Lucene search

K
cveGitHub_MCVE-2022-23622
HistoryFeb 09, 2022 - 10:15 p.m.

CVE-2022-23622

2022-02-0922:15:07
CWE-79
GitHub_M
web.nvd.nist.gov
100
xwiki platform
cve-2022-23622
cross site scripting
xss
registerinline.vm
security patch
user registration
administration rights
view rights

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N

EPSS

0.001

Percentile

36.8%

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions there is a cross site scripting (XSS) vector in the registerinline.vm template related to the xredirect hidden field. This template is only used in the following conditions: 1. The wiki must be open to registration for anyone. 2. The wiki must be closed to view for Guest users or more specifically the XWiki.Registration page must be forbidden in View for guest user. A way to obtain the second condition is when administrators checked the “Prevent unregistered users from viewing pages, regardless of the page rights” box in the administration rights. This issue is patched in versions 12.10.11, 14.0-rc-1, 13.4.7, 13.10.3. There are two main ways for protecting against this vulnerability, the easiest and the best one is by applying a patch in the registerinline.vm template, the patch consists in checking the value of the xredirect field to ensure it matches: <input type="hidden" name="xredirect" value="$escapetool.xml($!request.xredirect)" />. If for some reason it’s not possible to patch this file, another workaround is to ensure “Prevent unregistered users from viewing pages, regardless of the page rights” is not checked in the rights and apply a better right scheme using groups and rights on spaces.

Affected configurations

Nvd
Vulners
Node
xwikixwikiRange12.10.10
OR
xwikixwikiRange13.013.4.6
OR
xwikixwikiMatch13.10
OR
xwikixwikiMatch13.10.1
OR
xwikixwikiMatch13.10.2
OR
xwikixwikiMatch14.0
VendorProductVersionCPE
xwikixwiki*cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*
xwikixwiki13.10cpe:2.3:a:xwiki:xwiki:13.10:*:*:*:*:*:*:*
xwikixwiki13.10.1cpe:2.3:a:xwiki:xwiki:13.10.1:*:*:*:*:*:*:*
xwikixwiki13.10.2cpe:2.3:a:xwiki:xwiki:13.10.2:*:*:*:*:*:*:*
xwikixwiki14.0cpe:2.3:a:xwiki:xwiki:14.0:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "xwiki-platform",
    "vendor": "xwiki",
    "versions": [
      {
        "status": "affected",
        "version": ">= 2.6.1, < 12.10.11"
      },
      {
        "status": "affected",
        "version": ">= 13.0.0, < 13.4.7"
      },
      {
        "status": "affected",
        "version": ">= 13.10.0, < 13.10.3"
      }
    ]
  }
]

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N

EPSS

0.001

Percentile

36.8%