8.9 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L
0.003 Low
EPSS
Percentile
69.3%
It’s possible to store JavaScript in an attachment name, which will be executed by anyone trying to move the corresponding attachment.
For example, an attachment with name ><img src>.jpg
will execute the alert.
This issue has been patched in XWiki 14.4RC1.
It is possible to fix the vulnerability by copying moveStep1.vm to webapp/xwiki/templates/moveStep1.vm
and replace
#set($titleToDisplay = $services.localization.render('attachment.move.title',
[$attachment.name, $escapetool.xml($doc.plainTitle), $doc.getURL()]))
by
#set($titleToDisplay = $services.localization.render('attachment.move.title', [
$escapetool.xml($attachment.name),
$escapetool.xml($doc.plainTitle),
$escapetool.xml($doc.getURL())
]))
See the corresponding patch.
If you have any questions or comments about this advisory:
CPE | Name | Operator | Version |
---|---|---|---|
org.xwiki.platform:xwiki-platform-attachment-ui | lt | 14.4-rc-1 |
github.com/advisories/GHSA-9r9j-57rf-f6vj
github.com/xwiki/xwiki-platform/commit/fbc4bfbae4f6ce8109addb281de86a03acdb9277
github.com/xwiki/xwiki-platform/security/advisories/GHSA-9r9j-57rf-f6vj
jira.xwiki.org/browse/XWIKI-19667
nvd.nist.gov/vuln/detail/CVE-2022-36097
raw.githubusercontent.com/xwiki/xwiki-platform/xwiki-platform-14.0-rc-1/xwiki-platform-core/xwiki-platform-attachment/xwiki-platform-attachment-api/src/main/resources/templates/attachment/moveStep1.vm