CVE-2023-35157 – org.xwiki.platform:xwiki-platform-oldcore
Package
Manager: maven
Name: org.xwiki.platform:xwiki-platform-oldcore
Vulnerable Version: >=3.2-milestone-3 <14.10.6 || >=15.0-rc-0 <15.1-rc-1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.01129 pctl0.7749
Details
XWiki Platform vulnerable to reflected cross-site scripting via delattachment action ### Impact It's possible to perform an XSS by forging a request to a delete attachment action with a specific attachment name. Now this XSS can be exploited only if the attacker knows the CSRF token of the user, or if the user ignores the warning about the missing CSRF token. ### Patches The vulnerability has been patched in XWiki 15.1-rc-1 and XWiki 14.10.6. ### Workarounds There's no workaround for this other than upgrading XWiki. ### References * Jira ticket: https://jira.xwiki.org/browse/XWIKI-20339 * Commit containing the fix: https://github.com/xwiki/xwiki-platform/commit/35e9073ffec567861e0abeea072bd97921a3decf ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki.org](https://jira.xwiki.org/) * Email us at [Security Mailing List](mailto:security@xwiki.org)
Metadata
Created: 2023-06-22T19:59:25Z
Modified: 2023-06-22T19:59:25Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/06/GHSA-phwm-87rg-27qq/GHSA-phwm-87rg-27qq.json
CWE IDs: ["CWE-79", "CWE-80"]
Alternative ID: GHSA-phwm-87rg-27qq
Finding: F008
Auto approve: 1