It's possible for a user without any specific right to perform script injection and remote code execution just by inserting an appropriate title when creating a new Change Request. This vulnerability is particularly critical as Change Request aims at being created by user without any particular rights.
The vulnerability has been fixed in Change Request 1.9.2.
It's possible to workaround the issue without upgrading by editing the document ChangeRequest.Code.ChangeRequestSheet
and by performing the same change as in the commit: https://github.com/xwiki-contrib/application-changerequest/commit/7565e720117f73102f5a276239eabfe85e15cff4.
If you have any questions or comments about this advisory: * Open an issue in Jira XWiki.org * Email us at Security Mailing List
Thanks Michael Hamann for the report.
{ "nvd_published_at": "2023-10-12T17:15:09Z", "cwe_ids": [ "CWE-79" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2023-10-17T02:19:16Z" }