logo

CVE-2021-43841 org.xwiki.platform:xwiki-platform-oldcore

Package

Manager: maven
Name: org.xwiki.platform:xwiki-platform-oldcore
Vulnerable Version: >=0 <12.10.6 || >=13.0 <13.3rc1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00568 pctl0.67577

Details

Cross-site Scripting by SVG upload in xwiki-platform ### Impact When using default XWiki configuration, it's possible for an attacker to upload an SVG containing a script executed when executing the download action on the file. ### Patches This problem has been patched so that the default configuration doesn't allow to display the SVG files in the browser. ### Workarounds This issue can be fixed without the patch by setting properly the configuration to download or display files, see: https://www.xwiki.org/xwiki/bin/view/Documentation/AdminGuide/Attachments#HAttachmentdisplayordownload ### References https://jira.xwiki.org/browse/XWIKI-18368 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira](http://jira.xwiki.org) * Email us at [security ML](mailto:security@xwiki.org)

Metadata

Created: 2022-02-10T22:42:48Z
Modified: 2022-02-11T21:08:41Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-9jq9-c2cv-pcrj/GHSA-9jq9-c2cv-pcrj.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-9jq9-c2cv-pcrj
Finding: F425
Auto approve: 1