Lucene search

K
githubGitHub Advisory DatabaseGHSA-WCG9-PGQV-XM5V
HistoryAug 19, 2024 - 9:49 p.m.

XWiki Platform allows XSS through XClass name in string properties

2024-08-1921:49:07
CWE-79
CWE-96
GitHub Advisory Database
github.com
9
xss
security
xwiki
javascript
patch
workaround
vulnerability

CVSS3

9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

AI Score

6.8

Confidence

High

EPSS

0.001

Percentile

21.8%

Impact

Is it possible for a user without Script or Programming rights to craft a URL pointing to a page with arbitrary JavaScript.
This requires social engineer to trick a user to follow the URL.

Reproduction steps

  1. As a user without script or programming right, create a (non-terminal) document named " + alert(1) + " (the quotes need to be part of the name).
  2. Edit the class.
  3. Add a string property named "test".
  4. Edit using the object editor and add an object of the created class
  5. Get an admin to open <xwiki-server>/xwiki/bin/view/%22%20%2B%20alert(1)%20%2B%20%22/?viewer=display&type=object&property=%22%20%2B%20alert(1)%20%2B%20%22.WebHome.test&mode=edit where <xwiki-server> is the URL of your XWiki installation.

Patches

This has been patched in XWiki 14.10.21, 15.5.5, 15.10.6 and 16.0.0.

Workarounds

We’re not aware of any workaround except upgrading.

References

Affected configurations

Vulners
Node
org.xwiki.platformxwiki-platform-oldcoreMatch16.0.0-rc-1
OR
org.xwiki.platformxwiki-platform-oldcoreRange15.6-rc-115.10.6
OR
org.xwiki.platformxwiki-platform-oldcoreRange15.0-rc-115.5.5
OR
org.xwiki.platformxwiki-platform-oldcoreRange1.1.214.10.21
VendorProductVersionCPE
org.xwiki.platformxwiki-platform-oldcore16.0.0-rc-1cpe:2.3:a:org.xwiki.platform:xwiki-platform-oldcore:16.0.0-rc-1:*:*:*:*:*:*:*
org.xwiki.platformxwiki-platform-oldcore*cpe:2.3:a:org.xwiki.platform:xwiki-platform-oldcore:*:*:*:*:*:*:*:*

CVSS3

9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

AI Score

6.8

Confidence

High

EPSS

0.001

Percentile

21.8%

Related for GHSA-WCG9-PGQV-XM5V