Lucene search

K
githubGitHub Advisory DatabaseGHSA-GX6H-936C-VRRR
HistoryFeb 09, 2022 - 11:25 p.m.

Cross site scripting in registration template in xwiki-platform

2022-02-0923:25:44
CWE-79
GitHub Advisory Database
github.com
12
cross site scripting
xwiki-platform
registration template
xss
security patch
workaround
jira xwiki
security mailing list

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N

EPSS

0.001

Percentile

36.8%

Impact

We found a possible XSS vector in the registerinline.vm template related to the xredirect hidden field.
This template is only used in the following conditions:

  • the wiki must be open to registration for anyone
  • the wiki must be closed to view for Guest users (more specifically the XWiki.Registration page must be forbidden in View for guest user)

A way to obtain the second condition is when administrators checked the “Prevent unregistered users from viewing pages, regardless of the page rights” box in the administration rights.

Patches

The issue is patched in versions 12.10.11, 14.0-rc-1, 13.4.7, 13.10.3.

Workarounds

There are two main ways for protecting against this vulnerability, the easiest and the best one is by applying a patch in the registerinline.vm template, the patch consists in checking the value of the xredirect field to ensure it matches the following:

<input type="hidden" name="xredirect" value="$escapetool.xml($!request.xredirect)" />

If for some reason it’s not possible to patch this file, another workaround is to ensure “Prevent unregistered users from viewing pages, regardless of the page rights” is not checked in the rights and apply a better right scheme using groups and rights on spaces.

References

https://jira.xwiki.org/browse/XWIKI-19291

For more information

If you have any questions or comments about this advisory:

Affected configurations

Vulners
Node
org.xwiki.platformxwiki-platform-web-templatesRange13.10.013.10.3
OR
org.xwiki.platformxwiki-platform-web-templatesRange13.0.013.4.7
OR
org.xwiki.platformxwiki-platform-web-templatesRange2.6.112.10.11
VendorProductVersionCPE
org.xwiki.platformxwiki-platform-web-templates*cpe:2.3:a:org.xwiki.platform:xwiki-platform-web-templates:*:*:*:*:*:*:*:*

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N

EPSS

0.001

Percentile

36.8%

Related for GHSA-GX6H-936C-VRRR