XWiki Platform vulnerable to stored cross-site scripting in ClassEditSheet page via name parameters
Critical severity
GitHub Reviewed
Published
Jun 20, 2023
in
xwiki/xwiki-platform
•
Updated Nov 4, 2023
Package
Affected versions
>= 5.4.4, < 14.4.8
>= 14.5, < 14.10.4
>= 15.0-rc-1, < 15.0
Patched versions
14.4.8
14.10.4
15.0
Description
Published to the GitHub Advisory Database
Jun 20, 2023
Reviewed
Jun 20, 2023
Published by the National Vulnerability Database
Jun 23, 2023
Last updated
Nov 4, 2023
Impact
A stored XSS can be exploited by users with edit rights by adding a
AppWithinMinutes.FormFieldCategoryClass
class on a page and setting the payload on the page title.Then, any user visiting
/xwiki/bin/view/AppWithinMinutes/ClassEditSheet
executes the payload.See https://jira.xwiki.org/browse/XWIKI-20365 for me details.
Patches
The issue has been patched on XWiki 14.4.8, 14.10.4, and 15.0 ?
Workarounds
The issue can be fixed by updating
AppWithinMinutes.ClassEditSheet
with this patch.References
For more information
If you have any questions or comments about this advisory:
Attribution
This vulnerability has been reported on Intigriti by René de Sain @renniepak.
References