CVE-2023-29206 – org.xwiki.platform:xwiki-platform-skin-skinx
Package
Manager: maven
Name: org.xwiki.platform:xwiki-platform-skin-skinx
Vulnerable Version: >=3.0-milestone-1 <14.9-rc-1
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
EPSS: 0.06529 pctl0.90744
Details
org.xwiki.platform:xwiki-platform-skin-skinx vulnerable to basic Cross-site Scripting by exploiting JSX or SSX plugins ### Impact There was no check in the author of a JavaScript xobject or StyleSheet xobject added in a XWiki document, so until now it was possible for a user having only Edit Right to create such object and to craft a script allowing to perform some operations when executing by a user with appropriate rights. ### Patches This has been patched in XWiki 14.9-rc-1 by only executing the script if the author of it has Script right. ### Workarounds The only known workaround consists in applying [the following patch](https://github.com/xwiki/xwiki-platform/commit/fe65bc35d5672dd2505b7ac4ec42aec57d500fbb) and rebuilding and redeploying `xwiki-platform-skin-skinx`. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira](http://jira.xwiki.org) * Email us at [Security ML](mailto:security@xwiki.org)
Metadata
Created: 2023-04-12T20:38:47Z
Modified: 2023-04-26T22:16:39Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/04/GHSA-cmvg-w72j-7phx/GHSA-cmvg-w72j-7phx.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-cmvg-w72j-7phx
Finding: F425
Auto approve: 1