Lucene search

K
osvGoogleOSV:GHSA-J9H5-VCGV-2JFM
HistoryMay 09, 2023 - 5:46 p.m.

XWiki Platform vulnerable to RXSS via editor parameter - importinline template

2023-05-0917:46:22
Google
osv.dev
8
xwiki platform
rxss
editor parameter
vulnerability
patch
workaround
javascript
url
attachment
security issue
intigriti
user profile
xwiki 15.0-rc-1
14.10.4
14.4.8
renΓ© de sain

9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

0.003 Low

EPSS

Percentile

69.4%

Impact

It’s possible to execute javascript with the right of any user by leading him to a special URL on the wiki targeting a page which contains an attachment.

To reproduce:

  • add an attachment to a page (for example, your user profile)
  • add ?xpage=importinline&editor=%22%3E%3Cimg%20src%20onerror=alert(document.domain)%3E to the page view URL as in https://myhost/xwiki/bin/view/XWiki/MyUser?xpage=importinline&editor=%22%3E%3Cimg%20src%20onerror=alert(document.domain)%3E

Patches

This has been patched in XWiki 15.0-rc-1, 14.10.4 and 14.4.8.

Workarounds

The easiest is to edit file <xwiki app>/templates/importinline.vm and apply the modification described on https://github.com/xwiki/xwiki-platform/commit/28905f7f518cc6f21ea61fe37e9e1ed97ef36f01

References

https://jira.xwiki.org/browse/XWIKI-20340
https://app.intigriti.com/company/submissions/e95a7ad5-7029-4627-abf0-3e3e3ea0b4ce/XWIKI-E93DFEYK

Attribution

This vulnerability has been reported on Intigriti by RenΓ© de Sain @renniepak.

9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

0.003 Low

EPSS

Percentile

69.4%

Related for OSV:GHSA-J9H5-VCGV-2JFM