Impact
It’s possible to store a JavaScript which will be executed by anyone viewing the history of an attachment containing javascript in its name.
For example, attachment a file with name ><img src=1 onerror=alert(1)>.jpg
will execute the alert.
Patches
This issue has been patched in XWiki 13.10.6 and 14.3RC1.
Workarounds
It is possible to replace viewattachrev.vm, the entry point for this attack, by a patched version from the patch without updating XWiki.
References
For more information
If you have any questions or comments about this advisory:
- Open an issue in Jira XWiki.org
- Email us at Security Mailing List
References
- https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-mxf2-4r22-5hq9
- https://nvd.nist.gov/vuln/detail/CVE-2022-36094
- https://github.com/xwiki/xwiki-platform/commit/047ce9fa4a7c13f3883438aaf54fc50f287a7e8e
- https://jira.xwiki.org/browse/XWIKI-19612
- https://github.com/advisories/GHSA-mxf2-4r22-5hq9