XWiki Platform vulnerable to RXSS via editor parameter - importinline template
Critical severity
GitHub Reviewed
Published
May 9, 2023
in
xwiki/xwiki-platform
•
Updated Nov 7, 2023
Package
Affected versions
>= 2.2-milestone-1, < 14.4.8
>= 14.5, < 14.10.4
Patched versions
14.4.8
14.10.4
Description
Published by the National Vulnerability Database
May 9, 2023
Published to the GitHub Advisory Database
May 9, 2023
Reviewed
May 9, 2023
Last updated
Nov 7, 2023
Impact
It's possible to execute javascript with the right of any user by leading him to a special URL on the wiki targeting a page which contains an attachment.
To reproduce:
?xpage=importinline&editor=%22%3E%3Cimg%20src%20onerror=alert(document.domain)%3E
to the page view URL as inhttps://myhost/xwiki/bin/view/XWiki/MyUser?xpage=importinline&editor=%22%3E%3Cimg%20src%20onerror=alert(document.domain)%3E
Patches
This has been patched in XWiki 15.0-rc-1, 14.10.4 and 14.4.8.
Workarounds
The easiest is to edit file
<xwiki app>/templates/importinline.vm
and apply the modification described on xwiki/xwiki-platform@28905f7References
https://jira.xwiki.org/browse/XWIKI-20340
https://app.intigriti.com/company/submissions/e95a7ad5-7029-4627-abf0-3e3e3ea0b4ce/XWIKI-E93DFEYK
Attribution
This vulnerability has been reported on Intigriti by René de Sain @renniepak.
References