CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
EPSS
Percentile
26.9%
A stored XSS can be exploited by users with edit rights by adding a AppWithinMinutes.FormFieldCategoryClass
class on a page and setting the payload on the page title.
Then, any user visiting /xwiki/bin/view/AppWithinMinutes/ClassEditSheet
executes the payload.
See https://jira.xwiki.org/browse/XWIKI-20365 for me details.
The issue has been patched on XWiki 14.4.8, 14.10.4, and 15.0 ?
The issue can be fixed by updating AppWithinMinutes.ClassEditSheet
with this patch.
If you have any questions or comments about this advisory:
This vulnerability has been reported on Intigriti by RenΓ© de Sain @renniepak.
Vendor | Product | Version | CPE |
---|---|---|---|
org.xwiki.platform | xwiki-platform-appwithinminutes-ui | * | cpe:2.3:a:org.xwiki.platform:xwiki-platform-appwithinminutes-ui:*:*:*:*:*:*:*:* |
github.com/advisories/GHSA-4wc6-hqv9-qc97
github.com/xwiki/xwiki-platform/commit/1b87fec1e5b5ec00b7a8c3c3f94f6c5e22547392#diff-79e725ec7125cced7d302e1a1f955a76745af26ef28a148981b810e85335d302
github.com/xwiki/xwiki-platform/security/advisories/GHSA-4wc6-hqv9-qc97
jira.xwiki.org/browse/XWIKI-20365
nvd.nist.gov/vuln/detail/CVE-2023-35153