9 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
0.001 Low
EPSS
Percentile
32.6%
There was no check in the author of a JavaScript xobject or StyleSheet xobject added in a XWiki document, so until now it was possible for a user having only Edit Right to create such object and to craft a script allowing to perform some operations when executing by a user with appropriate rights.
This has been patched in XWiki 14.9-rc-1 by only executing the script if the author of it has Script right.
The only known workaround consists in applying the following patch and rebuilding and redeploying xwiki-platform-skin-skinx
.
If you have any questions or comments about this advisory:
github.com/xwiki/xwiki-platform
github.com/xwiki/xwiki-platform/commit/fe65bc35d5672dd2505b7ac4ec42aec57d500fbb
github.com/xwiki/xwiki-platform/security/advisories/GHSA-cmvg-w72j-7phx
jira.xwiki.org/browse/XWIKI-19514
jira.xwiki.org/browse/XWIKI-19583
jira.xwiki.org/browse/XWIKI-9119
nvd.nist.gov/vuln/detail/CVE-2023-29206