logo

CVE-2022-36096 org.xwiki.platform:xwiki-platform-index-ui

Package

Manager: maven
Name: org.xwiki.platform:xwiki-platform-index-ui
Vulnerable Version: >=2.2-milestone-1 <13.10.6 || >=14.0 <14.3

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N

EPSS: 0.55348 pctl0.97987

Details

XWiki Platform vulnerable to Cross-site Scripting in the deleted attachments list ### Impact It's possible to store a JavaScript which will be executed by anyone viewing the deleted attachments index with an attachment containing javascript in its name. For example, attachment a file with name `><img src=1 onerror=alert(1)>.jpg` will execute the alert. ### Patches This issue has been patched in XWiki 13.10.6 and 14.3. ### Workarounds It is possible to modify fix the vulnerability by editing the wiki page `XWiki.DeletedAttachments` with the object editor, open the `JavaScriptExtension` object and apply on the content the changes that can be found on the commit https://github.com/xwiki/xwiki-platform/commit/6705b0cd0289d1c90ed354bd4ecc1508c4b25745. ### References * https://jira.xwiki.org/browse/XWIKI-19613 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)

Metadata

Created: 2022-09-16T17:39:32Z
Modified: 2022-09-16T17:39:32Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/09/GHSA-gjmq-x5x7-wc36/GHSA-gjmq-x5x7-wc36.json
CWE IDs: ["CWE-79", "CWE-80"]
Alternative ID: GHSA-gjmq-x5x7-wc36
Finding: F425
Auto approve: 1