github.com/xwiki/xwiki-platform/commit/28905f7f518cc6f21ea61fe37e9e1ed97ef36f01 ### References https://jira.xwiki.org/browse/XWIKI-20340 https://app.intigriti.com/company/submissions/e95a7ad5-7029-4627-abf0-3e3e3ea0b4ce/XWIKI-E93DFEYK ### Attribution This vulnerability has been reported on Intigriti by René de Sain @renniepak.

Metadata

Created: 2023-05-09T17:46:22Z
Modified: 2023-05-09T18:44:13Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/05/GHSA-j9h5-vcgv-2jfm/GHSA-j9h5-vcgv-2jfm.json
CWE IDs: ["CWE-116", "CWE-79"]
Alternative ID: GHSA-j9h5-vcgv-2jfm
Finding: F008
Auto approve: 1