GHSA-vxf7-mx22-jr24

Suggest an improvement
Source
https://github.com/advisories/GHSA-vxf7-mx22-jr24
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/04/GHSA-vxf7-mx22-jr24/GHSA-vxf7-mx22-jr24.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-vxf7-mx22-jr24
Aliases
Published
2023-04-12T20:38:44Z
Modified
2023-11-08T04:12:17.574390Z
Severity
  • 9.9 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
org.xwiki.platform:xwiki-platform-rendering-xwiki vulnerable to stored cross-site scripting via HTML and raw macro
Details

Impact

The HTML macro does not systematically perform a proper neutralization of script-related html tags. As a result, any user able to use the html macro in XWiki, is able to introduce an XSS attack. This can be particularly dangerous since in a standard wiki, any user is able to use the html macro directly in their own user profile page.

Patches

The problem has been patched in XWiki 14.8RC1. The patch involve that the HTML macro are systematically cleaned up whenever the user does not have script right.

Workarounds

There's no workaround for this issue.

For more information

If you have any questions or comments about this advisory: * Open an issue in Jira * Email us at security ML

Database specific
{
    "nvd_published_at": "2023-04-15T16:15:00Z",
    "github_reviewed_at": "2023-04-12T20:38:44Z",
    "severity": "CRITICAL",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-79"
    ]
}
References

Affected packages

Maven / org.xwiki.platform:xwiki-platform-rendering-xwiki

Package

Name
org.xwiki.platform:xwiki-platform-rendering-xwiki
View open source insights on deps.dev
Purl
pkg:maven/org.xwiki.platform/xwiki-platform-rendering-xwiki

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
14.8-rc-1