CVE-2022-29258 – org.xwiki.platform:xwiki-platform-filter-ui
Package
Manager: maven
Name: org.xwiki.platform:xwiki-platform-filter-ui
Vulnerable Version: >=5.4.4 <12.10.11 || >=13.0.0 <13.4.7 || >=13.5.0 <13.10.3
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00827 pctl0.73613
Details
Cross-site Scripting in Filter Stream Converter Application in XWiki Platform ### Impact We found a possible XSS vector in the `Filter.FilterStreamDescriptorForm` wiki page related to pretty much all the form fields printed in the home page of the application. ### Patches The issue is patched in versions 12.10.11, 14.0-rc-1, 13.4.7, 13.10.3. ### Workarounds The easiest workaround is to edit the wiki page `Filter.FilterStreamDescriptorForm` (with wiki editor) and change the lines ``` <input type="text" id="$descriptorId" name="$descriptorId" value="#if($request.get($descriptorId))$request.get($descriptorId)#else$descriptor.defaultValue#end"/> #else <input type="text" id="$descriptorId" name="$descriptorId"#if($request.get($descriptorId))value="$request.get($descriptorId)"#end/> ``` into ``` <input type="text" id="$descriptorId" name="$descriptorId" value="#if($request.get($descriptorId))$escapetool.xml($request.get($descriptorId))#else$descriptor.defaultValue#end"/> #else <input type="text" id="$descriptorId" name="$descriptorId"#if($request.get($descriptorId))value="$escapetool.xml($request.get($descriptorId))"#end/> ```
Metadata
Created: 2022-06-01T20:25:54Z
Modified: 2022-06-01T20:25:54Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/06/GHSA-xjfw-5vv5-vjq2/GHSA-xjfw-5vv5-vjq2.json
CWE IDs: ["CWE-116", "CWE-79"]
Alternative ID: GHSA-xjfw-5vv5-vjq2
Finding: F425
Auto approve: 1