GHSA-cmvg-w72j-7phx

Suggest an improvement
Source
https://github.com/advisories/GHSA-cmvg-w72j-7phx
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/04/GHSA-cmvg-w72j-7phx/GHSA-cmvg-w72j-7phx.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-cmvg-w72j-7phx
Aliases
Published
2023-04-12T20:38:47Z
Modified
2023-11-08T04:12:17.637436Z
Severity
  • 9.0 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H CVSS Calculator
Summary
org.xwiki.platform:xwiki-platform-skin-skinx vulnerable to basic Cross-site Scripting by exploiting JSX or SSX plugins
Details

Impact

There was no check in the author of a JavaScript xobject or StyleSheet xobject added in a XWiki document, so until now it was possible for a user having only Edit Right to create such object and to craft a script allowing to perform some operations when executing by a user with appropriate rights.

Patches

This has been patched in XWiki 14.9-rc-1 by only executing the script if the author of it has Script right.

Workarounds

The only known workaround consists in applying the following patch and rebuilding and redeploying xwiki-platform-skin-skinx.

For more information

If you have any questions or comments about this advisory: * Open an issue in Jira * Email us at Security ML

Database specific
{
    "nvd_published_at": "2023-04-15T16:15:00Z",
    "github_reviewed_at": "2023-04-12T20:38:47Z",
    "severity": "CRITICAL",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-79"
    ]
}
References

Affected packages

Maven / org.xwiki.platform:xwiki-platform-skin-skinx

Package

Name
org.xwiki.platform:xwiki-platform-skin-skinx
View open source insights on deps.dev
Purl
pkg:maven/org.xwiki.platform/xwiki-platform-skin-skinx

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.0-milestone-1
Fixed
14.9-rc-1