logo

CVE-2023-26480 org.xwiki.platform:xwiki-platform-livedata-macro

Package

Manager: maven
Name: org.xwiki.platform:xwiki-platform-livedata-macro
Vulnerable Version: >=12.10 <13.10.10 || >=14.0 <14.4.7 || >=14.5 <14.9

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N

EPSS: 0.01204 pctl0.78166

Details

XWiki-Platform vulnerable to stored Cross-site Scripting via the HTML displayer in Live Data ### Impact A user without script rights can introduce a stored XSS by using the Live Data macro. For instance: ``` {{liveData id="movies" properties="title,description"}} { "data": { "count": 1, "entries": [ { "title": "Meet John Doe", "url": "https://www.imdb.com/title/tt0033891/", "description": "<img onerror='alert(1)' src='foo' />" } ] }, "meta": { "propertyDescriptors": [ { "id": "title", "name": "Title", "visible": true, "displayer": {"id": "link", "propertyHref": "url"} }, { "id": "description", "name": "Description", "visible": true, "displayer": "html" } ] } } {{/liveData}} ``` ### Patches This has been patched in XWiki 14.9, 14.4.7, and 13.10.10. ### Workarounds No known workaround. ### References https://jira.xwiki.org/browse/XWIKI-20143 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira](http://jira.xwiki.org/) * Email us at [Security ML](mailto:security@xwiki.org)

Metadata

Created: 2023-03-03T22:53:51Z
Modified: 2023-03-03T22:53:51Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/03/GHSA-32fq-m2q5-h83g/GHSA-32fq-m2q5-h83g.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-32fq-m2q5-h83g
Finding: F425
Auto approve: 1