Skip to content

XSS in the attachment history

High
surli published GHSA-mxf2-4r22-5hq9 Sep 8, 2022

Package

maven org.xwiki.platform:xwiki-platform-web (Maven)

Affected versions

>= 1.0

Patched versions

13.10.6, 14.3-rc-1

Description

Impact

It's possible to store a JavaScript which will be executed by anyone viewing the history of an attachment containing javascript in its name.

For example, attachment a file with name ><img src=1 onerror=alert(1)>.jpg will execute the alert.

Patches

This issue has been patched in XWiki 13.10.6 and 14.3RC1.

Workarounds

It is possible to replace viewattachrev.vm, the entry point for this attack, by a patched version from the patch without updating XWiki.

References

For more information

If you have any questions or comments about this advisory:

Severity

High
8.9
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
Low
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L

CVE ID

CVE-2022-36094

Weaknesses