XWiki Platform Attachment UI vulnerable to cross-site scripting in the move attachment form
Package
Affected versions
>= 14.0-rc-1, < 14.4-rc-1
Patched versions
14.4-rc-1
Description
Published by the National Vulnerability Database
Sep 8, 2022
Published to the GitHub Advisory Database
Sep 16, 2022
Reviewed
Sep 16, 2022
Last updated
Jan 27, 2023
Impact
It's possible to store JavaScript in an attachment name, which will be executed by anyone trying to move the corresponding attachment.
For example, an attachment with name
><img src=1 onerror=alert(1)>.jpg
will execute the alert.Patches
This issue has been patched in XWiki 14.4RC1.
Workarounds
It is possible to fix the vulnerability by copying moveStep1.vm to
webapp/xwiki/templates/moveStep1.vm
and replaceby
See the corresponding patch.
References
For more information
If you have any questions or comments about this advisory:
References