XWiki Platform allows XSS through XClass name in string properties
Critical severity
GitHub Reviewed
Published
Aug 19, 2024
in
xwiki/xwiki-platform
•
Updated Aug 20, 2024
Package
Affected versions
>= 1.1.2, < 14.10.21
>= 15.0-rc-1, < 15.5.5
>= 15.6-rc-1, < 15.10.6
= 16.0.0-rc-1
Patched versions
14.10.21
15.5.5
15.10.6
16.0.0
Description
Published by the National Vulnerability Database
Aug 19, 2024
Published to the GitHub Advisory Database
Aug 19, 2024
Reviewed
Aug 19, 2024
Last updated
Aug 20, 2024
Impact
Is it possible for a user without Script or Programming rights to craft a URL pointing to a page with arbitrary JavaScript.
This requires social engineer to trick a user to follow the URL.
Reproduction steps
" + alert(1) + "
(the quotes need to be part of the name)."test"
.<xwiki-server>/xwiki/bin/view/%22%20%2B%20alert(1)%20%2B%20%22/?viewer=display&type=object&property=%22%20%2B%20alert(1)%20%2B%20%22.WebHome.test&mode=edit
where<xwiki-server>
is the URL of your XWiki installation.Patches
This has been patched in XWiki 14.10.21, 15.5.5, 15.10.6 and 16.0.0.
Workarounds
We're not aware of any workaround except upgrading.
References
References